Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

In-Memory Loader Drops ScreenConnect

0
Medium
Published: Fri Apr 10 2026 (04/10/2026, 08:15:00 UTC)
Source: AlienVault OTX General

Description

In February 2026, a sophisticated attack chain was identified that tricks victims into installing ConnectWise's ScreenConnect remote access tool via a fake Adobe Acrobat Reader download page. The attack uses advanced evasion techniques including heavy obfuscation, in-memory execution of dynamically compiled C# code via PowerShell, manipulation of the Process Environment Block to impersonate legitimate Windows processes, and abuse of auto-elevated COM objects to bypass User Account Control without prompts. This multi-layered approach evades signature-based detection and complicates forensic analysis, ultimately enabling unauthorized remote access through ScreenConnect.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/10/2026, 10:35:44 UTC

Technical Analysis

This malware campaign employs a VBScript loader that downloads and executes obfuscated PowerShell commands, which compile and run C# code entirely in memory using .NET reflection. The loader manipulates the Process Environment Block (PEB) to masquerade as legitimate Windows processes and abuses auto-elevated COM objects to bypass UAC silently. The attack chain begins with a fraudulent Adobe Acrobat Reader download page designed to deceive users into installing ScreenConnect, a legitimate remote access tool exploited for malicious purposes. The use of in-memory execution and dynamic code construction allows the malware to evade signature-based defenses and hinder forensic investigations. The final payload is ScreenConnect, deployed without user consent to enable unauthorized remote access.

Potential Impact

The attack results in unauthorized installation and execution of ScreenConnect, a legitimate remote access tool, which can be exploited by attackers to gain persistent remote access to compromised systems. The sophisticated evasion techniques reduce the likelihood of detection by traditional signature-based security solutions and complicate forensic analysis, increasing the risk of prolonged undetected compromise. There are no known exploits in the wild reported for this specific attack chain as of the published date.

Mitigation Recommendations

No official patch or vendor advisory is available for this threat. Patch status is not yet confirmed — check vendor advisories for updates. Mitigation should focus on user education to avoid downloading software from fraudulent websites and monitoring for the presence of ScreenConnect installations that were not authorized. Security teams should consider deploying behavioral detection tools capable of identifying in-memory execution, UAC bypass attempts, and process masquerading. Blocking known malicious URLs and hashes associated with this campaign can also reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/memory-loader-drops-screenconnect"]
Adversary
null
Pulse Id
69d8b1848ae30fd4dab9095d
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash07720d8220abc066b6fdb2c187ae58f5
hash07f95ff34fb330875d80afadca3f0d5b
hash3d389886e95f00fade1eea67a6c370d1
hash3effadb977eddd4c48c7850c8dc03b13
hasha7e5dbec37c8f431d175dfd9352db59f
hashc02448e016b2568173de3eedadd80149
hashc36910c4c8d23ec93f6ae7d7a2496ce5
hashe4b594a18fc2a6ee164a76bdea980bc0

Url

ValueDescriptionCopy
urlhttp://eshareflies.im/ad/
urlhttp://x0.at/qOfN.msi
urlhttps://x0.at/qOfN.msi

Domain

ValueDescriptionCopy
domaineshareflies.im

Threat ID: 69d8ceff1cc7ad14daa9150b

Added to database: 4/10/2026, 10:20:47 AM

Last enriched: 4/10/2026, 10:35:44 AM

Last updated: 4/11/2026, 12:13:45 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses