Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Another day, another malicious JPEG, (Mon, Feb 23rd)

0
Medium
Malware
Published: Mon Feb 23 2026 (02/23/2026, 14:26:39 UTC)
Source: SANS ISC Handlers Diary

Description

In his last two diaries, Xavier discussed recent malware campaigns that download JPEG files with embedded malicious payload[1,2]. At that point in time, I&#x27ve not come across the malicious “MSI image” myself, but while I was going over malware samples that were caught by one of my customer&#x27s e-mail proxies during last week, I found another campaign in which the same technique was used.

AI-Powered Analysis

AILast updated: 02/23/2026, 13:37:37 UTC

Technical Analysis

This malware campaign leverages phishing emails with spoofed sender addresses and embedded logos to appear legitimate, targeting users primarily via email attachments. The initial payload is a large (1.17 MB) JScript file compressed in a GZIP envelope, containing extensive obfuscation with thousands of repeated lines to evade static detection. The script attempts persistence by copying itself to the Windows startup folder and then constructs a PowerShell command executed via WMI's Win32_Process.Create method to run a Base64-encoded PowerShell script. This PowerShell script downloads a disguised JPEG file (with a PNG extension) from a now-defunct URL, which contains an embedded Base64-encoded payload. The payload is extracted and loaded via reflection, invoking its Main method with parameters indicating use of the Windows Downloads folder and command line execution. A secondary URL hosts a reversed and Base64-encoded executable, which upon decoding is identified as Remcos RAT, a well-known remote access Trojan capable of extensive system compromise. The campaign uses layered obfuscation techniques including string splitting, garbage string insertion, and Base64 encoding to hinder analysis. The phishing emails fail DMARC/SPF checks, which may allow email gateways to quarantine them. Indicators of Compromise (IoCs) include specific URLs, file hashes for the JScript, encoded TXT, and decoded EXE files. The campaign demonstrates a sophisticated multi-stage infection chain combining social engineering, script-based loaders, and image file steganography to deliver a potent RAT payload.

Potential Impact

Organizations worldwide face significant risks from this campaign due to the stealthy delivery of Remcos RAT, which can enable attackers to gain persistent remote access, exfiltrate sensitive data, execute arbitrary commands, and deploy further malware. The use of obfuscated scripts and image-based payloads complicates detection by traditional antivirus and email filtering solutions. If successful, infections can lead to data breaches, intellectual property theft, operational disruption, and potential lateral movement within networks. The phishing vector targets end users, increasing the likelihood of initial compromise in organizations with insufficient email security awareness or controls. The persistence mechanism ensures the malware survives reboots, prolonging attacker access. The campaign's use of legitimate-looking spoofed emails and embedded logos increases the chance of user interaction, especially in regions where the spoofed companies operate. Although no widespread exploitation is currently reported, the presence of active URLs and known RAT payloads indicates a credible threat that could escalate if not mitigated.

Mitigation Recommendations

1. Enforce strict email authentication protocols including DMARC, SPF, and DKIM to block spoofed emails and quarantine suspicious messages. 2. Deploy advanced email filtering solutions capable of detecting and blocking large obfuscated script attachments and compressed archives. 3. Implement endpoint detection and response (EDR) tools with behavioral analysis to identify script-based execution, PowerShell abuse, and suspicious process creation via WMI. 4. Restrict execution of scripts from email attachments and untrusted locations, and disable or tightly control PowerShell execution policies, especially for encoded commands. 5. Monitor and block known malicious URLs and domains associated with this campaign at the network perimeter. 6. Conduct user awareness training focusing on phishing recognition, especially regarding spoofed sender addresses and unexpected attachments. 7. Regularly audit startup folders and scheduled tasks for unauthorized persistence mechanisms. 8. Use threat intelligence feeds to update detection signatures with IoCs such as file hashes and URLs from this campaign. 9. Employ sandboxing solutions to analyze suspicious attachments in a controlled environment before delivery to end users. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential infections.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32738","fetched":true,"fetchedAt":"2026-02-23T13:37:21.145Z","wordCount":1200}

Threat ID: 699c5811be58cf853b908718

Added to database: 2/23/2026, 1:37:21 PM

Last enriched: 2/23/2026, 1:37:37 PM

Last updated: 2/24/2026, 1:43:37 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats