New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack
Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and establish persistent, covert remote access. "The infection chain follows a tightly orchestrated execution path: an obfuscated VBS launcher executed via wscript.exe invokes a
AI Analysis
Technical Summary
The SHADOW#REACTOR malware campaign is a multi-stage attack designed to covertly deploy the commercially available Remcos RAT on Windows systems. The infection chain initiates with an obfuscated Visual Basic Script (win64.vbs) executed by wscript.exe, likely triggered by user interaction such as clicking a malicious link. This VBS script acts as a launcher for a Base64-encoded PowerShell payload that downloads fragmented, text-based payload files (qpwoe64.txt or qpwoe32.txt) from a remote server into the %TEMP% directory. The PowerShell script validates the completeness of these fragments through size and existence checks, implementing a self-healing mechanism that retries downloads to avoid chain failure. Once validated, the fragments are reconstructed into a secondary PowerShell script (jdywa.ps1), which invokes a .NET Reactor-protected reflective loader. This loader incorporates anti-debugging and anti-virtual machine checks to evade detection and analysis. It establishes persistence and fetches the final Remcos RAT payload, which is executed using MSBuild.exe, a legitimate Microsoft binary, to avoid raising suspicion. Additional wrapper scripts ensure the initial VBS launcher can be re-triggered to maintain persistence. The campaign's modular and obfuscated design, use of text-only intermediates, and living-off-the-land techniques complicate static detection and sandbox analysis. The attackers appear to be initial access brokers targeting a broad range of organizations, including enterprises and SMBs, for financial gain, though no direct attribution to known threat groups exists. The campaign does not exploit a specific vulnerability but relies on social engineering and user interaction to initiate the infection.
Potential Impact
For European organizations, the SHADOW#REACTOR campaign poses a risk of unauthorized remote access, data exfiltration, espionage, and potential lateral movement within networks. The use of Remcos RAT enables attackers to control compromised systems covertly, potentially leading to intellectual property theft, disruption of business operations, and exposure of sensitive information. Enterprises and SMBs are at risk due to the opportunistic nature of the campaign and the widespread use of Windows systems. The stealthy multi-stage infection chain and living-off-the-land tactics make detection challenging, increasing the likelihood of prolonged undetected presence. Persistent access could facilitate follow-on attacks such as ransomware deployment or supply chain compromise. Although currently assessed as low severity, the campaign's modularity and evasive techniques could enable escalation or adaptation to more damaging payloads, especially in high-value sectors such as finance, manufacturing, and critical infrastructure prevalent in Europe.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscated scripts, in-memory execution, and LOLBin abuse, specifically monitoring wscript.exe, PowerShell, and MSBuild.exe activities. 2) Enforce strict application whitelisting and restrict execution of scripts and living-off-the-land binaries to authorized users and processes. 3) Implement network segmentation and monitor outbound connections for anomalous traffic to known malicious servers or unusual data exfiltration patterns. 4) Conduct user awareness training focused on recognizing social engineering lures that trigger script execution. 5) Utilize script-blocking policies via Group Policy Objects (GPO) to limit or disable execution of VBS and PowerShell scripts unless explicitly required. 6) Regularly audit and harden persistence mechanisms, including scheduled tasks and startup scripts, to detect and remove unauthorized entries. 7) Employ threat hunting to identify indicators of compromise related to Remcos RAT and the SHADOW#REACTOR infection chain. 8) Maintain up-to-date threat intelligence feeds to track emerging variants and adjust defenses accordingly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Switzerland
New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack
Description
Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and establish persistent, covert remote access. "The infection chain follows a tightly orchestrated execution path: an obfuscated VBS launcher executed via wscript.exe invokes a
AI-Powered Analysis
Technical Analysis
The SHADOW#REACTOR malware campaign is a multi-stage attack designed to covertly deploy the commercially available Remcos RAT on Windows systems. The infection chain initiates with an obfuscated Visual Basic Script (win64.vbs) executed by wscript.exe, likely triggered by user interaction such as clicking a malicious link. This VBS script acts as a launcher for a Base64-encoded PowerShell payload that downloads fragmented, text-based payload files (qpwoe64.txt or qpwoe32.txt) from a remote server into the %TEMP% directory. The PowerShell script validates the completeness of these fragments through size and existence checks, implementing a self-healing mechanism that retries downloads to avoid chain failure. Once validated, the fragments are reconstructed into a secondary PowerShell script (jdywa.ps1), which invokes a .NET Reactor-protected reflective loader. This loader incorporates anti-debugging and anti-virtual machine checks to evade detection and analysis. It establishes persistence and fetches the final Remcos RAT payload, which is executed using MSBuild.exe, a legitimate Microsoft binary, to avoid raising suspicion. Additional wrapper scripts ensure the initial VBS launcher can be re-triggered to maintain persistence. The campaign's modular and obfuscated design, use of text-only intermediates, and living-off-the-land techniques complicate static detection and sandbox analysis. The attackers appear to be initial access brokers targeting a broad range of organizations, including enterprises and SMBs, for financial gain, though no direct attribution to known threat groups exists. The campaign does not exploit a specific vulnerability but relies on social engineering and user interaction to initiate the infection.
Potential Impact
For European organizations, the SHADOW#REACTOR campaign poses a risk of unauthorized remote access, data exfiltration, espionage, and potential lateral movement within networks. The use of Remcos RAT enables attackers to control compromised systems covertly, potentially leading to intellectual property theft, disruption of business operations, and exposure of sensitive information. Enterprises and SMBs are at risk due to the opportunistic nature of the campaign and the widespread use of Windows systems. The stealthy multi-stage infection chain and living-off-the-land tactics make detection challenging, increasing the likelihood of prolonged undetected presence. Persistent access could facilitate follow-on attacks such as ransomware deployment or supply chain compromise. Although currently assessed as low severity, the campaign's modularity and evasive techniques could enable escalation or adaptation to more damaging payloads, especially in high-value sectors such as finance, manufacturing, and critical infrastructure prevalent in Europe.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscated scripts, in-memory execution, and LOLBin abuse, specifically monitoring wscript.exe, PowerShell, and MSBuild.exe activities. 2) Enforce strict application whitelisting and restrict execution of scripts and living-off-the-land binaries to authorized users and processes. 3) Implement network segmentation and monitor outbound connections for anomalous traffic to known malicious servers or unusual data exfiltration patterns. 4) Conduct user awareness training focused on recognizing social engineering lures that trigger script execution. 5) Utilize script-blocking policies via Group Policy Objects (GPO) to limit or disable execution of VBS and PowerShell scripts unless explicitly required. 6) Regularly audit and harden persistence mechanisms, including scheduled tasks and startup scripts, to detect and remove unauthorized entries. 7) Employ threat hunting to identify indicators of compromise related to Remcos RAT and the SHADOW#REACTOR infection chain. 8) Maintain up-to-date threat intelligence feeds to track emerging variants and adjust defenses accordingly.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/new-malware-campaign-delivers-remcos.html","fetched":true,"fetchedAt":"2026-01-14T01:56:41.144Z","wordCount":1130}
Threat ID: 6966f7db8330e06716c60392
Added to database: 1/14/2026, 1:56:43 AM
Last enriched: 1/14/2026, 1:57:51 AM
Last updated: 2/5/2026, 10:25:04 AM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
MediumFortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution
CriticalIngress-NGINX Admission Controller v1.11.1 - FD Injection to RCE
CriticalRedis 8.0.2 - RCE
Criticalwindows 10/11 - NTLM Hash Disclosure Spoofing
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.