New DesckVB RAT Unveiled with Multi-Stage Infection Chain and Plugin-Based Architecture


A sophisticated strain of the DeskVB Remote Access Trojan (RAT) has been identified in the wild, showcasing a highly modular architecture and a complex, multi-stage infection chain.

While the malware family itself is not entirely new, this latest iteration (v2.9.0.0) stands out for its operational stability and “plugin-based” design, which allow attackers to deploy capabilities only after a successful compromise selectively.

The attack lifecycle relies on a fileless execution method to evade traditional antivirus detection. The infection begins with a Windows Script Host (WSH) JavaScript file.

This Stage 1 payload is heavily obfuscated; upon execution, it copies itself to C:UsersPublic, relaunches via wscript.exe, and dynamically reconstructs a PowerShell payload.

Stages 2 and 3 involve PowerShell scripts that perform connectivity checks (pinging Google domains) and anti-analysis scans to detect debuggers.

Once the environment is deemed safe, the script downloads decimal-encoded payload chunks and reconstructs a .NET assembly in memory.

Finally, Stage 4 utilizes a .NET loader that executes the main RAT payload using Assembly.Load() with reflective invocation. This ensures that the malicious Portable Executable (PE) is never dropped to the disk, minimizing the forensic footprint.

Repository accompanies a full technical report documenting an active malware ecosystem centered around DesckVB RAT, a modular .NET Remote Access Trojan observed in live campaigns in early 2026.

C2 Protocol and Runtime Decryption

Upon execution, the DesckVB RAT performs runtime decryption of its Command and Control (C2) configuration, revealing the host IP, port, mutex, and capability flags. The malware utilizes a custom TCP protocol for communication.

Although the C2 infrastructure was inactive during analysis, researchers successfully reconstructed the protocol using historical PCAP data.

The communication relies on consistent delimiters (||) and message terminators (#Sucess#). This consistency is critical for defenders, as it allows for network-level detection even when the attacker changes server infrastructure.

The core strength of DesckVB lies in its modularity. The malware does not carry all its features at once; instead, it fetches DLLs from the C2 using the command RunBlugin||.

Plugin NameFunctionality
DetectarAntivirus.dllEnumerates installed security products and reports them to the C2.
Keylogger.dllUses SetWindowsHookEx for low-level keyboard hooking, clipboard interception, and active window tracking.
Webcam.dllUtilizes the AForge library (DirectShow) to stream JPEG frames. It attempts to suppress the camera LED via registry modifications.
Ping_Net.dllPerforms ICMP probes and can execute HTTP(S) requests to attacker-supplied URLs.

Builder Analysis

Analysis of a cracked v2.6 builder in an isolated environment confirmed strong continuity in configuration structure and naming conventions with the live v2.9 samples.

Furthermore, the string “Pjoao1578” appears repeatedly across metadata (e.g., CompanyName: Pjoao1578Developer) and debug paths.

While this does not provide definitive personal attribution, it strongly suggests a shared toolchain or build environment linkage. This metadata is valuable for threat clustering, allowing analysts to track the evolution of the malware family across different campaigns.

Indicators of Compromise

File Artifacts (SHA256)

Component / File TypeSHA256 Hash
Stage 1 JS9d9cfe5b31a3b020e3c65d440d8355e33f7c056b087ec6aba3093ae1a099ac0
PowerShell Script347621f7a3392939d9bdbe8a6c9fda30ba9d3f23cb6733484da8e2993772b7f3
Loadera675f5a396de1fa732a9d83993884b397f02921bbcf34346fbed32c8f4053064
RAT Payloadaffb29980bc9564f1b03fe977e9ca5c7adf254656d639632c4d14e34aa4fdff6
Webcam Pluginff051dde71487ea459899920ef7014dad8eee4df308eb360555f3e22232c9367

Network Indicators

Indicator TypeValueContext
C2 Addressmanikandan83[.]mysynology[.]net:7535Primary Command & Control
Staging URLhxxps://andrefelipedonascime1768785037020[.]1552093[.]meusitehostgator[.]com[.]br/.../01.txtPayload Download
Staging URL.../02.txtPayload Download
Staging URL.../03.txtPayload Download
Staging URL.../PeYesPayload Download

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link