
"The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory shellcode injection into trusted Windows processes, never dropping a decrypted binary to disk," Securonix researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee said in a report shared with The Hacker News. AsyncRAT is an open-source malware that provides attackers with extensive control over compromised endpoints, enabling surveillance and data collection through keylogging, screen and webcam capture, clipboard monitoring, file system access, remote command execution, and persistence across reboots."
"The starting point of the infection sequence is a phishing email delivering a Virtual Hard Disk (VHD) hosted on the decentralized InterPlanetary Filesystem ( IPFS) network. The VHD files are disguised as PDF files for purchase orders to deceive targets. The multi-stage campaign has been funded to leverage Windows Script Files (WSF), heavily obfuscated batch scripts, and self-parsing PowerShell loaders to deliver an encrypted x64 shellcode. The shellcode in question is AsyncRAT, which is injected directly into trusted Windows processes and executed entirely in memory, effectively minimizing any forensic artifacts on disk."
DEAD#VAX initiates via phishing that delivers a VHD hosted on the IPFS network and disguised as a PDF purchase order. When opened the VHD mounts as a virtual drive presenting a WSF script on the mounted E: drive. The campaign uses heavily obfuscated batch scripts, Windows Script Files, and self-parsing PowerShell loaders to produce an encrypted x64 shellcode. The payload is AsyncRAT, which is injected into trusted Windows processes and executed entirely in memory. No decrypted binary is written to disk, reducing forensic artifacts and enabling evasion of traditional endpoint detection. AsyncRAT enables keylogging, screen and webcam capture, clipboard monitoring, filesystem access, remote command execution, and persistence.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]