Another day, another malicious JPEG, (Mon, Feb 23rd)
In his last two diaries, Xavier discussed recent malware campaigns that download JPEG files with embedded malicious payload[1,2]. At that point in time, I've not come across the malicious “MSI image” myself, but while I was going over malware samples that were caught by one of my customer's e-mail proxies during last week, I found another campaign in which the same technique was used.
AI Analysis
Technical Summary
This malware campaign leverages phishing emails with spoofed sender addresses and embedded logos to appear legitimate, targeting users primarily via email attachments. The initial payload is a large (1.17 MB) JScript file compressed in a GZIP envelope, containing extensive obfuscation with thousands of repeated lines to evade static detection. The script attempts persistence by copying itself to the Windows startup folder and then constructs a PowerShell command executed via WMI's Win32_Process.Create method to run a Base64-encoded PowerShell script. This PowerShell script downloads a disguised JPEG file (with a PNG extension) from a now-defunct URL, which contains an embedded Base64-encoded payload. The payload is extracted and loaded via reflection, invoking its Main method with parameters indicating use of the Windows Downloads folder and command line execution. A secondary URL hosts a reversed and Base64-encoded executable, which upon decoding is identified as Remcos RAT, a well-known remote access Trojan capable of extensive system compromise. The campaign uses layered obfuscation techniques including string splitting, garbage string insertion, and Base64 encoding to hinder analysis. The phishing emails fail DMARC/SPF checks, which may allow email gateways to quarantine them. Indicators of Compromise (IoCs) include specific URLs, file hashes for the JScript, encoded TXT, and decoded EXE files. The campaign demonstrates a sophisticated multi-stage infection chain combining social engineering, script-based loaders, and image file steganography to deliver a potent RAT payload.
Potential Impact
Organizations worldwide face significant risks from this campaign due to the stealthy delivery of Remcos RAT, which can enable attackers to gain persistent remote access, exfiltrate sensitive data, execute arbitrary commands, and deploy further malware. The use of obfuscated scripts and image-based payloads complicates detection by traditional antivirus and email filtering solutions. If successful, infections can lead to data breaches, intellectual property theft, operational disruption, and potential lateral movement within networks. The phishing vector targets end users, increasing the likelihood of initial compromise in organizations with insufficient email security awareness or controls. The persistence mechanism ensures the malware survives reboots, prolonging attacker access. The campaign's use of legitimate-looking spoofed emails and embedded logos increases the chance of user interaction, especially in regions where the spoofed companies operate. Although no widespread exploitation is currently reported, the presence of active URLs and known RAT payloads indicates a credible threat that could escalate if not mitigated.
Mitigation Recommendations
1. Enforce strict email authentication protocols including DMARC, SPF, and DKIM to block spoofed emails and quarantine suspicious messages. 2. Deploy advanced email filtering solutions capable of detecting and blocking large obfuscated script attachments and compressed archives. 3. Implement endpoint detection and response (EDR) tools with behavioral analysis to identify script-based execution, PowerShell abuse, and suspicious process creation via WMI. 4. Restrict execution of scripts from email attachments and untrusted locations, and disable or tightly control PowerShell execution policies, especially for encoded commands. 5. Monitor and block known malicious URLs and domains associated with this campaign at the network perimeter. 6. Conduct user awareness training focusing on phishing recognition, especially regarding spoofed sender addresses and unexpected attachments. 7. Regularly audit startup folders and scheduled tasks for unauthorized persistence mechanisms. 8. Use threat intelligence feeds to update detection signatures with IoCs such as file hashes and URLs from this campaign. 9. Employ sandboxing solutions to analyze suspicious attachments in a controlled environment before delivery to end users. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential infections.
Affected Countries
Czech Republic, United States, Brazil, Romania, Germany, United Kingdom, France, Canada, Australia, Netherlands
Another day, another malicious JPEG, (Mon, Feb 23rd)
Description
In his last two diaries, Xavier discussed recent malware campaigns that download JPEG files with embedded malicious payload[1,2]. At that point in time, I've not come across the malicious “MSI image” myself, but while I was going over malware samples that were caught by one of my customer's e-mail proxies during last week, I found another campaign in which the same technique was used.
AI-Powered Analysis
Technical Analysis
This malware campaign leverages phishing emails with spoofed sender addresses and embedded logos to appear legitimate, targeting users primarily via email attachments. The initial payload is a large (1.17 MB) JScript file compressed in a GZIP envelope, containing extensive obfuscation with thousands of repeated lines to evade static detection. The script attempts persistence by copying itself to the Windows startup folder and then constructs a PowerShell command executed via WMI's Win32_Process.Create method to run a Base64-encoded PowerShell script. This PowerShell script downloads a disguised JPEG file (with a PNG extension) from a now-defunct URL, which contains an embedded Base64-encoded payload. The payload is extracted and loaded via reflection, invoking its Main method with parameters indicating use of the Windows Downloads folder and command line execution. A secondary URL hosts a reversed and Base64-encoded executable, which upon decoding is identified as Remcos RAT, a well-known remote access Trojan capable of extensive system compromise. The campaign uses layered obfuscation techniques including string splitting, garbage string insertion, and Base64 encoding to hinder analysis. The phishing emails fail DMARC/SPF checks, which may allow email gateways to quarantine them. Indicators of Compromise (IoCs) include specific URLs, file hashes for the JScript, encoded TXT, and decoded EXE files. The campaign demonstrates a sophisticated multi-stage infection chain combining social engineering, script-based loaders, and image file steganography to deliver a potent RAT payload.
Potential Impact
Organizations worldwide face significant risks from this campaign due to the stealthy delivery of Remcos RAT, which can enable attackers to gain persistent remote access, exfiltrate sensitive data, execute arbitrary commands, and deploy further malware. The use of obfuscated scripts and image-based payloads complicates detection by traditional antivirus and email filtering solutions. If successful, infections can lead to data breaches, intellectual property theft, operational disruption, and potential lateral movement within networks. The phishing vector targets end users, increasing the likelihood of initial compromise in organizations with insufficient email security awareness or controls. The persistence mechanism ensures the malware survives reboots, prolonging attacker access. The campaign's use of legitimate-looking spoofed emails and embedded logos increases the chance of user interaction, especially in regions where the spoofed companies operate. Although no widespread exploitation is currently reported, the presence of active URLs and known RAT payloads indicates a credible threat that could escalate if not mitigated.
Mitigation Recommendations
1. Enforce strict email authentication protocols including DMARC, SPF, and DKIM to block spoofed emails and quarantine suspicious messages. 2. Deploy advanced email filtering solutions capable of detecting and blocking large obfuscated script attachments and compressed archives. 3. Implement endpoint detection and response (EDR) tools with behavioral analysis to identify script-based execution, PowerShell abuse, and suspicious process creation via WMI. 4. Restrict execution of scripts from email attachments and untrusted locations, and disable or tightly control PowerShell execution policies, especially for encoded commands. 5. Monitor and block known malicious URLs and domains associated with this campaign at the network perimeter. 6. Conduct user awareness training focusing on phishing recognition, especially regarding spoofed sender addresses and unexpected attachments. 7. Regularly audit startup folders and scheduled tasks for unauthorized persistence mechanisms. 8. Use threat intelligence feeds to update detection signatures with IoCs such as file hashes and URLs from this campaign. 9. Employ sandboxing solutions to analyze suspicious attachments in a controlled environment before delivery to end users. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential infections.
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32738","fetched":true,"fetchedAt":"2026-02-23T13:37:21.145Z","wordCount":1200}
Threat ID: 699c5811be58cf853b908718
Added to database: 2/23/2026, 1:37:21 PM
Last enriched: 2/23/2026, 1:37:37 PM
Last updated: 2/24/2026, 1:43:37 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-23
MediumMaltrail IOC for 2026-02-22
MediumMaltrail IOC for 2026-02-23
MediumSANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains
MediumOperation Olalampo: Inside MuddyWater's Latest Campaign
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.