Skip to main content

Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT

Low
Published: Thu May 15 2025 (05/15/2025, 20:12:12 UTC)
Source: AlienVault OTX

Description

A new PowerShell-based shellcode loader has been discovered, designed to execute a variant of Remcos RAT. The attack chain begins with malicious LNK files in ZIP archives, using mshta.exe for initial execution. The loader employs fileless techniques, executing code directly in memory to evade traditional defenses. It leverages Windows APIs to allocate memory and execute binary code. The Remcos RAT provides full system control, featuring keylogging, screen capture, and credential theft capabilities. It uses advanced evasion techniques like process hollowing and UAC bypass. The malware establishes persistence through registry modifications and connects to a command and control server over TLS. This sophisticated attack emphasizes the need for behavioral analytics and proactive security measures to detect and mitigate such stealthy threats.

AI-Powered Analysis

AILast updated: 06/19/2025, 18:05:08 UTC

Technical Analysis

This threat involves a sophisticated fileless malware attack leveraging PowerShell to load and execute shellcode directly in memory, thereby bypassing traditional file-based detection mechanisms. The attack initiates via malicious LNK shortcut files embedded within ZIP archives, which when opened, trigger mshta.exe to execute the initial payload. The PowerShell-based loader then uses Windows API calls to allocate memory and execute binary code without writing files to disk, significantly enhancing stealth. The payload is a variant of Remcos RAT, a remote access trojan that grants attackers full control over the compromised system. Remcos RAT capabilities include keylogging, screen capture, credential theft, and other espionage functions. It employs advanced evasion techniques such as process hollowing—injecting malicious code into legitimate processes—and User Account Control (UAC) bypass to escalate privileges without user consent. Persistence is achieved through registry modifications, ensuring the malware survives system reboots. Communication with the command and control (C2) server is conducted over encrypted TLS channels, complicating network detection. This attack chain exemplifies modern threat actor tactics that emphasize stealth, memory-resident execution, and multi-layered evasion, making detection and mitigation challenging without behavioral analytics and endpoint detection and response (EDR) solutions capable of monitoring in-memory activities and anomalous process behaviors.

Potential Impact

For European organizations, this threat poses significant risks to confidentiality, integrity, and availability of critical systems. The Remcos RAT’s capabilities enable attackers to exfiltrate sensitive data such as credentials and intellectual property, conduct surveillance through screen captures and keylogging, and potentially manipulate or disrupt system operations. The fileless nature of the attack reduces the likelihood of detection by traditional antivirus solutions, increasing the window of opportunity for attackers to establish persistence and expand their foothold. Organizations in sectors with high-value data—such as finance, healthcare, government, and critical infrastructure—are particularly vulnerable. The use of UAC bypass and process hollowing techniques means that even systems with standard user privileges can be escalated to higher privilege levels, increasing the potential damage. The encrypted C2 communication further complicates network-based detection and response efforts. Overall, the threat could lead to data breaches, operational disruptions, and reputational damage for European entities if not promptly identified and mitigated.

Mitigation Recommendations

To effectively mitigate this threat, European organizations should implement the following specific measures beyond generic advice: 1) Deploy and tune advanced endpoint detection and response (EDR) tools capable of monitoring PowerShell execution, memory injection techniques, and anomalous process behaviors such as process hollowing and UAC bypass attempts. 2) Enforce strict application whitelisting policies to prevent execution of unauthorized mshta.exe scripts and PowerShell commands, especially those launched from user directories or temporary locations. 3) Configure PowerShell logging (Module Logging, Script Block Logging, and Transcription) and regularly analyze logs for suspicious activity indicative of fileless attacks. 4) Implement network monitoring solutions that inspect TLS traffic for anomalies, including unusual connections to external IPs or domains associated with known Remcos C2 infrastructure. 5) Harden user environments by disabling or restricting the use of LNK files from untrusted sources and educating users to avoid opening suspicious ZIP archives or shortcuts. 6) Regularly audit and restrict registry permissions to prevent unauthorized persistence mechanisms. 7) Employ multi-factor authentication and credential hygiene practices to limit the impact of credential theft. 8) Maintain up-to-date threat intelligence feeds to quickly identify emerging indicators of compromise related to Remcos RAT variants. These targeted controls will enhance detection and prevention capabilities against this stealthy, fileless PowerShell-based attack.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.qualys.com/vulnerabilities-threat-research/2025/05/15/fileless-execution-powershell-based-shellcode-loader-executes-remcos-rat"]
Adversary

Indicators of Compromise

Hash

ValueDescriptionCopy
hash1b26f7e369e39312e4fcbc993d483b17
hashb63178f562b948b850f4676d4b8db1c0
hashbf32ff64ac0cfee67f4b2df27733576a
hashdd7f049a4b573cc48e0412902a2c14b5
hash85dcc4bafccb5b9e255f75c2cd96fec1b4a5b30d09ae0d8eb571b312511d7df7
hashab8caac901b477c08934ec63978400eb369efb655114805ccba28c48272e5dad
hashce5ee4a1991fa0a9030dc9e2e0601dc0f14c7961e6550921d8fd2cc4ec53a042

Url

ValueDescriptionCopy
urlhttps://mytaxclientcopy.com/xlab22.hta

Domain

ValueDescriptionCopy
domainreadysteaurants.com

Threat ID: 682c992c7960f6956616a631

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 6/19/2025, 6:05:08 PM

Last updated: 8/12/2025, 3:18:26 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats