DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
The DEAD#VAX malware campaign uses sophisticated evasion techniques to deploy the AsyncRAT remote access trojan via phishing emails containing IPFS-hosted VHD files disguised as PDFs. Upon opening, the VHD mounts as a virtual drive containing scripts that perform environment checks before injecting encrypted AsyncRAT shellcode directly into trusted Windows processes, executing entirely in memory without dropping files to disk. This fileless execution and use of legitimate Windows components make detection and forensic analysis difficult. AsyncRAT enables attackers to perform keylogging, screen and webcam capture, clipboard monitoring, file access, remote commands, and persistence. The campaign employs heavy script obfuscation, runtime decryption, and throttled execution to avoid detection. This multi-stage attack chain leverages modern tradecraft to bypass traditional endpoint security controls and maintain long-term stealthy access.
AI Analysis
Technical Summary
The DEAD#VAX malware campaign represents a highly stealthy and sophisticated attack vector that leverages a combination of social engineering, fileless malware techniques, and abuse of legitimate Windows features to deploy the AsyncRAT remote access trojan. The infection begins with a phishing email delivering a Virtual Hard Disk (VHD) file hosted on the decentralized InterPlanetary Filesystem (IPFS), disguised as a PDF purchase order to deceive targets. When the victim opens the file, it mounts as a virtual drive (e.g., E:\) containing a Windows Script File (WSF). Execution of this script triggers a heavily obfuscated batch script that performs environment checks to evade sandbox and virtual machine detection and verifies sufficient privileges. Upon passing these checks, a PowerShell loader decrypts and injects the AsyncRAT payload as shellcode directly into trusted Microsoft-signed Windows processes such as RuntimeBroker.exe, OneDrive.exe, taskhostw.exe, and sihost.exe. This in-memory execution model avoids writing malicious binaries to disk, significantly reducing forensic artifacts and detection by traditional antivirus and endpoint detection and response (EDR) solutions. The malware also implements execution throttling and sleep intervals to minimize CPU usage and evade behavioral detection. AsyncRAT provides attackers with extensive control over compromised systems, including keylogging, screen and webcam capture, clipboard monitoring, file system access, remote command execution, and persistence mechanisms via scheduled tasks. The campaign’s use of IPFS for hosting payloads adds a decentralized layer that complicates takedown efforts. Overall, DEAD#VAX exemplifies modern malware trends that rely on multi-stage, fileless, and memory-resident techniques combined with legitimate system processes to maintain stealth and persistence.
Potential Impact
For European organizations, the DEAD#VAX campaign poses a significant threat due to its stealthy nature and ability to bypass traditional security controls. The use of phishing emails with convincing purchase order lures increases the likelihood of initial compromise, especially in sectors with frequent procurement communications. Once inside, AsyncRAT’s capabilities allow attackers to conduct extensive surveillance, data exfiltration, and remote control, potentially leading to intellectual property theft, espionage, and disruption of business operations. The fileless execution and injection into trusted processes complicate detection and incident response, increasing dwell time and the risk of widespread lateral movement within networks. Organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, and critical infrastructure operators, face heightened risks of compliance violations and reputational damage. The decentralized hosting of payloads on IPFS also challenges traditional network defense mechanisms, requiring advanced threat hunting and monitoring capabilities. Overall, the campaign could enable persistent, covert access to European enterprise environments, facilitating espionage, data theft, and potentially enabling follow-on ransomware or sabotage attacks.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to detect and disrupt fileless and script-based attacks. Specific recommendations include: 1) Enhance email security with advanced phishing detection and sandboxing that can analyze VHD files and scripts, including those hosted on decentralized networks like IPFS. 2) Deploy endpoint detection solutions capable of monitoring in-memory execution, PowerShell activity, and injection into trusted Windows processes, with behavioral analytics to identify anomalies such as unusual process injections and execution throttling patterns. 3) Restrict execution of Windows Script Files (WSF), batch scripts, and PowerShell scripts through application control policies and enable PowerShell logging with script block logging and transcription for forensic visibility. 4) Implement network monitoring to detect IPFS traffic or connections to decentralized storage nodes, which are uncommon in enterprise environments. 5) Harden user privileges to limit script execution and prevent unauthorized persistence mechanisms like scheduled tasks. 6) Conduct regular phishing awareness training emphasizing the risks of opening unexpected attachments, especially those masquerading as PDFs but with unusual file extensions or behaviors. 7) Employ threat hunting exercises focused on identifying signs of AsyncRAT activity, such as keylogging artifacts, unusual process behaviors, and persistence mechanisms. 8) Maintain up-to-date threat intelligence feeds to quickly identify emerging indicators related to DEAD#VAX and AsyncRAT campaigns. 9) Consider network segmentation and zero trust principles to limit lateral movement if compromise occurs. 10) Prepare incident response plans specifically addressing fileless malware and memory-resident threats to enable rapid containment and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Switzerland
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
Description
The DEAD#VAX malware campaign uses sophisticated evasion techniques to deploy the AsyncRAT remote access trojan via phishing emails containing IPFS-hosted VHD files disguised as PDFs. Upon opening, the VHD mounts as a virtual drive containing scripts that perform environment checks before injecting encrypted AsyncRAT shellcode directly into trusted Windows processes, executing entirely in memory without dropping files to disk. This fileless execution and use of legitimate Windows components make detection and forensic analysis difficult. AsyncRAT enables attackers to perform keylogging, screen and webcam capture, clipboard monitoring, file access, remote commands, and persistence. The campaign employs heavy script obfuscation, runtime decryption, and throttled execution to avoid detection. This multi-stage attack chain leverages modern tradecraft to bypass traditional endpoint security controls and maintain long-term stealthy access.
AI-Powered Analysis
Technical Analysis
The DEAD#VAX malware campaign represents a highly stealthy and sophisticated attack vector that leverages a combination of social engineering, fileless malware techniques, and abuse of legitimate Windows features to deploy the AsyncRAT remote access trojan. The infection begins with a phishing email delivering a Virtual Hard Disk (VHD) file hosted on the decentralized InterPlanetary Filesystem (IPFS), disguised as a PDF purchase order to deceive targets. When the victim opens the file, it mounts as a virtual drive (e.g., E:\) containing a Windows Script File (WSF). Execution of this script triggers a heavily obfuscated batch script that performs environment checks to evade sandbox and virtual machine detection and verifies sufficient privileges. Upon passing these checks, a PowerShell loader decrypts and injects the AsyncRAT payload as shellcode directly into trusted Microsoft-signed Windows processes such as RuntimeBroker.exe, OneDrive.exe, taskhostw.exe, and sihost.exe. This in-memory execution model avoids writing malicious binaries to disk, significantly reducing forensic artifacts and detection by traditional antivirus and endpoint detection and response (EDR) solutions. The malware also implements execution throttling and sleep intervals to minimize CPU usage and evade behavioral detection. AsyncRAT provides attackers with extensive control over compromised systems, including keylogging, screen and webcam capture, clipboard monitoring, file system access, remote command execution, and persistence mechanisms via scheduled tasks. The campaign’s use of IPFS for hosting payloads adds a decentralized layer that complicates takedown efforts. Overall, DEAD#VAX exemplifies modern malware trends that rely on multi-stage, fileless, and memory-resident techniques combined with legitimate system processes to maintain stealth and persistence.
Potential Impact
For European organizations, the DEAD#VAX campaign poses a significant threat due to its stealthy nature and ability to bypass traditional security controls. The use of phishing emails with convincing purchase order lures increases the likelihood of initial compromise, especially in sectors with frequent procurement communications. Once inside, AsyncRAT’s capabilities allow attackers to conduct extensive surveillance, data exfiltration, and remote control, potentially leading to intellectual property theft, espionage, and disruption of business operations. The fileless execution and injection into trusted processes complicate detection and incident response, increasing dwell time and the risk of widespread lateral movement within networks. Organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, and critical infrastructure operators, face heightened risks of compliance violations and reputational damage. The decentralized hosting of payloads on IPFS also challenges traditional network defense mechanisms, requiring advanced threat hunting and monitoring capabilities. Overall, the campaign could enable persistent, covert access to European enterprise environments, facilitating espionage, data theft, and potentially enabling follow-on ransomware or sabotage attacks.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to detect and disrupt fileless and script-based attacks. Specific recommendations include: 1) Enhance email security with advanced phishing detection and sandboxing that can analyze VHD files and scripts, including those hosted on decentralized networks like IPFS. 2) Deploy endpoint detection solutions capable of monitoring in-memory execution, PowerShell activity, and injection into trusted Windows processes, with behavioral analytics to identify anomalies such as unusual process injections and execution throttling patterns. 3) Restrict execution of Windows Script Files (WSF), batch scripts, and PowerShell scripts through application control policies and enable PowerShell logging with script block logging and transcription for forensic visibility. 4) Implement network monitoring to detect IPFS traffic or connections to decentralized storage nodes, which are uncommon in enterprise environments. 5) Harden user privileges to limit script execution and prevent unauthorized persistence mechanisms like scheduled tasks. 6) Conduct regular phishing awareness training emphasizing the risks of opening unexpected attachments, especially those masquerading as PDFs but with unusual file extensions or behaviors. 7) Employ threat hunting exercises focused on identifying signs of AsyncRAT activity, such as keylogging artifacts, unusual process behaviors, and persistence mechanisms. 8) Maintain up-to-date threat intelligence feeds to quickly identify emerging indicators related to DEAD#VAX and AsyncRAT campaigns. 9) Consider network segmentation and zero trust principles to limit lateral movement if compromise occurs. 10) Prepare incident response plans specifically addressing fileless malware and memory-resident threats to enable rapid containment and remediation.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/deadvax-malware-campaign-deploys.html","fetched":true,"fetchedAt":"2026-02-05T09:10:52.531Z","wordCount":1163}
Threat ID: 69845e9ff9fa50a62f0ff3af
Added to database: 2/5/2026, 9:10:55 AM
Last enriched: 2/5/2026, 9:11:58 AM
Last updated: 2/5/2026, 5:45:44 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
SystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown
MediumThey Got In Through SonicWall. Then They Tried to Kill Every Security Tool
MediumFortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution
CriticalIngress-NGINX Admission Controller v1.11.1 - FD Injection to RCE
CriticalRedis 8.0.2 - RCE
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.