Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT
A new PowerShell-based shellcode loader has been discovered, designed to execute a variant of Remcos RAT. The attack chain begins with malicious LNK files in ZIP archives, using mshta.exe for initial execution. The loader employs fileless techniques, executing code directly in memory to evade traditional defenses. It leverages Windows APIs to allocate memory and execute binary code. The Remcos RAT provides full system control, featuring keylogging, screen capture, and credential theft capabilities. It uses advanced evasion techniques like process hollowing and UAC bypass. The malware establishes persistence through registry modifications and connects to a command and control server over TLS. This sophisticated attack emphasizes the need for behavioral analytics and proactive security measures to detect and mitigate such stealthy threats.
Pulse ID: 68264a9c6f5993a7d13fcfbc
Pulse Link: https://otx.alienvault.com/pulse/68264a9c6f5993a7d13fcfbc
Pulse Author: AlienVault
Created: 2025-05-15 20:12:12
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ICS #InfoSec #LNK #Malware #OTX #OpenThreatExchange #PowerShell #RAT #Remcos #RemcosRAT #ShellCode #TLS #Windows #ZIP #bot #AlienVault