Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Fileless Malware Deploys Advanced RAT via Legitimate Tools
Cyber Security

Fileless Malware Deploys Advanced RAT via Legitimate Tools

Team-CWDBy Team-CWDSeptember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A sophisticated fileless malware campaign exploiting legitimate system tools has been uncovered by cybersecurity researchers.

The attack bypasses traditional disk-based detection by executing malicious code entirely in memory, making it difficult to detect, analyze or remove.

Investigators found the operation ultimately delivered AsyncRAT, a powerful remote access Trojan (RAT), through a multi-stage fileless loader.

Initial Access via Compromised Remote Tool

According to an advisory published by LevelBlue on Wednesday, the breach began with a compromised ScreenConnect client – a widely used remote access platform.

Threat actors established an interactive session via the domain relay.shipperzone[.]online, linked to unauthorized ScreenConnect deployments. During this session, a VBScript called Update.vbs executed through WScript triggered a PowerShell command to download two payloads.

The files, logs.ldk and logs.ldr, were saved to the C:UsersPublic directory but never written as executables on disk. They were loaded directly into memory using reflection.

The first payload was converted into a byte array, while the second was executed directly. The script retrieved encoded data from the web, decoded it in memory and invoked a .NET assembly to run the attack – a hallmark of fileless malware.

Read more on fileless malware execution techniques: PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack

The AsyncRAT Infection Chain

A first-stage .NET assembly, Obfuscator.dll, acts as a launcher for the AsyncRAT infection chain.

The LevelBlue analysis revealed three core classes:

  • Class A, which initializes the runtime environment

  • Class Core, which establishes persistence through a scheduled task disguised as “Skype Updater” and loads additional payloads

  • Class Tafce5, which disables Windows security logging, patches script scanning and resolves APIs dynamically

The modular design allowed the malware to evade detection while preparing the system for the RAT payload.

Meanwhile, AsyncClient.exe functions as the command-and-control (C2) engine. It maintains persistent access, performs system reconnaissance and executes attacker-supplied commands.

Key capabilities include:

  • AES-256 decryption of embedded settings, including C2 domains like 3osch20[.]duckdns[.]org, infection flags and target directories such as %AppData%

  • TCP-based communication with custom packet protocols for command dispatch

  • Data exfiltration, including operating system details, privilege levels, antivirus status, active window titles and browser extensions such as MetaMask and Phantom

  • Keylogging with context capture, ensuring persistence through scheduled tasks

“By breaking down key elements, we can understand how the malware maintains persistence, dynamically loads payloads, and exfiltrates sensitive data like credentials, clipboard contents and browser artifacts,” reads the advisory.

“These findings enable the creation of targeted detection signatures and support endpoint hardening based on observed behaviors.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack
Next Article What the 2025 Gartner® Magic Quadrant™ Reveals
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What parents should know to protect their children from doxxing

November 28, 2025

What is it, and how do I get it off my device?

September 11, 2025

Find your weak spots before attackers do

November 21, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.