Skip to main content
Salt Typhoon and SparrowDoorShadowPad Unified Emulation-Driven Defense Across Multi-Vendor Campaigns

Image

Introduction

This analysis synthesizes the August 27 2025 joint Cybersecurity Advisory AA25-239A and related vendor reporting into a unified emulation driven defense narrative focused on salt-typhoon, sparrowdoor, shadowpad, emulation, ctem, aev, attribution, multi-vendor, and associated TTPs. It describes who acted when where and why then details AttackIQ emulation updates used to measure detection and prevention against a globally distributed espionage campaign affecting government technology and telecommunications environments.


Redoracle Team9/5/25Newssalt-typhoonsparrowdoorshadowpademulationctemaevattributionmulti-vendorthreat-intelligencewmicertutildll-side-loadingc2webshelldotnetnukeintrusionpersistencemodulesc2-trafficgovernmenttechnologytelecommunicationsresiliencesector-riskrisk-managementincident-responseAbout 4 min
“QuirkyLoader Unveiled A Modular Malware Loader Delivering Multi-Payload Attacks”

Image

Introduction

QuirkyLoader Unveiled A Modular Malware Loader Delivering Multi-Payload Attacks presents a concise and detailed picture of a modular loader observed since November 2024. This investigation synthesizes technical analysis and campaign reporting to explain how quirkyloader operates as a loader that leverages dll-side-loading, process-hollowing, aot compiled dotnet components and a flexible payload catalog that includes agent-tesla, asyncrat, snake-keylogger, remcos-rat, formbook, masslogger and rhadamanthys-stealer. The following material integrates threat-intelligence from ibm-x-force and related research while preserving evidence on email-spam delivery, targeted-campaigns, memory-resident execution, native-like-binaries appearance and high-level implications for credential-theft, keystroke capture and data-exfiltration.


Redoracle Team8/24/25News“quirkyloaderloaderdll-side-loadingprocess-hollowingaotdotnetpayloadssnake-keyloggerremcos-ratasyncratagent-teslaformbookmassloggerrhadamanthys-stealerphishingquishingqr-code-phishingemail-spamtargeted-campaignsibm-x-forcethreat-intelligencememory-residentnative-like-binariescredential-theftkeystrokedata-exfiltrationremote-access-trojan”About 7 min