Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack

0
Low
Published: Tue Jan 13 2026 (01/13/2026, 09:08:00 UTC)
Source: The Hacker News

Description

The SHADOW#REACTOR campaign delivers the Remcos Remote Access Trojan (RAT) through a sophisticated multi-stage Windows attack chain. It begins with an obfuscated Visual Basic Script (VBS) executed via wscript. exe, which launches a Base64-encoded PowerShell downloader. This downloader retrieves fragmented, text-based payloads from a remote server, reconstructs them in memory using a . NET Reactor-protected loader, and ultimately deploys Remcos RAT via the legitimate MSBuild. exe process. The campaign employs anti-analysis techniques such as in-memory execution, living-off-the-land binaries (LOLbins), and persistence mechanisms to evade detection. It primarily targets enterprise and small-to-medium business environments opportunistically, with no known threat actor attribution. The infection requires user interaction, typically through socially engineered lures. Despite its complexity, the campaign is assessed as low severity due to limited evidence of widespread exploitation and the need for user action.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:57:51 UTC

Technical Analysis

The SHADOW#REACTOR malware campaign is a multi-stage attack designed to covertly deploy the commercially available Remcos RAT on Windows systems. The infection chain initiates with an obfuscated Visual Basic Script (win64.vbs) executed by wscript.exe, likely triggered by user interaction such as clicking a malicious link. This VBS script acts as a launcher for a Base64-encoded PowerShell payload that downloads fragmented, text-based payload files (qpwoe64.txt or qpwoe32.txt) from a remote server into the %TEMP% directory. The PowerShell script validates the completeness of these fragments through size and existence checks, implementing a self-healing mechanism that retries downloads to avoid chain failure. Once validated, the fragments are reconstructed into a secondary PowerShell script (jdywa.ps1), which invokes a .NET Reactor-protected reflective loader. This loader incorporates anti-debugging and anti-virtual machine checks to evade detection and analysis. It establishes persistence and fetches the final Remcos RAT payload, which is executed using MSBuild.exe, a legitimate Microsoft binary, to avoid raising suspicion. Additional wrapper scripts ensure the initial VBS launcher can be re-triggered to maintain persistence. The campaign's modular and obfuscated design, use of text-only intermediates, and living-off-the-land techniques complicate static detection and sandbox analysis. The attackers appear to be initial access brokers targeting a broad range of organizations, including enterprises and SMBs, for financial gain, though no direct attribution to known threat groups exists. The campaign does not exploit a specific vulnerability but relies on social engineering and user interaction to initiate the infection.

Potential Impact

For European organizations, the SHADOW#REACTOR campaign poses a risk of unauthorized remote access, data exfiltration, espionage, and potential lateral movement within networks. The use of Remcos RAT enables attackers to control compromised systems covertly, potentially leading to intellectual property theft, disruption of business operations, and exposure of sensitive information. Enterprises and SMBs are at risk due to the opportunistic nature of the campaign and the widespread use of Windows systems. The stealthy multi-stage infection chain and living-off-the-land tactics make detection challenging, increasing the likelihood of prolonged undetected presence. Persistent access could facilitate follow-on attacks such as ransomware deployment or supply chain compromise. Although currently assessed as low severity, the campaign's modularity and evasive techniques could enable escalation or adaptation to more damaging payloads, especially in high-value sectors such as finance, manufacturing, and critical infrastructure prevalent in Europe.

Mitigation Recommendations

European organizations should implement targeted mitigations beyond generic advice: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscated scripts, in-memory execution, and LOLBin abuse, specifically monitoring wscript.exe, PowerShell, and MSBuild.exe activities. 2) Enforce strict application whitelisting and restrict execution of scripts and living-off-the-land binaries to authorized users and processes. 3) Implement network segmentation and monitor outbound connections for anomalous traffic to known malicious servers or unusual data exfiltration patterns. 4) Conduct user awareness training focused on recognizing social engineering lures that trigger script execution. 5) Utilize script-blocking policies via Group Policy Objects (GPO) to limit or disable execution of VBS and PowerShell scripts unless explicitly required. 6) Regularly audit and harden persistence mechanisms, including scheduled tasks and startup scripts, to detect and remove unauthorized entries. 7) Employ threat hunting to identify indicators of compromise related to Remcos RAT and the SHADOW#REACTOR infection chain. 8) Maintain up-to-date threat intelligence feeds to track emerging variants and adjust defenses accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/01/new-malware-campaign-delivers-remcos.html","fetched":true,"fetchedAt":"2026-01-14T01:56:41.144Z","wordCount":1130}

Threat ID: 6966f7db8330e06716c60392

Added to database: 1/14/2026, 1:56:43 AM

Last enriched: 1/14/2026, 1:57:51 AM

Last updated: 1/14/2026, 5:25:40 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats