Skip to content

Hide Navigation Hide TOC

Fooder - S9033 (7c8865dc-1bf9-49ce-b5f2-f15abde0909a)

Fooder is a custom 64-bit C/C++ loader used by MuddyWater that can decrypt and reflectively load embedded payloads such as a go-socks5 proxy utility, the open-source HackBrowserData infostealer, or the MuddyViper backdoor. Fooder has frequently masqueraded as an entertainment executable, such as the Snake game (e.g., Snake_Game.exe).(Citation: ESET_MuddyWater_Dec2025)

Cluster A Galaxy A Cluster B Galaxy B Level
Delay Execution - T1678 (a1df809c-7d0e-459f-8fe5-25474bab770b) Attack Pattern Fooder - S9033 (7c8865dc-1bf9-49ce-b5f2-f15abde0909a) Malware 1
Token Impersonation/Theft - T1134.001 (86850eff-2729-40c3-b85e-c4af26da4a2d) Attack Pattern Fooder - S9033 (7c8865dc-1bf9-49ce-b5f2-f15abde0909a) Malware 1
Fooder - S9033 (7c8865dc-1bf9-49ce-b5f2-f15abde0909a) Malware Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) Attack Pattern 1
Fooder - S9033 (7c8865dc-1bf9-49ce-b5f2-f15abde0909a) Malware Deobfuscate/Decode Files or Information - T1140 (3ccef7ae-cb5e-48f6-8302-897105fbf55c) Attack Pattern 1
Native API - T1106 (391d824f-0ef1-47a0-b0ee-c59a75e27670) Attack Pattern Fooder - S9033 (7c8865dc-1bf9-49ce-b5f2-f15abde0909a) Malware 1
Reflective Code Loading - T1620 (4933e63b-9b77-476e-ab29-761bc5b7d15a) Attack Pattern Fooder - S9033 (7c8865dc-1bf9-49ce-b5f2-f15abde0909a) Malware 1
Fooder - S9033 (7c8865dc-1bf9-49ce-b5f2-f15abde0909a) Malware Match Legitimate Resource Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) Attack Pattern 1
Token Impersonation/Theft - T1134.001 (86850eff-2729-40c3-b85e-c4af26da4a2d) Attack Pattern Access Token Manipulation - T1134 (dcaa092b-7de9-4a21-977f-7fcb77e89c48) Attack Pattern 2
Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) Attack Pattern Match Legitimate Resource Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) Attack Pattern 2