Tech »  Topic »  New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script

New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script


Credential Abuse: 15-Min Attack Simulation

A recently uncovered malware campaign has revealed a highly sophisticated, multi-stage infection process utilizing heavily obfuscated Visual Basic Script (VBS) files to deploy remote access trojans (RATs) such as Remcos, LimeRAT, DCRat, and AsyncRAT.

Discovered across a cluster of 16 open directories on various hosts, this campaign relies on a file named “sostener.vbs” (Spanish for “sustain”) as a key component of its initial payload.

Discovery of a Complex Malware Deployment System

The intricate design of this malware delivery system, which involves a three-stage process of obfuscation, dynamic script generation, and remote payload downloads, highlights the evolving tactics of modern cyber threats.

result of the deobfuscation

Researchers have noted potential ties to APT-C-36 (Blind Eagle), a Colombian threat actor known for similar techniques, though definitive attribution remains unconfirmed.

The malware operates through a meticulously crafted three-stage process. In the first stage, the obfuscated VBScript, often ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE