<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Malware Analysis Archives - EG-FinCIRT</title>
	<atom:link href="https://egfincirt-wpn.azurewebsites.net/tag/malware-analysis/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.egfincirt.org.eg/tag/malware-analysis/</link>
	<description>CYBER SECURITY</description>
	<lastBuildDate>Thu, 14 May 2026 07:40:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>/wp-content/uploads/2021/06/cropped-EG-FINCIRT-logo-2021-original-32x32.png</url>
	<title>Malware Analysis Archives - EG-FinCIRT</title>
	<link>https://www.egfincirt.org.eg/tag/malware-analysis/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Payload Ransomware: In-depth technical analysis</title>
		<link>https://egfincirt-wpn.azurewebsites.net/payload-ransomware/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 05 May 2026 11:04:48 +0000</pubDate>
				<category><![CDATA[blogs]]></category>
		<category><![CDATA[Malware Analysis]]></category>
		<guid isPermaLink="false">https://www.egfincirt.org.eg/?p=15557</guid>

					<description><![CDATA[<p>Payload Ransomware Overview Payload is an emerging ransomware group that was first identified in February 2026 and primarily targets mid-to-large-sized organizations across sectors such as healthcare, telecommunications, finance, and logistics. The group operates on a global scale, with a noticeable concentration of activity across Middle East and Asia. Despite its recent emergence, Payload has already [&#8230;]</p>
<p>The post <a href="https://egfincirt-wpn.azurewebsites.net/payload-ransomware/">Payload Ransomware: In-depth technical analysis</a> appeared first on <a href="https://egfincirt-wpn.azurewebsites.net">EG-FinCIRT</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="15557" class="elementor elementor-15557" data-elementor-settings="{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-a399737 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a399737" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b677335" data-id="b677335" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-fa1c9f7 elementor-widget elementor-widget-post-info" data-id="fa1c9f7" data-element_type="widget" data-e-type="widget" data-widget_type="post-info.default">
				<div class="elementor-widget-container">
							<ul class="elementor-inline-items elementor-icon-list-items elementor-post-info">
								<li class="elementor-icon-list-item elementor-repeater-item-cb4f4f6 elementor-inline-item" itemprop="datePublished">
						<a href="https://egfincirt-wpn.azurewebsites.net/2026/05/05/">
											<span class="elementor-icon-list-icon">
								<i aria-hidden="true" class="fas fa-calendar"></i>							</span>
									<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date">
										<time>May 5, 2026</time>					</span>
									</a>
				</li>
				<li class="elementor-icon-list-item elementor-repeater-item-bcd97b7 elementor-inline-item">
										<span class="elementor-icon-list-icon">
								<i aria-hidden="true" class="far fa-clock"></i>							</span>
									<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-time">
										<time>2:04 pm</time>					</span>
								</li>
				<li class="elementor-icon-list-item elementor-repeater-item-eeb507b elementor-inline-item" itemprop="about">
										<span class="elementor-icon-list-icon">
								<i aria-hidden="true" class="fas fa-virus"></i>							</span>
									<span class="elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms">
										<span class="elementor-post-info__terms-list">
				<a href="https://egfincirt-wpn.azurewebsites.net/tag/malware-analysis/" class="elementor-post-info__terms-list-item">Malware Analysis</a>				</span>
					</span>
								</li>
				</ul>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-35ecc0e elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="35ecc0e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e6277a1" data-id="e6277a1" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-37281a3 elementor-widget elementor-widget-heading" data-id="37281a3" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Payload Ransomware Overview</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-3c1c08d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3c1c08d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d40cc26" data-id="d40cc26" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d615f4d elementor-widget elementor-widget-text-editor" data-id="d615f4d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<div class="qMYqUG_convSearchResultHighlightRoot"><div class="relative w-full overflow-visible"><section class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" data-turn-id="request-WEB:64f9efb3-b346-4d9a-8371-165f29e1c910-0" data-turn-id-container="request-WEB:64f9efb3-b346-4d9a-8371-165f29e1c910-0" data-testid="conversation-turn-2" data-scroll-anchor="false" data-turn="assistant"><div class="text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)"><div class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn"><div class="flex max-w-full flex-col gap-4 grow"><div class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1" dir="auto" tabindex="0" data-message-author-role="assistant" data-message-id="2b17558e-9229-4301-a028-b64f9aa44814" data-message-model-slug="gpt-5-5" data-turn-start-message="true"><div class="flex w-full flex-col gap-1 empty:hidden"><div class="markdown prose dark:prose-invert wrap-break-word w-full light markdown-new-styling"><p data-start="0" data-end="338">Payload is an emerging ransomware group that was first identified in February 2026 and primarily targets mid-to-large-sized organizations across sectors such as healthcare, telecommunications, finance, and logistics. The group operates on a global scale, with a noticeable concentration of activity across Middle East and Asia.</p><p data-start="340" data-end="702" data-is-last-node="" data-is-only-node="">Despite its recent emergence, Payload has already claimed more than 40 victims within a relatively short period, indicating rapid operational growth and suggesting a well-organized and coordinated operation.</p></div></div></div></div></div></div></section></div></div>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e2cce07 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e2cce07" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-24c8dae" data-id="24c8dae" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-cd923e5 elementor-widget elementor-widget-heading" data-id="cd923e5" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Technical Analysis</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-5b8cbfc elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5b8cbfc" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b46b28" data-id="1b46b28" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c90b822 elementor-widget elementor-widget-text-editor" data-id="c90b822" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Payload is a cross-platform ransomware family with both Windows and Linux variants. In this blog, we will primarily focus on the Windows variant and its behavior in detail.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-f93f268 elementor-widget elementor-widget-image" data-id="f93f268" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img fetchpriority="high" decoding="async" width="768" height="329" src="/wp-content/uploads/2026/05/vt-1-768x329.png" class="attachment-medium_large size-medium_large wp-image-16075" alt="" srcset="/wp-content/uploads/2026/05/vt-1-768x329.png 768w, /wp-content/uploads/2026/05/vt-1-300x129.png 300w, /wp-content/uploads/2026/05/vt-1-1024x439.png 1024w, /wp-content/uploads/2026/05/vt-1-150x64.png 150w, /wp-content/uploads/2026/05/vt-1.png 1536w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (1) - Sample on VirusTotal</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-9db106b elementor-widget elementor-widget-heading" data-id="9db106b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Command-line Arguments</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-d4796f2 elementor-widget elementor-widget-text-editor" data-id="d4796f2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Payload provides extensive support for command-line arguments, suggesting it can be operated manually or remotely. It appears to work as an operator-driven ransomware executable rather than a simple one-click . This design allows operators to selectively enable or disable features based on the target environment or operational objectives . </p>								</div>
				</div>
				<div class="elementor-element elementor-element-9f28b30 elementor-widget elementor-widget-image" data-id="9f28b30" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img decoding="async" width="666" height="428" src="/wp-content/uploads/2026/05/1-parse_commands.png" class="attachment-medium_large size-medium_large wp-image-15851" alt="" srcset="/wp-content/uploads/2026/05/1-parse_commands.png 666w, /wp-content/uploads/2026/05/1-parse_commands-300x193.png 300w, /wp-content/uploads/2026/05/1-parse_commands-150x96.png 150w" sizes="(max-width: 666px) 100vw, 666px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (2) - CLI Commands supported</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-fe7f0f9 elementor-widget elementor-widget-text-editor" data-id="fe7f0f9" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Below is the list of arguments that can be supplied by the operators:

<style>
.malware-table-container {
  width: 100%;
  margin: 20px 0;
  overflow-x: auto;
}

.malware-table {
  width: 100%;
  border-collapse: collapse;
  font-family: Arial, sans-serif;
  table-layout: fixed;
}

.malware-table th,
.malware-table td {
  border: 1px solid #ddd;
  padding: 12px;
  text-align: left;
  vertical-align: top;
  word-wrap: break-word;
}

.malware-table th {
  background-color: #31625A;
  color: #ffffff;
  font-weight: bold;
}

.malware-table tr:nth-child(even) td {
  background-color: #f9f9f9;
}

.malware-table th:nth-child(1),
.malware-table td:nth-child(1) {
  width: 20%;
}

.malware-table th:nth-child(2),
.malware-table td:nth-child(2) {
  width: 40%;
}

.malware-table th:nth-child(3),
.malware-table td:nth-child(3) {
  width: 40%;
}
</style>

<div class="malware-table-container">
<table class="malware-table">
<thead>
<tr>
<th>Flag</th>
<th>Effect when present</th>
<th>Default behavior</th>
</tr>
</thead>
<tbody>
<tr>
<td>`&#8211;background`</td>
<td>Runs encryption in the background (no console window); does NOT re-spawn itself</td>
<td>N/A</td>
</tr>
<tr>
<td>`-m`</td>
<td>Skips mutex creation/check (allows multiple instances)</td>
<td>Mutex is created to enforce single instance</td>
</tr>
<tr>
<td>`-n`</td>
<td>Does NOT write the ransom note to disk</td>
<td>Ransom note is written</td>
</tr>
<tr>
<td>`-d`</td>
<td>Disables self-deletion</td>
<td>Self-deletion is executed after run</td>
</tr>
<tr>
<td>`-k`</td>
<td>Does NOT kill processes or stop services</td>
<td>Target processes/services are terminated</td>
</tr>
<tr>
<td>`-s`</td>
<td>Skips network share enumeration (only local drives targeted)</td>
<td>Network shares are also enumerated and encrypted</td>
</tr>
<tr>
<td>`-l`</td>
<td>Wipes all Windows Event Logs after encryption (anti-forensics)</td>
<td>Event logs are left unchanged</td>
</tr>
<tr>
<td>`-i`</td>
<td>Ignores filename filters (may re-encrypt its own files like notes or payload artifacts)</td>
<td>Filename filters are enforced to avoid its files and system files</td>
</tr>
<tr>
<td>`&#8211;bypass-etw`</td>
<td>Patches ETW functions in `ntdll` to disable logging</td>
<td>ETW remains functional</td>
</tr>
<tr>
<td>`&#8211;algo`</td>
<td>Forces a specific ChaCha20 implementation (AVX2 or SSE2 optimized)</td>
<td>Algorithm path is auto-detected based on CPU</td>
</tr>
<tr>
<td>`&#8211;threads N`</td>
<td>Sets number of worker threads for encryption</td>
<td>Defaults to number of CPU cores</td>
</tr>
<tr>
<td>`-p &lt;path&gt;`</td>
<td>Encrypts only the specified path</td>
<td>All drives are enumerated and encrypted</td>
</tr>
<tr>
<td>`&#8211;log &lt;path&gt;`</td>
<td>Overrides default log file location</td>
<td>Logs written to `C:\payload.log`</td>
</tr>
</tbody>
</table>
</div>								</div>
				</div>
				<div class="elementor-element elementor-element-4076e5c elementor-widget elementor-widget-heading" data-id="4076e5c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Execution Modes</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-14e9bf5 elementor-widget elementor-widget-text-editor" data-id="14e9bf5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Payload supports two execution modes.If the <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">background flag</span> is already set, the malware runs silently in the background and continues directly to its main stages without showing any visible activity.</p><p>However, if the flag is not provided, the malware does not stop or limit its behavior. Instead, it prepares a new command line and launches a hidden copy of itself with the <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">&#8211;background</span> argument, then exits the current process. In this way, the original instance only acts as a launcher, while the actual ransomware execution continues in a hidden background process .</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-0268ffb elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="0268ffb" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a1b2d61" data-id="a1b2d61" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8d1efbd elementor-widget elementor-widget-heading" data-id="8d1efbd" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Pre-Encryption </h3>				</div>
				</div>
				<div class="elementor-element elementor-element-9a76323 elementor-widget elementor-widget-text-editor" data-id="9a76323" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Before starting the encryption phase, Payload performs a pre-encryption setup to prepare the system and remove recovery options. This stage ensures that targeted files are fully accessible and that the victim’s ability to recover data is significantly reduced.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-bd602c2 elementor-widget elementor-widget-text-editor" data-id="bd602c2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Based on configuration flags, payload initializes logging, lowers its shutdown priority to ensure it is terminated last during system shutdown or reboot, and empties the Recycle Bin via <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">SHEmptyRecycleBinA</span>.								</div>
				</div>
				<div class="elementor-element elementor-element-c4356fe elementor-widget elementor-widget-heading" data-id="c4356fe" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Mutex Creation</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-1f7f72d elementor-widget elementor-widget-text-editor" data-id="1f7f72d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>To prevent multiple instances from running simultaneously, the malware creates a mutex named &#8220;<span style="text-decoration: underline;"><strong>MakeAmericaGreatAgain</strong></span>&#8220;. If the mutex already exists, the program assumes another instance is active and terminates.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-4a0a820 elementor-widget elementor-widget-heading" data-id="4a0a820" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Disabling Event Tracing</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-e0c906d elementor-widget elementor-widget-text-editor" data-id="e0c906d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Payload disables Event Tracing for Windows (ETW), a Windows logging mechanism used by security tools to monitor process activity.</p><p>It first locates key ETW functions inside <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ntdll.dll</span>, then temporarily changes their memory protection to allow modification. After that, it patches the start of these functions in memory with a small instruction that forces them to immediately return, effectively disabling logging behavior.</p><p>Finally, it restores the original memory permissions and refreshes the instruction cache to apply the changes.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-70f51f6 elementor-widget elementor-widget-image" data-id="70f51f6" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img decoding="async" width="768" height="446" src="/wp-content/uploads/2026/05/2-ETW_bypass-768x446.png" class="attachment-medium_large size-medium_large wp-image-15878" alt="" srcset="/wp-content/uploads/2026/05/2-ETW_bypass-768x446.png 768w, /wp-content/uploads/2026/05/2-ETW_bypass-300x174.png 300w, /wp-content/uploads/2026/05/2-ETW_bypass-1024x594.png 1024w, /wp-content/uploads/2026/05/2-ETW_bypass-150x87.png 150w, /wp-content/uploads/2026/05/2-ETW_bypass.png 1115w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (3) - Patching ETW</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-e89c024 elementor-widget elementor-widget-heading" data-id="e89c024" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Clearing Event Logs</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-9900edb elementor-widget elementor-widget-text-editor" data-id="9900edb" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Payload can perform an anti-forensics step to remove traces of its activity from the system. It starts enumerating all available event log channels using <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">EvtOpenChannelEnum</span> and <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">EvtNextChannelPath</span>. For each log channel, it calls <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">EvtClearLog</span> to delete its contents.</p><p>After finishing, it closes the handle and unloads the related library. By clearing all event logs, the malware removes important records such as execution history.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-20bd790 elementor-widget elementor-widget-image" data-id="20bd790" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="656" height="128" src="/wp-content/uploads/2026/05/3-clear_events.png" class="attachment-medium_large size-medium_large wp-image-15880" alt="" srcset="/wp-content/uploads/2026/05/3-clear_events.png 656w, /wp-content/uploads/2026/05/3-clear_events-300x59.png 300w, /wp-content/uploads/2026/05/3-clear_events-150x29.png 150w" sizes="(max-width: 656px) 100vw, 656px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (4) – Enumerating and deleting EVT channels</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-212df5c elementor-widget elementor-widget-heading" data-id="212df5c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Deleting Shadow Copies</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-89e905e elementor-widget elementor-widget-text-editor" data-id="89e905e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Payload also runs a preparation step before encryption to block any easy way to recover files. It first checks if it is running in a 32-bit process on a 64-bit system (WOW64), and temporarily disables file system redirection so it can access the real system tools instead of redirected ones. Then it runs a command <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">vssadmin.exe delete shadows /all /quiet</span>, which deletes all Volume Shadow Copies on the system. After that, it restores the normal system state.</p><p>By removing these backups before encryption starts, the malware makes it much harder for the victim to restore their files.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-ab56546 elementor-widget elementor-widget-image" data-id="ab56546" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="670" height="106" src="/wp-content/uploads/2026/05/4-delete_shadow_copies.png" class="attachment-large size-large wp-image-15882" alt="" srcset="/wp-content/uploads/2026/05/4-delete_shadow_copies.png 670w, /wp-content/uploads/2026/05/4-delete_shadow_copies-300x47.png 300w, /wp-content/uploads/2026/05/4-delete_shadow_copies-150x24.png 150w" sizes="(max-width: 670px) 100vw, 670px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (5) – Deleting shadow copies command </figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-b4a2e62 elementor-widget elementor-widget-heading" data-id="b4a2e62" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Terminating Targeted Services</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-0064013 elementor-widget elementor-widget-text-editor" data-id="0064013" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Payload enumerates a hardcoded list of services and attempts to terminate them prior to initiating the encryption routine. For each service, it opens it using <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">OpenServiceA</span> and checks its current state with <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">QueryServiceStatusEx</span>. If the service is not already stopped or in the process of stopping, the malware terminates it.</p><p>Before stopping the main service, the malware stops dependent services first and waits until they finish or a timeout occurs, then continues execution and closes all service handles.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-92c80b1 elementor-widget elementor-widget-image" data-id="92c80b1" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="731" height="490" src="/wp-content/uploads/2026/05/5-terminate_services.png" class="attachment-medium_large size-medium_large wp-image-15890" alt="" srcset="/wp-content/uploads/2026/05/5-terminate_services.png 731w, /wp-content/uploads/2026/05/5-terminate_services-300x201.png 300w, /wp-content/uploads/2026/05/5-terminate_services-150x101.png 150w" sizes="(max-width: 731px) 100vw, 731px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (6) – Terminating services and their dependencies</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-a0597d6 elementor-widget elementor-widget-text-editor" data-id="a0597d6" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The following hardcoded services were identified within the malware sample and are likely terminated during execution:</p><ul><li><strong style="font-size: 16px;" data-start="1244" data-end="1273">VSS and Storage Services:<br /></strong><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">vss</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">VSNAPVSS</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">PDVFSService</span></li><li data-section-id="ieompg" data-start="1315" data-end="1375"><strong data-start="1317" data-end="1355">SQL and Database-Related Services:</strong><br data-start="1355" data-end="1358" /><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">sql</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">svc$</span></li><li data-section-id="1l9jxvq" data-start="1377" data-end="1824"><strong data-start="1379" data-end="1413">Backup and Recovery Solutions:</strong><br data-start="1413" data-end="1416" /><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">backup</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">YooBackup</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">YooIT</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">veeam</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">VeeamTransportSvc</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">VeeamDeploymentService</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">VeeamNFSSvc</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">BackupExecVSSProvider</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">BackupExecAgentAccelerator</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">BackupExecAgentBrowser</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">BackupExecDiveciMediaService</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">BackupExecJobEngine</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">BackupExecManagementService</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">BackupExecRPCService</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">AcrSch2Svc</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">AcronisAgent</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">CASAD2DWebSvc</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">CAARCUpdateSvc</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">GxVss</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">GxBlr</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">GxFWD</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">GxCVD</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">GxCIMgr</span></li><li data-section-id="kyrsap" data-start="1826" data-end="1984"><strong data-start="1828" data-end="1874">Security and Endpoint Protection Services:</strong><br data-start="1874" data-end="1877" /><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">sophos</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">DefWatch</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ccEvtMgr</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ccSetMgr</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">SavRoam</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">RTVscan</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">memtas</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">mepocs</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">zhudongfangyu</span></li><li data-section-id="v5ndds" data-start="1986" data-end="2137"><strong data-start="1988" data-end="2037">Business and Enterprise Application Services:</strong><br data-start="2037" data-end="2040" /><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">QBFCService</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">QBIDPService</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Intuit.QuickBooks.FCS</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">QBCFMonitorService</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">stc_raw_agent</span></li></ul>								</div>
				</div>
				<div class="elementor-element elementor-element-4d3b97f elementor-widget elementor-widget-heading" data-id="4d3b97f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Terminating Processes</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-7b0611d elementor-widget elementor-widget-text-editor" data-id="7b0611d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Malware calls <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">CreateToolhelp32Snapshot</span> to retrieve a snapshot of all processes and threads in the system. It then iterates through the process list using <code data-start="295" data-end="312">Process32FirstW</code> and <code data-start="317" data-end="333">Process32NextW</code> to identify active processes on the system.</p><p>For each process, Payload compares the executable name against a hardcoded list of targeted processes. If a match is found, the malware obtains a handle to the process using <code data-start="553" data-end="566">OpenProcess</code> and forcibly terminates it using <code data-start="600" data-end="618">TerminateProcess</code>.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-53a383b elementor-widget elementor-widget-image" data-id="53a383b" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="526" height="327" src="/wp-content/uploads/2026/05/6-kill_processes.png" class="attachment-medium_large size-medium_large wp-image-15892" alt="" srcset="/wp-content/uploads/2026/05/6-kill_processes.png 526w, /wp-content/uploads/2026/05/6-kill_processes-300x187.png 300w, /wp-content/uploads/2026/05/6-kill_processes-150x93.png 150w" sizes="(max-width: 526px) 100vw, 526px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (7) – Enumerating processes and kill targets .</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-abd52c2 elementor-widget elementor-widget-text-editor" data-id="abd52c2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The following processes are hardcoded within the malware and are targeted for termination:</p><ul><li><strong data-start="931" data-end="968">Database and Enterprise Services:</strong><br data-start="968" data-end="971" /><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">sql.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">oracle.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ocssd.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">dbsnmp.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">isqlplussvc.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ocautoupds.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">dbeng50.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">sqbcoreservice.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ocomm.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">encsvc.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">agntsvc.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">synctime.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">xfssvccon.exe</span></li><li data-section-id="hcydco" data-start="1174" data-end="1260"><strong data-start="1176" data-end="1213">Backup and Synchronization Tools:</strong><br data-start="1213" data-end="1216" /><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">mydesktopservice.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">mydesktopqos.exe</span></li><li data-section-id="1vtd1ux" data-start="1262" data-end="1470"><strong data-start="1264" data-end="1305">Office and Productivity Applications:</strong><br data-start="1305" data-end="1308" /><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">excel.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">infopath.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">msaccess.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">mspub.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">onenote.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">outlook.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">powerpnt.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">visio.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">winword.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">wordpad.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">notepad.exe</span></li><li data-section-id="9znorr" data-start="1472" data-end="1565"><strong data-start="1474" data-end="1510">Communication and Email Clients:</strong><br data-start="1510" data-end="1513" /><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">thunderbird.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">tbirdconfig.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">thebat.exe</span></li><li data-section-id="lhhzff" data-start="1567" data-end="1627"><strong data-start="1569" data-end="1611">Gaming and Miscellaneous Applications:</strong><br data-start="1611" data-end="1614" /><span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">steam.exe</span></li></ul>								</div>
				</div>
				<div class="elementor-element elementor-element-660855d elementor-widget__width-initial elementor-widget elementor-widget-heading" data-id="660855d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Self-Deletion via NTFS
</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-a7a1673 elementor-widget elementor-widget-text-editor" data-id="a7a1673" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The sample performs a self-deletion setup before the encryption stage to reduce its on-disk visibility during execution. It retrieves its own executable path and renames itself to an <span style="text-decoration: underline;">NTFS alternate data stream</span> by appending <span style="text-decoration: underline;"><strong>&#8220;:payload&#8221;</strong></span>, effectively hiding the file from standard directory listings. It then marks the file as delete-pending using the native API <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">NtSetInformationFile</span>, ensuring it will be removed once all handles are closed. By doing this early, the malware minimizes the chances of being detected or recovered during its encryption activity.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-d4a30b9 elementor-widget elementor-widget-image" data-id="d4a30b9" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="708" src="/wp-content/uploads/2026/05/7-self_deletion-768x708.png" class="attachment-medium_large size-medium_large wp-image-15897" alt="" srcset="/wp-content/uploads/2026/05/7-self_deletion-768x708.png 768w, /wp-content/uploads/2026/05/7-self_deletion-300x277.png 300w, /wp-content/uploads/2026/05/7-self_deletion-1024x944.png 1024w, /wp-content/uploads/2026/05/7-self_deletion-150x138.png 150w, /wp-content/uploads/2026/05/7-self_deletion.png 1063w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (8) – Self-deletion setup using NTFS alternate data streams</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-c3e29db elementor-widget elementor-widget-heading" data-id="c3e29db" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Encryption Routine</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-ad9de5a elementor-widget elementor-widget-text-editor" data-id="ad9de5a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Payload ransomware uses a hybrid encryption scheme, which combines both asymmetric and
symmetric cryptography. This design is commonly seen in Babuk-like ransomware families. The goal is
to make file recovery impossible without the attacker’s private key.
								</div>
				</div>
				<div class="elementor-element elementor-element-55427d2 elementor-widget elementor-widget-image" data-id="55427d2" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="931" src="/wp-content/uploads/2026/05/8-attack_summary-768x931.png" class="attachment-medium_large size-medium_large wp-image-15902" alt="" srcset="/wp-content/uploads/2026/05/8-attack_summary-768x931.png 768w, /wp-content/uploads/2026/05/8-attack_summary-247x300.png 247w, /wp-content/uploads/2026/05/8-attack_summary-845x1024.png 845w, /wp-content/uploads/2026/05/8-attack_summary-124x150.png 124w, /wp-content/uploads/2026/05/8-attack_summary.png 1139w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (9) – File encryption workflow</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-8571775 elementor-widget elementor-widget-text-editor" data-id="8571775" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h4>Cryptographic Initialization</h4>								</div>
				</div>
				<div class="elementor-element elementor-element-1fb55f4 elementor-widget elementor-widget-text-editor" data-id="1fb55f4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Before initiating file encryption, the malware sets up its cryptographic environment. It contains <b>a hardcoded public key</b> inside the binary, stored as a <b>Base64</b> string.<br /><br />For file encryption, payload uses <b>ChaCha20</b>, which is a fast symmetric encryption algorithm. To improve performance, it checks the CPU features of the system. If the CPU supports <b>AVX2</b>, a CPU instruction set that processes more data in parallel using 256-bit registers, making it faster for heavy operations, or <b>SSE2</b>, an older instruction set that uses 128-bit registers and provides a lower level of acceleration compared to <b>AVX2</b>, it uses an optimized version of <b>ChaCha20</b>. If neither is available, the malware falls back to a basic version of <b>ChaCha20</b>. This allows the encryption to run efficiently across different machines.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-4c5ca84 elementor-widget elementor-widget-image" data-id="4c5ca84" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="692" height="397" src="/wp-content/uploads/2026/05/9-Encrypt_publ_cpu_features.png" class="attachment-medium_large size-medium_large wp-image-15904" alt="" srcset="/wp-content/uploads/2026/05/9-Encrypt_publ_cpu_features.png 692w, /wp-content/uploads/2026/05/9-Encrypt_publ_cpu_features-300x172.png 300w, /wp-content/uploads/2026/05/9-Encrypt_publ_cpu_features-150x86.png 150w" sizes="(max-width: 692px) 100vw, 692px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (10) – Optimized ChaCha20 setup using CPU feature detection</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-5801b80 elementor-widget elementor-widget-text-editor" data-id="5801b80" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>During file processing, a fresh <span style="text-decoration: underline;">per-file key</span> is generated using secure randomness (<strong>CryptGenRandom</strong>), producing both a 32-byte private key and a 12-byte <strong>ChaCha20</strong> nonce. This key is then used in a <strong>Curve25519</strong> key exchange, deriving a shared secret with the embedded public key. The resulting value is used as the <strong>ChaCha20</strong> encryption key, while the public component and nonce are later written to the file footer for decryption.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-6e514c9 elementor-widget elementor-widget-image" data-id="6e514c9" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="156" src="/wp-content/uploads/2026/05/10-key_generation-768x156.png" class="attachment-medium_large size-medium_large wp-image-15906" alt="" srcset="/wp-content/uploads/2026/05/10-key_generation-768x156.png 768w, /wp-content/uploads/2026/05/10-key_generation-300x61.png 300w, /wp-content/uploads/2026/05/10-key_generation-1024x208.png 1024w, /wp-content/uploads/2026/05/10-key_generation-150x30.png 150w, /wp-content/uploads/2026/05/10-key_generation.png 1515w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (11) – Per-file key generation and shared secret creation</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-ceec304 elementor-widget elementor-widget-heading" data-id="ceec304" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Target File Selection and Filtering</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-25dae7d elementor-widget elementor-widget-text-editor" data-id="25dae7d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>After initializing the cryptographic context, It determines its execution path based on argument . If a specific target path is provided , the ransomware skips system-wide discovery and directly inserts this path into its processing queue.</p><p>Otherwise, it enumerates all available drives , optionally excluding network shares depending on configuration.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-90ded10 elementor-widget elementor-widget-text-editor" data-id="90ded10" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>It also applies multiple filtering rules based on the configuration to determine which <span style="text-decoration: underline;">files and directories should be excluded from processing</span>. These exclusions are designed to avoid <strong>system instability and prevent self-damage .</strong></p>								</div>
				</div>
				<div class="elementor-element elementor-element-3cb6497 elementor-widget elementor-widget-heading" data-id="3cb6497" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h6 class="elementor-heading-title elementor-size-default">Excluded File Extensions</h6>				</div>
				</div>
				<div class="elementor-element elementor-element-b5b566d elementor-widget elementor-widget-text-editor" data-id="b5b566d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p data-start="1139" data-end="1175">Payload skips files associated with:</p>
<ul data-start="1176" data-end="1642">
 	<li data-section-id="6unpmb" data-start="1176" data-end="1228">Executables and libraries (<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.exe</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.dll</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.sys</span>)</li>
 	<li data-section-id="1ta283" data-start="1229" data-end="1275">Drivers and boot components (<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.drv</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.efi</span>)</li>
 	<li data-section-id="1ytkvxy" data-start="1276" data-end="1350">Scripts and administrative tools (<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.bat</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.cmd</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.ps1</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.vbs</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.js</span>)</li>
 	<li data-section-id="1l7c54" data-start="1351" data-end="1418">Configuration and registry files (<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.ini</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.inf</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.reg</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.xml</span>)</li>
 	<li data-section-id="xob4sw" data-start="1419" data-end="1461">Logs and event records (<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.log</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.evtx</span>)</li>
 	<li data-section-id="abrm3t" data-start="1462" data-end="1520">Virtualization and disk images (<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.vhd</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.vhdx</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.wim</span>)</li>
 	<li data-section-id="19u5wbn" data-start="1521" data-end="1570">Fonts and UI resources (<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.ttf</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.otf</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.mui</span>)</li>
 	<li data-section-id="wl5k6z" data-start="1571" data-end="1642">Temporary and recovery-related files (<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.tmp</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.blf</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.regtrans-ms</span>)</li>
</ul>								</div>
				</div>
				<div class="elementor-element elementor-element-be5d0a3 elementor-widget elementor-widget-text-editor" data-id="be5d0a3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h6>Excluded System Filenames</h6>								</div>
				</div>
				<div class="elementor-element elementor-element-a74dc58 elementor-widget elementor-widget-text-editor" data-id="a74dc58" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<ul>
  <li><strong>Boot and Startup Configuration Files:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">autorun.inf</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">boot.ini</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">bootfont.bin</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">bootsect.bak</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">bootmgr</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">bootmgr.efi</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">bootmgfw.efi</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ntldr</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">boot.sdi</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">config.sys</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">system.ini</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">win.ini</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ntbootdd.sys</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">bootstat.dat</span></li>
  <li><strong>System and User Profile Files:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">desktop.ini</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ntuser.dat</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ntuser.dat.log</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ntuser.dat.log1</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ntuser.dat.log2</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ntuser.ini</span></li>
  <li><strong>Cache and Index Files:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">thumbs.db</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">iconcache.db</span></li>
  <li><strong>Memory Management and Virtual Memory Files:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">pagefile.sys</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">hiberfil.sys</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">swapfile.sys</span></li>
  <li><strong>Recovery and Setup Configuration Files:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">recovery.ini</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">setup.ini</span></li>
</ul>								</div>
				</div>
				<div class="elementor-element elementor-element-416c838 elementor-widget elementor-widget-heading" data-id="416c838" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h6 class="elementor-heading-title elementor-size-default">Excluded Directories :</h6>				</div>
				</div>
				<div class="elementor-element elementor-element-b3ecde3 elementor-widget elementor-widget-text-editor" data-id="b3ecde3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<ul data-start="30" data-end="441" data-is-last-node="" data-is-only-node="">
 	<li data-section-id="uagiej" data-start="30" data-end="97"><strong data-start="32" data-end="57">User and System Data:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">AppData</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ProgramData</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">All Users</span></li>
 	<li data-section-id="1k7qpnc" data-start="98" data-end="166"><strong data-start="100" data-end="131">Windows System Directories:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Windows</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">windows.old</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Boot</span></li>
 	<li data-section-id="gt8qg5" data-start="167" data-end="248"><strong data-start="169" data-end="204">Recycle and Recovery Locations:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">$Recycle.Bin</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">#recycle</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">$WinREAgent</span></li>
 	<li data-section-id="1bjwz05" data-start="249" data-end="385"><strong data-start="251" data-end="281">Browsers and Applications:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Google</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Opera</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Opera Software</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Mozilla</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Mozilla Firefox</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Internet Explorer</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Tor Browser</span></li>
 	<li data-section-id="utd3qw" data-start="386" data-end="441" data-is-last-node=""><strong data-start="388" data-end="414">Development and Tools:</strong> <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.vs</span>, <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">WindowsPowerShell</span></li>
</ul>								</div>
				</div>
				<div class="elementor-element elementor-element-af1c129 elementor-widget elementor-widget-heading" data-id="af1c129" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">File Encryption</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-5bda15f elementor-widget elementor-widget-text-editor" data-id="5bda15f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Payload then builds a global queue of target files and processes them using multiple threads to speed up encryption. It detects the number of CPU cores and creates a thread pool of about twice (2X) that number, allowing heavy parallel execution.</p><p>Each thread continuously pulls <strong>a file path</strong> from the shared queue and encrypts them independently, which helps quickly spread encryption across the system without being limited by a single execution flow.</p><p>For each file, Payload opens it, reads the content into memory, encrypts it in fixed <span style="text-decoration: underline;">(1 MB)</span> chunks using <strong>ChaCha20</strong>, and writes the encrypted data back to the same location. For large files , it applies a partial encryption strategy where only part of the file is processed <span style="text-decoration: underline;">(file size / 5)</span>, which speeds up execution while still rendering the file unusable.</p><p>After encryption, It finalizes the file by <strong>appending a structured metadata footer</strong> and renaming the file with the extension <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">.payload</span>.<br />The footer is required for attacker-side decryption and contains : a per-file <strong>Curve25519</strong> public key, the <strong>ChaCha20</strong> nonce used during encryption, some unused or stack-residue bytes, and a static branding marker identifying the ransomware family. This footer is obfuscated using <strong>RC4</strong> routine with the hardcoded key &#8220;<span style="text-decoration: underline;"><strong>FBI</strong></span>&#8220;.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-4d7010a elementor-widget elementor-widget-image" data-id="4d7010a" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="791" src="/wp-content/uploads/2026/05/12-enc_footer-2-768x791.png" class="attachment-medium_large size-medium_large wp-image-15933" alt="" srcset="/wp-content/uploads/2026/05/12-enc_footer-2-768x791.png 768w, /wp-content/uploads/2026/05/12-enc_footer-2-291x300.png 291w, /wp-content/uploads/2026/05/12-enc_footer-2-994x1024.png 994w, /wp-content/uploads/2026/05/12-enc_footer-2-146x150.png 146w, /wp-content/uploads/2026/05/12-enc_footer-2.png 1018w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (13) – Encrypted File footer structure appended </figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-0bb5b7f elementor-widget elementor-widget-heading" data-id="0bb5b7f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Cleanup</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-39e98aa elementor-widget elementor-widget-text-editor" data-id="39e98aa" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									After appending the footer, the file handle is closed and all temporary cryptographic buffers are securely
cleared from memory. This includes wiping key material, nonce data, and intermediate encryption
states, reducing forensic recovery opportunities and minimizing in-memory traces of the encryption
process.								</div>
				</div>
				<div class="elementor-element elementor-element-1184546 elementor-widget elementor-widget-heading" data-id="1184546" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default">Ransom Note</h4>				</div>
				</div>
				<div class="elementor-element elementor-element-58d76cc elementor-widget elementor-widget-text-editor" data-id="58d76cc" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<div style="text-align: left; margin-top: 0.5em; margin-bottom: 0.5em;">Payload hides its ransom note inside the binary using Base64 encoding and RC4 encryption. It embeds an encoded decryption key alongside the encrypted note.</div><div style="text-align: left; margin-top: 0.5em; margin-bottom: 0.5em;">After decrypting the content, Payload creates the ransom note file named <span style="font-family: monospace; font-weight: bold;">RECOVER_payload.txt</span> and saves it directly in the root directory of the <span style="font-weight: bold;">C:\ drive</span>. Placing the file in this location ensures high visibility .</div><div style="text-align: left; margin-top: 0.5em; margin-bottom: 0.5em;">After dropping the file, Payload clears the RC4 key and related data from memory, reducing traces in memory.</div><p>The decrypted ransom note : </p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-6058ffa elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="6058ffa" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42557da" data-id="42557da" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c44d313 elementor-widget elementor-widget-code-highlight" data-id="c44d313" data-element_type="widget" data-e-type="widget" data-widget_type="code-highlight.default">
				<div class="elementor-widget-container">
							<div class="prismjs-default copy-to-clipboard ">
			<pre data-line="" class="highlight-height language-html line-numbers">
				<code readonly="true" class="language-html">
					<xmp>Welcome to Payload!

The next 72 hours will determine certain factors in the life of your company: 
the publication of the file tree, which we have done safely and unnoticed by all of you, 
and the publication of your company's full name on our luxurious blog.
NONE of this will happen if you contact us within this time frame and our negotiations are favorable.

We are giving you 240 hours to:
1. familiarize yourself with our terms and conditions,
2. begin negotiations with us,
3. and successfully conclude them.
The timer may be extended if we deem it necessary (only in the upward direction).
Once the timer expires, all your information will be posted on our blog.

ATTENTION!
Contacting authorities, recovery agencies, etc. WILL NOT HELP YOU!
At best, you will waste your money and lose some of your files, which they will carefully take to restore!
You should also NOT turn off, restart, or put your computer to sleep.
In the future, such mistakes can make the situation more expensive and the files will not be restored!
We DO NOT recommend doing anything with the files, as this will make it difficult to recover them later!

When contacting us:
you can request up to 3 files from the file tree, 
you can request up to 3 encrypted files up to 15 megabytes 
so that we can decrypt them and you understand that we can do it.

First, you should install Tor Browser:
1. Open: https://www.torproject.org/download
2. Choose your OS and select it
3. Run installer
4. Enjoy!

In countries where tor is prohibited, we recommend using bridges, 
which you can take: https://bridges.torproject.org/

You can read:
http://payloadrz5yw227brtbvdqpnlhq3rdcdekdnn3rgucbcdeawq2v6vuyd.onion (Tor)

To start negotiations, go to http://payloadynyvabjacbun4uwhmxc7yvdzorycslzmnleguxjn7glahsvqd.onion and login:
User: hEg62n6K
Password: iuThQRYm5D6HRSF4

Your ID to verify: 1Q6NsTqfT023CTcDSFCt4oyCNKOyochF

</xmp>
				</code>
			</pre>
		</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-88edd82 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="88edd82" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7541d8b" data-id="7541d8b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f5681d6 elementor-widget elementor-widget-heading" data-id="f5681d6" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Indicators of Compromise</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-d8a186c elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="d8a186c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19597cc" data-id="19597cc" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-db662ed elementor-widget elementor-widget-text-editor" data-id="db662ed" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<style>
.ioc-table-container {
  width: 100%;
  margin: 20px 0;
  overflow-x: auto;
}

.ioc-table {
  width: 100%;
  border-collapse: collapse;
  font-family: Arial, sans-serif;
  table-layout: fixed;
}

.ioc-table colgroup col:first-child {
  width: 25%;
}

.ioc-table colgroup col:last-child {
  width: 75%;
}

.ioc-table th,
.ioc-table td {
  border: 1px solid #ddd;
  padding: 12px;
  text-align: left;
  vertical-align: top;
  word-wrap: break-word;
  overflow-wrap: break-word;
}

.ioc-table th {
  background-color: #31625A;
  color: #ffffff;
  font-weight: bold;
}

.ioc-table tr:nth-child(even) td {
  background-color: #f9f9f9;
}
</style>

<div class="ioc-table-container">
<table class="ioc-table">
<colgroup>
  <col />
  <col />
</colgroup>
<thead>
<tr>
<th>IOC Type</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>Windows Variant Hash</td>
<td>1ca67af90400ee6cbbd42175293274a0f5dc05315096cb2e214e4bfe12ffb71f</td>
</tr>
<tr>
<td>Linux Variant Hash</td>
<td>bed8d1752a12e5681412efbb8283910857f7c5c431c2d73f9bbc5b379047a316</td>
</tr>
<tr>
<td>Mutex</td>
<td>MakeAmericaGreatAgain</td>
</tr>
<tr>
<td>Log File</td>
<td>C:\payload.log</td>
</tr>
<tr>
<td>Ransom Note</td>
<td>C:\RECOVER_payload.txt</td>
</tr>
<tr>
<td>Ransomware Infrastructure (Tor-based)</td>
<td>
payloadynyvabjacbun4uwhmxc7yvdzorycslzmnleguxjn7glahsvqd[.]onion<br>
payloadrz5yw227brtbvdqpnlhq3rdcdekdnn3rgucbcdeawq2v6vuyd[.]onion
</td>
</tr>
</tbody>
</table>
</div>								</div>
				</div>
				<div class="elementor-element elementor-element-a05e43e elementor-widget elementor-widget-heading" data-id="a05e43e" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Linux variant</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-171b850 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="171b850" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e8d5b0b" data-id="e8d5b0b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7576762 elementor-widget elementor-widget-text-editor" data-id="7576762" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The Windows and Linux variants are similar in their core ransomware design, especially in their cryptographic scheme and overall execution model, while differing mainly in platform-specific implementation and operational tooling.</p><p>The Linux binary is a lightweight (~39 KB) stripped ELF specifically engineered for VMware ESXi infrastructure. It leverages <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">libxml2.so.2</span> to parse <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">/etc/vmware/hostd/vmInventory.xml</span> , allowing it to enumerate virtual machine disk paths and encrypt hosted workloads directly.</p><p>In contrast to the Windows variant, which includes extensive anti-recovery and anti-forensics capabilities such as shadow copy deletion, service termination, event log wiping, and optional self-deletion, the Linux/ESXi version is significantly more minimal and focused purely on encryption efficiency in hypervisor environments.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-a3d6d27 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a3d6d27" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-47218f1" data-id="47218f1" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-0b2f7c5 elementor-widget elementor-widget-heading" data-id="0b2f7c5" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Conclusion</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-1ee3b5a elementor-widget__width-initial elementor-widget elementor-widget-text-editor" data-id="1ee3b5a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Payload ransomware uses a hybrid encryption scheme combining <strong>Curve25519</strong> for key exchange and <strong>ChaCha20</strong> for fast file encryption. Each file is encrypted with a unique <span style="text-decoration: underline;">per-file key</span>, and a footer is appended containing the data required for decryption. This footer is obfuscated using <strong>RC4</strong> with a static key.</p><p>The sample is highly configurable through command-line arguments, allowing operators to control targeting, disable recovery mechanisms, and enable anti-forensic actions.</p><p>Overall, Payload operates as <span style="text-decoration: underline;">an offline ransomware</span>, as all encryption, key generation, and file processing are performed locally on the victim machine. It does not use a C2 server for key exchange or data exfiltration.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-0629b28 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="0629b28" data-element_type="widget" data-e-type="widget" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-6058321 elementor-widget elementor-widget-heading" data-id="6058321" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">References </h2>				</div>
				</div>
				<div class="elementor-element elementor-element-569badd elementor-widget elementor-widget-text-editor" data-id="569badd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<ul><li>https://www.ransomware.live/group/payload</li><li>https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/payload</li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://egfincirt-wpn.azurewebsites.net/payload-ransomware/">Payload Ransomware: In-depth technical analysis</a> appeared first on <a href="https://egfincirt-wpn.azurewebsites.net">EG-FinCIRT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Remcos RAT Operations: How Attackers Gain and Maintain Control</title>
		<link>https://egfincirt-wpn.azurewebsites.net/remcos-rat-operations-how-attackers-gain-and-maintain-control/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 12:27:09 +0000</pubDate>
				<category><![CDATA[blogs]]></category>
		<category><![CDATA[Malware Analysis]]></category>
		<guid isPermaLink="false">https://www.egfincirt.org.eg/?p=15030</guid>

					<description><![CDATA[<p>March 5, 2026 3:27 pm Malware Analysis Remcos in nutshell Remcos is a Windows remote access trojan (RAT) that was originally sold as a legitimate tool for remote administration and management, but it has been widely abused by cybercriminals and threat groups in phishing and malware campaigns to infect systems across many sectors, including government, [&#8230;]</p>
<p>The post <a href="https://egfincirt-wpn.azurewebsites.net/remcos-rat-operations-how-attackers-gain-and-maintain-control/">Remcos RAT Operations: How Attackers Gain and Maintain Control</a> appeared first on <a href="https://egfincirt-wpn.azurewebsites.net">EG-FinCIRT</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="15030" class="elementor elementor-15030" data-elementor-settings="{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-7390250 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7390250" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-33cfd3a" data-id="33cfd3a" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-756311d elementor-widget elementor-widget-spacer" data-id="756311d" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-8504196 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="8504196" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0e597a5" data-id="0e597a5" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-abcf36b elementor-widget elementor-widget-image" data-id="abcf36b" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="768" height="512" src="/wp-content/uploads/2026/03/remcos-image.jpg" class="attachment-medium_large size-medium_large wp-image-15416" alt="" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-60a061a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="60a061a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-601424d" data-id="601424d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-204333d elementor-widget elementor-widget-bdt-post-info" data-id="204333d" data-element_type="widget" data-e-type="widget" data-widget_type="bdt-post-info.default">
				<div class="elementor-widget-container">
							<ul class="elementor-inline-items bdt-post-info elementor-icon-list-items">
					<li class="bdt-icon-list-item elementor-icon-list-item elementor-repeater-item-46a1cff elementor-inline-item" itemprop="datePublished">
							<a href="https://egfincirt-wpn.azurewebsites.net/2026/03/05/">
											<span class="elementor-icon-list-icon">
									<i aria-hidden="true" class="fas fa-calendar"></i>							</span>
								<span class="elementor-icon-list-text bdt-post-info__item bdt-post-info__item--type-date">
										March 5, 2026					</span>
									</a>
					</li>
				<li class="bdt-icon-list-item elementor-icon-list-item elementor-repeater-item-eeb5fbd elementor-inline-item">
										<span class="elementor-icon-list-icon">
									<i aria-hidden="true" class="far fa-clock"></i>							</span>
								<span class="elementor-icon-list-text bdt-post-info__item bdt-post-info__item--type-time">
										3:27 pm					</span>
							</li>
				<li class="bdt-icon-list-item elementor-icon-list-item elementor-repeater-item-bbbb0a6 elementor-inline-item" itemprop="about">
										<span class="elementor-icon-list-icon">
									<i aria-hidden="true" class="fas fa-virus"></i>							</span>
								<span class="elementor-icon-list-text bdt-post-info__item bdt-post-info__item--type-terms">
										<span class="bdt-post-info__terms-list">
					<span class="bdt-post-info__terms-list-item">Malware Analysis</span>				</span>
					</span>
							</li>
				</ul>
				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-ae5e833 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="ae5e833" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f777935" data-id="f777935" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-88ca4a0 elementor-widget elementor-widget-heading" data-id="88ca4a0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Remcos in nutshell</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-c67696f elementor-widget elementor-widget-text-editor" data-id="c67696f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Remcos is a Windows remote access trojan (RAT) that was originally sold as a legitimate tool for remote administration and management, but it has been widely abused by cybercriminals and threat groups in phishing and malware campaigns to infect systems across many sectors, including government, healthcare, financial services, banking, and other critical industries .</p><p><span style="font-style: inherit; font-weight: inherit;">Remcos gives attackers full remote control over an infected system, allowing them to execute commands, manage files, capture keystrokes and screenshots, record audio and video, and steal stored credentials . Because of these capabilities and its persistence, Remcos is often used not only for espionage or system takeover but also for financially driven objectives: attackers can covertly collect sensitive data such as login credentials, banking details, and other personal or business information and then use it to take over accounts, commit fraud, perform unauthorized transactions, steal money, or sell the stolen information for profit.</span></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c711e53 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="c711e53" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41d8b20" data-id="41d8b20" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3f13ae6 elementor-widget elementor-widget-heading" data-id="3f13ae6" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Infection flow</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-bc392d5 elementor-widget elementor-widget-text-editor" data-id="bc392d5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p data-start="117" data-end="324">The initial stage of the infection chain was first observed on <span data-start="180" data-end="200">2025-12-16 (UTC)</span> according to VirusTotal. The sample is a malicious <strong data-start="252" data-end="271">JavaScript (JS)</strong> file with a size of <strong data-start="292" data-end="321">8.84 MB </strong>.</p><ul data-start="329" data-end="470"><li data-start="329" data-end="411"><p data-start="331" data-end="411"><strong data-start="331" data-end="342">SHA256:</strong> <code data-start="343" data-end="409">e0a69eff836709cbefee1079d647d50d55f558e5f8c7bf18a8056361cd5116f3</code></p></li><li data-start="414" data-end="468"><p data-start="416" data-end="468"><strong data-start="416" data-end="436">Detection Ratio:</strong> <b>20/63</b> at the time of analysis</p></li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-142395e elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="142395e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b41101" data-id="2b41101" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-cee9f91 elementor-widget elementor-widget-image" data-id="cee9f91" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="378" src="/wp-content/uploads/2026/03/1_vt-768x378.png" class="attachment-medium_large size-medium_large wp-image-15751" alt="" srcset="/wp-content/uploads/2026/03/1_vt-768x378.png 768w, /wp-content/uploads/2026/03/1_vt-300x148.png 300w, /wp-content/uploads/2026/03/1_vt-1024x503.png 1024w, /wp-content/uploads/2026/03/1_vt-150x74.png 150w, /wp-content/uploads/2026/03/1_vt-1536x755.png 1536w, /wp-content/uploads/2026/03/1_vt.png 1920w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (1) - Sample on VirusTotal</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-13fadc1 elementor-widget elementor-widget-text-editor" data-id="13fadc1" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The analyzed sample is heavily obfuscated JavaScript that drops and executes multi-stage payloads. Below, a diagram shows these stages.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-96959d3 elementor-widget elementor-widget-image" data-id="96959d3" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="432" src="/wp-content/uploads/2026/03/2_flow-768x432.png" class="attachment-medium_large size-medium_large wp-image-15753" alt="" srcset="/wp-content/uploads/2026/03/2_flow-768x432.png 768w, /wp-content/uploads/2026/03/2_flow-300x169.png 300w, /wp-content/uploads/2026/03/2_flow-1024x576.png 1024w, /wp-content/uploads/2026/03/2_flow-150x84.png 150w, /wp-content/uploads/2026/03/2_flow-1536x864.png 1536w, /wp-content/uploads/2026/03/2_flow.png 1748w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (2) - Infection Flow​</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-32451d9 elementor-widget elementor-widget-heading" data-id="32451d9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default"><b>Stage 1 - Analysis of obfuscated Java Script</b></h4>				</div>
				</div>
				<div class="elementor-element elementor-element-329b9ae elementor-widget elementor-widget-text-editor" data-id="329b9ae" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The first stage of the infection chain is implemented in a large <b>JavaScript </b>file that is highly obfuscated and mainly contains junk, unused variables, and functions that do not affect execution. </p><p><span style="font-style: inherit; font-weight: inherit;">One noticeable technique is the repeated concatenation of the same unclear string to a single variable many times, which intentionally increases the script size and hides the real payload inside a large amount of repetitive data.</span></p>								</div>
				</div>
				<div class="elementor-element elementor-element-c183702 elementor-widget elementor-widget-image" data-id="c183702" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="604" src="/wp-content/uploads/2026/03/3_js_obf_1-768x604.png" class="attachment-medium_large size-medium_large wp-image-15755" alt="" srcset="/wp-content/uploads/2026/03/3_js_obf_1-768x604.png 768w, /wp-content/uploads/2026/03/3_js_obf_1-300x236.png 300w, /wp-content/uploads/2026/03/3_js_obf_1-1024x805.png 1024w, /wp-content/uploads/2026/03/3_js_obf_1-150x118.png 150w, /wp-content/uploads/2026/03/3_js_obf_1-1536x1207.png 1536w, /wp-content/uploads/2026/03/3_js_obf_1-2048x1609.png 2048w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (3) - Obfuscated JS </figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-33645d3 elementor-widget__width-initial elementor-widget elementor-widget-text-editor" data-id="33645d3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="font-size: 1rem;">In addition to this, it hides meaningful strings inside large arrays and retrieves them dynamically at runtime using helper functions with calculated indexes and also uses confusing execution structures, including unnecessary loops and arithmetic expressions. Also defines several functions that appear to move execution forward or backward, as well as unused prototypes that are never actually invoked .</span></p><p><span style="font-style: inherit; font-weight: inherit;">After the deobfuscation, the script first checks whether a specific file with a random-looking name already exists under </span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">C:\Users\Public\Libraries\</span><span style="font-style: inherit; font-weight: inherit;">.</span></p><p>If the file does not exist, the malware copies itself into that directory, and then, to maintain persistence, it creates a <b>scheduled task</b> using the<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">schtasks</span>utility.</p><p>This causes the script to be executed every 10 minutes, guaranteeing re-execution even after a reboot. The task is created via<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;"><br />cmd.exe</span>and launched using <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">WScript.Shell.Run</span>,which is a common <b>LOLBins-based persistence</b> technique where attackers abuse legitimate Windows binaries or scripts (“Living off the Land Binaries”) to perform malicious actions without dropping new executables, helping them evade security detection.</p><p> </p>								</div>
				</div>
				<div class="elementor-element elementor-element-3b39b07 elementor-widget elementor-widget-image" data-id="3b39b07" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="329" src="/wp-content/uploads/2026/03/4_js_1-768x329.png" class="attachment-medium_large size-medium_large wp-image-15757" alt="" srcset="/wp-content/uploads/2026/03/4_js_1-768x329.png 768w, /wp-content/uploads/2026/03/4_js_1-300x129.png 300w, /wp-content/uploads/2026/03/4_js_1-1024x439.png 1024w, /wp-content/uploads/2026/03/4_js_1-150x64.png 150w, /wp-content/uploads/2026/03/4_js_1-1536x658.png 1536w, /wp-content/uploads/2026/03/4_js_1-2048x878.png 2048w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (4) - Clean JS</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-bd1738c elementor-widget elementor-widget-text-editor" data-id="bd1738c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The script then drops three files in the same directory:<span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">C:\Users\Public\Libraries\</span>. Each file is reconstructed from obfuscated <span style="font-style: inherit; font-weight: inherit;">data  &#8211; the strings are reversed, cleaned of special characters (</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">~</span><span style="font-style: inherit; font-weight: inherit;">,</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">!</span><span style="font-style: inherit; font-weight: inherit;">,</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">#</span><span style="font-style: inherit; font-weight: inherit;">,</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">$</span><span style="font-style: inherit; font-weight: inherit;">,</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">%</span><span style="font-style: inherit; font-weight: inherit;">,</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">^</span><span style="font-style: inherit; font-weight: inherit;">,</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">&amp;</span><span style="font-style: inherit; font-weight: inherit;">,</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">*</span><span style="font-style: inherit; font-weight: inherit;">,</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">&gt;</span><span style="font-style: inherit; font-weight: inherit;">),and written to disk using</span><span style="font-style: inherit; font-weight: inherit; text-wrap-mode: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">ADODB.Stream</span><span style="font-style: inherit; font-weight: inherit;">.</span></p><p>The decoding process can be reproduced in CyberChef using <a href="https://cyberchef.io/#recipe=Split('%5C%5C','%5C%5Cn')Reverse('Character')Split('~','')Split('!','')Split('%23','')Split('%24','')Split('%25','')Split('%5E','')Split('%26','')Split('*','')Split('%3E','')From_Base64('A-Za-z0-9%2B/%3D',true)" target="_blank" rel="noopener">this</a> recipe that reverses the string and removes unwanted characters.</p><p>The dropped files as following :</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-79a8d8a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="79a8d8a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d068bb" data-id="8d068bb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c1a09b8 elementor-widget elementor-widget-text-editor" data-id="c1a09b8" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<style>
.malware-table-container {
  width: 100%;
  overflow-x: auto;
  margin: 20px 0;
}

.malware-table {
  min-width: 800px;
  border-collapse: collapse;
  font-family: Arial, sans-serif;
  table-layout: auto;
}

.malware-table th,
.malware-table td {
  border: 1px solid #ddd;
  padding: 12px;
  text-align: left;
  vertical-align: top;
}

.malware-table th {
  background-color: #31625A;
  color: #ffffff;
  font-weight: bold;
}

.malware-table tr:nth-child(even) td {
  background-color: #f9f9f9;
}

.malware-table td.description {
  white-space: normal;
  max-width: 450px;
}

.file-cell {
  width: 250px;
  vertical-align: top;
}

.sub-label {
  font-weight: bold;
  display: block;
  margin-bottom: 4px;
}
</style>

<div class="malware-table-container">
  <table class="malware-table">
    <thead>
      <tr>
        <th>Dropped File</th>
        <th>Description</th>
      </tr>
    </thead>
    <tbody>
      
      <tr>
        <td class="file-cell">
          <span class="sub-label">Filename:</span> WTZTFTBNJIPTWLHJTGXIXAYZECKKCFKKMBWVLGGVHQGONDHQVYLZUJN<br>
          <span class="sub-label">Hash:</span> 6bed90bbdb00ffb3704410c6a7b16751cd8fdc100acf47130783477750c33c8b
        </td>
        <td class="description">Obfuscated Lua script; executed by the loader as a command-line argument</td>
      </tr>

      
      <tr>
        <td class="file-cell">
          <span class="sub-label">Filename:</span> WTZTFTBNJIPTWLHJTGXIXAYZECKKCFKKMBWVLGGVHQGONDHQVYLZUJN.exe<br>
          <span class="sub-label">Hash:</span> 5343326fb0b4f79c32276f08ffcc36bd88cde23aa19962bd1e8d8b80f5d33953
        </td>
        <td class="description">LuaJIT-based loader; executed first and receives the Lua script as input</td>
      </tr>

      
      <tr>
        <td class="file-cell">
          <span class="sub-label">Filename:</span> lua51.dll
        </td>
        <td class="description">LuaJIT runtime library used by the loader to execute the Lua script</td>
      </tr>
    </tbody>
  </table>
</div>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-451e86a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="451e86a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3101a36" data-id="3101a36" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8af60ad elementor-widget elementor-widget-heading" data-id="8af60ad" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default"><b>Stage 2 - LUA</b></h4>				</div>
				</div>
				<div class="elementor-element elementor-element-95da3df elementor-widget elementor-widget-text-editor" data-id="95da3df" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>This stage is written in <b>Lua</b>, a lightweight, high-level scripting language designed for embedded use. Lua is famous for its simplicity, speed, and flexibility, and is commonly employed for scripting, automation, and integration into other applications thanks to its compact footprint and efficient performance.</p><p>Analyzing the Script it’s an <b>obfuscated LuaJIT-based</b> loader that leverages <u>FFI </u>(Foreign Function Interface), a built‑in feature that allows pure Lua code to directly call native C functions and work with C data structures, without needing custom bindings or external DLL wrappers. In this case, FFI is abused to enable low‑level process and memory manipulation from within Lua.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-ca1c9be elementor-widget elementor-widget-image" data-id="ca1c9be" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="308" src="/wp-content/uploads/2026/03/clean_lua-768x308.png" class="attachment-medium_large size-medium_large wp-image-15759" alt="" srcset="/wp-content/uploads/2026/03/clean_lua-768x308.png 768w, /wp-content/uploads/2026/03/clean_lua-300x120.png 300w, /wp-content/uploads/2026/03/clean_lua-1024x411.png 1024w, /wp-content/uploads/2026/03/clean_lua-150x60.png 150w, /wp-content/uploads/2026/03/clean_lua-1536x617.png 1536w, /wp-content/uploads/2026/03/clean_lua-2048x822.png 2048w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (5) - Clean lua</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-e838966 elementor-widget elementor-widget-text-editor" data-id="e838966" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The malware targets <u>colorcpl.exe</u>, a legitimate Windows Control Panel applet, as its process injection victim. The loader spawns the trusted Windows process and injects a decoded payload via opening the target process with full access, allocates executable memory, writes the decoded payload into it, and executes it via a remote thread.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e9f3f2b elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e9f3f2b" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c4f6481" data-id="c4f6481" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-48b902d elementor-widget elementor-widget-image" data-id="48b902d" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="419" src="/wp-content/uploads/2026/03/lua_2-768x419.png" class="attachment-medium_large size-medium_large wp-image-15761" alt="" srcset="/wp-content/uploads/2026/03/lua_2-768x419.png 768w, /wp-content/uploads/2026/03/lua_2-300x163.png 300w, /wp-content/uploads/2026/03/lua_2-1024x558.png 1024w, /wp-content/uploads/2026/03/lua_2-150x82.png 150w, /wp-content/uploads/2026/03/lua_2-1536x837.png 1536w, /wp-content/uploads/2026/03/lua_2-2048x1116.png 2048w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (6) - Process Injection</figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-22e2d09 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="22e2d09" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7224bf5" data-id="7224bf5" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3f9bf56 elementor-widget elementor-widget-text-editor" data-id="3f9bf56" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The injected payload is stored inside a large embedded variable and protected by three layers of obfuscation. First, the payload string is reversed, then <b>Base64</b> decoded, and finally transformed using a <b>ROT14 </b> applied to printable ASCII characters.</p><p><span style="font-style: inherit; font-weight: inherit;">This script automates the deobfuscation and dumping of the shellcode for further analysis.</span></p>								</div>
				</div>
				<div class="elementor-element elementor-element-69bdc71 elementor-widget elementor-widget-code-highlight" data-id="69bdc71" data-element_type="widget" data-e-type="widget" data-widget_type="code-highlight.default">
				<div class="elementor-widget-container">
							<div class="prismjs-default copy-to-clipboard ">
			<pre data-line="" class="highlight-height language-python line-numbers">
				<code readonly="true" class="language-python">
					<xmp>import re
import base64

def rot14(data):
    return bytes(
        33 + ((b + 14) % 94) if 33 <= b <= 126 else b
        for b in data
    )

with open("file.lua", "r", errors="ignore") as f:
    lua = f.read()

# Find the embedded payload
payload = re.search(r"(==[A-Za-z0-9+/=]{100,})", lua).group(1)

payload = payload[::-1]             
payload = base64.b64decode(payload)   
payload = rot14(payload)              

with open("dump.bin", "wb") as f:
    f.write(payload)

print("Payload decoded")</xmp>
				</code>
			</pre>
		</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-bc0f49e elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="bc0f49e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-542033b" data-id="542033b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-9f40b4c elementor-widget elementor-widget-heading" data-id="9f40b4c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default"><br><b><span>Donut loader - Shellcode</span><span></span></b></h4>				</div>
				</div>
				<div class="elementor-element elementor-element-a6d0ba7 elementor-widget elementor-widget-text-editor" data-id="a6d0ba7" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The extracted shellcode is packed using <b>Donut</b>, a popular shellcode generation tool that produces position‑independent code designed for in‑memory execution. Donut can convert a wide range of payload types, including native PE files (EXE/DLL) and .NET assemblies into shellcode that can be injected and executed.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-962c54b elementor-widget elementor-widget-image" data-id="962c54b" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="768" height="603" src="/wp-content/uploads/2026/03/donut-768x603.png" class="attachment-medium_large size-medium_large wp-image-15769" alt="" srcset="/wp-content/uploads/2026/03/donut-768x603.png 768w, /wp-content/uploads/2026/03/donut-300x235.png 300w, /wp-content/uploads/2026/03/donut-1024x804.png 1024w, /wp-content/uploads/2026/03/donut-150x118.png 150w, /wp-content/uploads/2026/03/donut.png 1240w" sizes="(max-width: 768px) 100vw, 768px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-907a21e elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="907a21e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d12a15" data-id="5d12a15" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d0504e7 elementor-widget elementor-widget-text-editor" data-id="d0504e7" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p> </p><p>Donut shellcode is composed of a native loader stub followed by a structured configuration and the embedded payload itself. The configuration, commonly referred to as the Donut instance, contains metadata such as architecture flags, encryption keys, payload type, and execution options.</p><p>To inspect this stage, the <u><b>donut‑decryptor</b></u> tool was helpful to parse and decrypt the Donut instance, allowing the loader logic and dumping<br />the embedded payload.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-70d9769 elementor-widget elementor-widget-image" data-id="70d9769" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="768" height="602" src="/wp-content/uploads/2026/03/final-768x602.png" class="attachment-medium_large size-medium_large wp-image-15771" alt="" srcset="/wp-content/uploads/2026/03/final-768x602.png 768w, /wp-content/uploads/2026/03/final-300x235.png 300w, /wp-content/uploads/2026/03/final-1024x803.png 1024w, /wp-content/uploads/2026/03/final-150x118.png 150w, /wp-content/uploads/2026/03/final.png 1258w" sizes="(max-width: 768px) 100vw, 768px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-ff38439 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="ff38439" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ff1d90" data-id="8ff1d90" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-59ce6bd elementor-widget elementor-widget-text-editor" data-id="59ce6bd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The dumped final stage was identified as <b>Remcos </b>RAT, delivered as a PE32 executable and written in C++. The Remcos payload is never written to disk during this stage and only exists in memory after successful decryption and execution by the Donut loader.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-70cdfc2 elementor-widget elementor-widget-heading" data-id="70cdfc2" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Final Payload - Remcos</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-ac39bb4 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="ac39bb4" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5fe581c" data-id="5fe581c" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-652af2d elementor-widget elementor-widget-heading" data-id="652af2d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default"><b>Configuration</b></h4>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-5d9c360 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5d9c360" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d519800" data-id="d519800" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f375143 elementor-widget elementor-widget-text-editor" data-id="f375143" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The sample stores its<b> RC4‑encrypted </b>configuration inside a PE resource named “<u>SETTINGS</u>”. The configuration data is structured so that the first byte specifies the length of the RC4 key, followed by the key itself, and then the encrypted configuration blob.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-6deeae2 elementor-widget elementor-widget-image" data-id="6deeae2" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="914" src="/wp-content/uploads/2026/03/enc_config-768x914.png" class="attachment-medium_large size-medium_large wp-image-15763" alt="" srcset="/wp-content/uploads/2026/03/enc_config-768x914.png 768w, /wp-content/uploads/2026/03/enc_config-252x300.png 252w, /wp-content/uploads/2026/03/enc_config-861x1024.png 861w, /wp-content/uploads/2026/03/enc_config-126x150.png 126w, /wp-content/uploads/2026/03/enc_config-1291x1536.png 1291w, /wp-content/uploads/2026/03/enc_config.png 1460w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (7) - Encrypted configuration</figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-212ac74 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="212ac74" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8bce622" data-id="8bce622" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7e1cbb0 elementor-widget elementor-widget-text-editor" data-id="7e1cbb0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Here is the Python script used to decrypt the embedded configuration : </p>								</div>
				</div>
				<div class="elementor-element elementor-element-2b6562c elementor-widget elementor-widget-code-highlight" data-id="2b6562c" data-element_type="widget" data-e-type="widget" data-widget_type="code-highlight.default">
				<div class="elementor-widget-container">
							<div class="prismjs-default copy-to-clipboard ">
			<pre data-line="" class="highlight-height language-python line-numbers">
				<code readonly="true" class="language-python">
					<xmp>import pefile

def rc4_decrypt(data, key):
    if type(data) == str:
        data = data.encode('utf-8')
    if type(key) == str:
        key = key.encode('utf-8')
    x = 0
    box = list(range(256))
    for i in range(256):
        x = (x + box[i] + key[i % len(key)]) % 256
        box[i], box[x] = box[x], box[i]
    x = 0
    y = 0
    out = []
    for c in data:
        x = (x + 1) % 256
        y = (y + box[x]) % 256
        box[x], box[y] = box[y], box[x]
        out.append(c ^ box[(box[x] + box[y]) % 256])
    return bytes(out)
    
def extract_remcos_config(pe):
    for rsrc in pe.DIRECTORY_ENTRY_RESOURCE.entries:
        for entry in rsrc.directory.entries:
            if str(entry.name) == 'SETTINGS':
                data_entry = entry.directory.entries[0].data
                offset = data_entry.struct.OffsetToData
                size = data_entry.struct.Size
                return pe.get_memory_mapped_image()[offset:offset + size]
    raise ValueError("SETTINGS resource not found")

# main
pe_file = pefile.PE("remcos.bin")
config_data = extract_remcos_config(pe_file)
key_len = config_data[0]
key = config_data[1:key_len + 1]
encrypted_config = config_data[key_len + 1:]
print(rc4_decrypt(encrypted_config,key))</xmp>
				</code>
			</pre>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-16e44be elementor-widget elementor-widget-text-editor" data-id="16e44be" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<style>
.config-table-container {
  width: 100%;
  overflow-x: auto;
  margin: 20px 0;
}

.config-table {
  min-width: 700px;
  border-collapse: collapse;
  font-family: Arial, sans-serif;
  table-layout: auto;
}

.config-table th,
.config-table td {
  border: 1px solid #ddd;
  padding: 12px;
  text-align: left;
  vertical-align: top;
}

.config-table th {
  background-color: #31625A; /* اللون الجديد لعناوين الجدول */
  color: #ffffff;
  font-weight: bold;
}

.config-table tr:nth-child(even) {
  background-color: #f9f9f9;
}

.config-table tr:hover {
  background-color: #f1f1f1;
}

.config-table code {
  background-color: transparent; /* إزالة الخلفية المظللة */
  padding: 0;
  border-radius: 0;
  font-family: monospace;
  white-space: nowrap;
  color: #000000; /* نص أسود */
}

.config-table td.description {
  white-space: normal;
  max-width: 400px;
}

.highlight-span {
  white-space: nowrap;
  background: #f6f8fa;
  padding: 2px 6px;
  border-radius: 6px;
  font-family: monospace;
}

ul.config-notes {
  margin-left: 1em;
  padding-left: 0;
}

ul.config-notes li {
  margin-bottom: 8px;
}
</style>

<p><strong>Some decrypted values from the configuration are shown below:</strong></p>

<div class="config-table-container">
<table class="config-table">
<thead>
<tr>
<th>Value</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>laboratery.ydns.eu:63099:1</td>
<td class="description">C2 server address, port, and TLS flag (1 = TLS enabled)</td>
</tr>
<tr>
<td>laboratery1.ydns.eu:63921:0</td>
<td class="description">C2 server address, port, and TLS flag (0 = TLS disabled)</td>
</tr>
<tr>
<td>RemoteHost</td>
<td class="description">Botnet name configured in the malware</td>
</tr>
<tr>
<td>remcos.exe</td>
<td class="description">Name of the REMCOS executable once installed</td>
</tr>
<tr>
<td>Rmc-AFAZ9F</td>
<td class="description">Mutex name, also used as a registry key</td>
</tr>
<tr>
<td>logs.dat</td>
<td class="description">File used to store keylogging output</td>
</tr>
<tr>
<td>Remcos</td>
<td class="description">Main installation directory</td>
</tr>
<tr>
<td>remcos</td>
<td class="description">Directory used for keylogging data</td>
</tr>
<tr>
<td>C16F3DF974E930853974A85A2987E8B7</td>
<td class="description">Embedded REMCOS license value</td>
</tr>
<tr>
<td>Screenshots</td>
<td class="description">Folder used to store captured screenshots</td>
</tr>
<tr>
<td>MicRecords</td>
<td class="description">Folder used to store recorded audio</td>
</tr>
</tbody>
</table>
</div>

<ul class="config-notes">
  <li><span class="highlight-span">\x1e\x1e\x1f</span> is used as a delimiter between fields in C2 communication packets</li>
  <li>The configuration also includes flags that enable or disable modules such as keylogging, screenshot capture, microphone/audio recording, and other capabilities</li>
  <li>Additionally, it contains certificate-related values used for TLS communication, including the raw TLS certificate and the C2 server’s public certificate, which enable encrypted communication when TLS is active</li>
</ul>								</div>
				</div>
				<div class="elementor-element elementor-element-5ce1aef elementor-widget elementor-widget-heading" data-id="5ce1aef" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default"><b><span>Remcos pre execution phase</span></b></h4>				</div>
				</div>
				<div class="elementor-element elementor-element-f3d8850 elementor-widget elementor-widget-heading" data-id="f3d8850" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default"><h3>Privilege checks<span></span></h3></h5>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-16ab726 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="16ab726" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fc0cf3d" data-id="fc0cf3d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-e34bb19 elementor-widget elementor-widget-text-editor" data-id="e34bb19" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>At startup, Remcos performs a series of privilege checks to determine its current execution context and adapt its behavior accordingly. It<br />first verifies whether the process is running with administrative privileges. If this check succeeds, the malware performs an additional<br />validation by querying the process access token and comparing the user <b>SID </b>against the <u>LOCAL SYSTEM</u> account. This allows the malware to distinguish between standard user, administrator, and SYSTEM execution contexts.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-ecde3b4 elementor-widget elementor-widget-image" data-id="ecde3b4" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="302" src="/wp-content/uploads/2026/03/privilige_check_1-768x302.png" class="attachment-medium_large size-medium_large wp-image-15765" alt="" srcset="/wp-content/uploads/2026/03/privilige_check_1-768x302.png 768w, /wp-content/uploads/2026/03/privilige_check_1-300x118.png 300w, /wp-content/uploads/2026/03/privilige_check_1-1024x403.png 1024w, /wp-content/uploads/2026/03/privilige_check_1-150x59.png 150w, /wp-content/uploads/2026/03/privilige_check_1-1536x604.png 1536w, /wp-content/uploads/2026/03/privilige_check_1.png 1914w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (8) - Privilege check</figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-456f7c6 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="456f7c6" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8546e20" data-id="8546e20" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-05e3d40 elementor-widget elementor-widget-heading" data-id="05e3d40" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Mutex</h5>				</div>
				</div>
				<div class="elementor-element elementor-element-d6ff0cc elementor-widget elementor-widget-text-editor" data-id="d6ff0cc" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Remcos uses a mutex name taken from its configuration to ensure that only one instance runs at a time.</p><p>When executed with <b>SYSTEM </b>privileges, the malware appends the <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">-sys</span> suffix to the mutex name to indicate a high-privilege instance. If running without SYSTEM privileges, the mutex is created using the same name without the suffix.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-4f56659 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="4f56659" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e69a5ea" data-id="e69a5ea" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-47b2c97 elementor-widget elementor-widget-heading" data-id="47b2c97" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Registry</h5>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-db2933a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="db2933a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-37569d2" data-id="37569d2" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c98c2ce elementor-widget elementor-widget-text-editor" data-id="c98c2ce" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Remcos stores its configuration and operational state in the Windows registry under a registry key name derived from the malware’s mutex <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">Rmc-AFAZ9Ft</span>. This key resides under <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">HKCU\Software\<MUTEX></span> for standard user-level infections, and under <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">HKLM\Software\<MUTEX></span> when elevated/system privileges are available.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-db683a7 elementor-widget elementor-widget-image" data-id="db683a7" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="105" src="/wp-content/uploads/2026/03/reg_values-768x105.png" class="attachment-medium_large size-medium_large wp-image-15767" alt="" srcset="/wp-content/uploads/2026/03/reg_values-768x105.png 768w, /wp-content/uploads/2026/03/reg_values-300x41.png 300w, /wp-content/uploads/2026/03/reg_values-1024x139.png 1024w, /wp-content/uploads/2026/03/reg_values-150x20.png 150w, /wp-content/uploads/2026/03/reg_values-1536x209.png 1536w, /wp-content/uploads/2026/03/reg_values-2048x279.png 2048w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (9) - Registry configuration</figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-3010798 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3010798" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cd4a11e" data-id="cd4a11e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-dd9ca52 elementor-widget elementor-widget-text-editor" data-id="dd9ca52" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<style>
.registry-table-container {
  width: 100%;
  overflow-x: auto;
  margin: 20px 0;
}

.registry-table {
  min-width: 700px;
  border-collapse: collapse;
  font-family: Arial, sans-serif;
  table-layout: auto;
}

.registry-table th,
.registry-table td {
  border: 1px solid #ddd;
  padding: 12px;
  text-align: left;
  vertical-align: top;
}

.registry-table th {
  background-color: #31625A; /* لون العناوين */
  color: #ffffff;
  font-weight: bold;
}

.registry-table tr:nth-child(even) {
  background-color: #f9f9f9;
}

.registry-table tr:hover {
  background-color: #f1f1f1;
}

.registry-table code {
  background-color: transparent; /* إزالة الخلفية المظللة */
  padding: 0;
  border-radius: 0;
  font-family: monospace;
  white-space: nowrap;
  color: #000000; /* نص أسود */
}

.registry-table td.description {
  white-space: normal;
  max-width: 500px;
}
</style>

<p><strong>Some default Remcos registry values:</strong></p>
<div class="registry-table-container">
<table class="registry-table">
<thead>
<tr>
<th>Value Name</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><code>(Default)</code></td>
<td class="description">Default key value (unset)</td>
</tr>
<tr>
<td><code>exepath</code></td>
<td class="description">The Remcos executable path encrypted with the same key as the config</td>
</tr>
<tr>
<td><code>licence</code></td>
<td class="description">License string assigned to the Remcos build</td>
</tr>
<tr>
<td><code>time</code></td>
<td class="description">Timestamp stored as a DWORD (likely Unix epoch)</td>
</tr>
<tr>
<td><code>UID</code></td>
<td class="description">Unique malware identifier or victim ID</td>
</tr>
</tbody>
</table>
</div>

<p>Remcos may create additional registry values depending on the features enabled in its configuration. For example:</p>

<div class="registry-table-container">
<table class="registry-table">
<thead>
<tr>
<th>Registry Value</th>
<th>Purpose</th>
</tr>
</thead>
<tbody>
<tr>
<td><code>WD</code></td>
<td class="description">Stores the PID of the main Remcos process. The malware writes this value before starting the watchdog process. The watchdog (often running inside a legitimate process like <code>svchost.exe</code>) monitors the main process and restarts it if it is killed.</td>
</tr>
<tr>
<td><code>Inj</code></td>
<td class="description">Used to track or reset the state of process injection. It is related to Remcos injecting itself into another process.</td>
</tr>
<tr>
<td><code>FR</code></td>
<td class="description">First-run flag. It shows that one-time actions (such as browser data cleaning) have already been executed, so they will not run again.</td>
</tr>
</tbody>
</table>
</div>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-b48faf0 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b48faf0" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-feeca61" data-id="feeca61" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6b32738 elementor-widget elementor-widget-heading" data-id="6b32738" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default"><h2>Installation and Persistence<span></span></h2></h4>				</div>
				</div>
				<div class="elementor-element elementor-element-19aaf87 elementor-widget elementor-widget-text-editor" data-id="19aaf87" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><br />REMCOS installs itself on the victim machine by copying its executable to the <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">%ProgramData%</span> folder with the filename <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">remcos.exe</span> under a directory named <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">Remcos</span>. Both the directory name and the filename are retrieved directly from its configuration. REMCOS also makes manual detection more difficult by applying read-only, hidden, and system attributes to the file and the directory.</p><p>For persistence, Remcos is dependent on the privilege level of the running process. When run under a standard user context, it only sets persistence within <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">HKEY_USERS\\Software\Microsoft\Windows\CurrentVersion\Run</span>, ensuring execution upon logon for that specific user.</p><p>However, if the process is running with administrative privileges, REMCOS can write to system-wide autorun locations such as <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run</span> or <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run</span>. These locations provide persistence across all user accounts and are generally more impactful.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-a7b648c elementor-widget elementor-widget-heading" data-id="a7b648c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default"><b><span>Featured enabled in this sample</span></b></h4>				</div>
				</div>
				<div class="elementor-element elementor-element-7876208 elementor-widget elementor-widget-heading" data-id="7876208" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Keylogger</h5>				</div>
				</div>
				<div class="elementor-element elementor-element-8b75152 elementor-widget elementor-widget-text-editor" data-id="8b75152" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>
Remcos includes features for keylogging and clipboard monitoring, allowing it to collect every keystroke a user makes as well as any text data the user copies to the clipboard. This sample logs the captured input, both keystrokes and clipboard contents, into a file <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">logs.dat</span> within a Remcos folder under <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">%AppData%</span>.
</p>

<p>
The keylogging functionality is implemented by installing a Windows hook using <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">SetWindowsHookExA</span>, which allows the malware to intercept keyboard events at the system level without requiring kernel drivers. Once installed, this hook runs continuously in the background, capturing key presses as they occur.
</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e0e2a0e elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e0e2a0e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9238d72" data-id="9238d72" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3ee2465 elementor-widget elementor-widget-image" data-id="3ee2465" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="312" src="/wp-content/uploads/2026/03/set_hook-768x312.png" class="attachment-medium_large size-medium_large wp-image-15773" alt="" srcset="/wp-content/uploads/2026/03/set_hook-768x312.png 768w, /wp-content/uploads/2026/03/set_hook-300x122.png 300w, /wp-content/uploads/2026/03/set_hook-1024x416.png 1024w, /wp-content/uploads/2026/03/set_hook-150x61.png 150w, /wp-content/uploads/2026/03/set_hook-1536x624.png 1536w, /wp-content/uploads/2026/03/set_hook.png 2002w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (10) - keylogger initialization</figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-0d11046 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="0d11046" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f07ff68" data-id="f07ff68" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3661032 elementor-widget elementor-widget-text-editor" data-id="3661032" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The clipboard monitoring capture copies text data the user explicitly places on the clipboard that might not be entered via keyboard alone. It uses standard Windows clipboard APIs to grab the current text contents whenever a command is issued or at regular intervals and stores it in the same log file.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-a815eeb elementor-widget elementor-widget-image" data-id="a815eeb" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="135" src="/wp-content/uploads/2026/03/clip_board-768x135.png" class="attachment-medium_large size-medium_large wp-image-15775" alt="" srcset="/wp-content/uploads/2026/03/clip_board-768x135.png 768w, /wp-content/uploads/2026/03/clip_board-300x53.png 300w, /wp-content/uploads/2026/03/clip_board-1024x180.png 1024w, /wp-content/uploads/2026/03/clip_board-150x26.png 150w, /wp-content/uploads/2026/03/clip_board-1536x270.png 1536w, /wp-content/uploads/2026/03/clip_board.png 1886w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (11) - Getting clipboard data</figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9a047a7 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9a047a7" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a07045f" data-id="a07045f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2d1371b elementor-widget elementor-widget-heading" data-id="2d1371b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Screenshots</h5>				</div>
				</div>
				<div class="elementor-element elementor-element-6554548 elementor-widget elementor-widget-text-editor" data-id="6554548" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Remcos includes a screen capture capability that enables attackers to monitor the victim’s desktop activity in real time. It creates an in-memory copy of the current display and extracts the image data to generate a screenshot. It also enumerates open windows and selectively captures specific applications based on their titles, allowing for more targeted surveillance.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-dd61065 elementor-widget elementor-widget-image" data-id="dd61065" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="344" src="/wp-content/uploads/2026/03/screen_shots-768x344.png" class="attachment-medium_large size-medium_large wp-image-15777" alt="" srcset="/wp-content/uploads/2026/03/screen_shots-768x344.png 768w, /wp-content/uploads/2026/03/screen_shots-300x134.png 300w, /wp-content/uploads/2026/03/screen_shots-150x67.png 150w, /wp-content/uploads/2026/03/screen_shots.png 802w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (12) - Screenshot</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-c3504ee elementor-widget elementor-widget-text-editor" data-id="c3504ee" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>
Captured screenshots are stored locally in the <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">Screenshots</span> folder defined in the configuration. Each file uses a timestamp-based naming format: <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">wnd_%04i%02i%02i_%02i%02i%02i</span>, which corresponds to <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">wnd_YYYYMMDD_HHMMSS</span>, allowing the images to be organized chronologically.
</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-28bb7ca elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="28bb7ca" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-12d7062" data-id="12d7062" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1c8d447 elementor-widget elementor-widget-heading" data-id="1c8d447" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default"><h3>Audio recording [MicRecords]<span></span></h3></h5>				</div>
				</div>
				<div class="elementor-element elementor-element-7a8a385 elementor-widget elementor-widget-text-editor" data-id="7a8a385" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>
The audio recording capability enables Remcos to capture live microphone input from an infected system in real time. Once activated, the malware interacts directly with the Windows multimedia (<span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">WaveIn</span>) API to continuously record audio from the victim’s microphone using a buffered recording mechanism. As audio data is received, it is processed and saved locally in the folder <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">MicRecords</span> (as defined in the configuration) as standard <span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">.wav</span> files, using a timestamp-based naming convention (<span style="white-space:nowrap; background:#f6f8fa; padding:2px 6px; border-radius:6px; font-family:monospace;">YYYY-MM-DD HH.MM.wav</span>), allowing recordings to be organized chronologically.
</p>								</div>
				</div>
				<div class="elementor-element elementor-element-46807f3 elementor-widget elementor-widget-image" data-id="46807f3" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="303" src="/wp-content/uploads/2026/03/mic_record-768x303.png" class="attachment-medium_large size-medium_large wp-image-15779" alt="" srcset="/wp-content/uploads/2026/03/mic_record-768x303.png 768w, /wp-content/uploads/2026/03/mic_record-300x118.png 300w, /wp-content/uploads/2026/03/mic_record-150x59.png 150w, /wp-content/uploads/2026/03/mic_record.png 778w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (13) - Audio recording</figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-f9376e4 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="f9376e4" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0533cb" data-id="c0533cb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8267969 elementor-widget elementor-widget-text-editor" data-id="8267969" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Recording works in continuous parts. When one buffer becomes full and is saved to disk, the malware immediately starts recording the next part without stopping. This allows it to monitor surrounding sounds continuously without any interruption .</p>								</div>
				</div>
				<div class="elementor-element elementor-element-f2a0984 elementor-widget elementor-widget-heading" data-id="f2a0984" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default"><h2>Additional Capabilities of Remcos<span></span></h2></h4>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-da6d222 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="da6d222" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-63fe3b6" data-id="63fe3b6" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-31c6f78 elementor-widget elementor-widget-text-editor" data-id="31c6f78" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Remcos is a fully featured Remote Access Trojan (RAT) that gives attackers extensive control over an infected system. Although some features are inactive, the sample includes several advanced capabilities:</p><ul><li><strong>Watchdog</strong>: Launches a secondary process, injects itself into it, and monitors the main process. If either process is terminated, the other restarts it to ensure persistence.</li><li><strong>Process Injection</strong>: REMCOS can inject itself into a specified or hardcoded Windows process to avoid detection.</li><li><strong>UAC Disabling</strong>: Modifies the EnableLUA registry value or uses a COM-based bypass to execute actions with elevated privileges silently.</li><li><strong>PEB Masquerading</strong>: Patches the Process Environment Block to appear as explorer.exe, helping the malware evade basic detection.</li><li><strong>Remote Wallpaper</strong> Change: Enables attackers to instantly change the victim’s desktop wallpaper for visual control or intimidation.</li><li><strong>DLL Loader</strong>: Remotely loads and executes supplied DLLs.</li><li><strong>Logins Cleaner</strong>: Deletes saved credentials, browser history, and cookies.</li><li><strong>Extended System Control</strong>: Provides remote control over the mouse, keyboard, monitor, CD drive, taskbar, and Start Button.</li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-4d7c3e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="4d7c3e0" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f8fb25e" data-id="f8fb25e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7529cbc elementor-widget elementor-widget-heading" data-id="7529cbc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h4 class="elementor-heading-title elementor-size-default"><h2>C2 communication<span></span></h2></h4>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-55b225d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="55b225d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-79e927a" data-id="79e927a" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-af8918c elementor-widget elementor-widget-text-editor" data-id="af8918c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>
The sample communicates with its C2 server using raw TCP sockets, with each C2 entry stored in the format <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">domain:port:tls_flag</span>. Upon execution, the malware iterates through this list and attempts to establish a direct socket connection to each C2 address until one successfully responds.
</p>

<p>
Depending on the configuration, TLS can be enabled or disabled dynamically. When TLS is enabled, the malware handles certificate loading, key initialization, and peer verification before establishing the encrypted channel. If the TLS setup fails, the error is logged, and the malware may continue by falling back to non-encrypted communication.
</p>

<p>
Remcos uses a structure when sending information to its command-and-control (C2) server. Each packet begins with a specific header followed by command-related data.
</p>

<pre><code>packet magic | packet size | command ID | command data</code></pre>

<ul>
<li>Magic number: <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">3 bytes 0xFF 0x04 0x24</span> marking the start of a packet.</li>
<li>Packet size: Indicates the total size of the packet.</li>
<li>Command ID: Identifies the action being performed.</li>
<li>Command data: Contains the collected system information, separated by the delimiter <span style="white-space: nowrap; background: #f6f8fa; padding: 2px 6px; border-radius: 6px; font-family: monospace;">\x1E\x1E\x1F</span>.</li>
</ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-91916a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="91916a4" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20e9d24" data-id="20e9d24" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8babe75 elementor-widget elementor-widget-heading" data-id="8babe75" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Information gathered</h5>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-816cc11 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="816cc11" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ac2bee" data-id="6ac2bee" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a6f3eb7 elementor-widget elementor-widget-text-editor" data-id="a6f3eb7" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<style>
/* Permanent header background */
.c2-table th {
    background-color: #31625A;
    color: #ffffff; /* text color for readability */
    padding: 6px;
}
.c2-table td {
    padding: 6px;
}
</style>

<table class="c2-table" border="1" cellspacing="0" cellpadding="6">
<thead>
<tr>
<th>Field</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Agent Version</td>
<td>The Remcos version</td>
</tr>
<tr>
<td>Agent Identifier</td>
<td>Unique identifier assigned to the malware instance</td>
</tr>
<tr>
<td>Computer Name</td>
<td>Name of the infected system</td>
</tr>
<tr>
<td>Username</td>
<td>User account associated with the system</td>
</tr>
<tr>
<td>Geographic Location</td>
<td>Approximate location of the host</td>
</tr>
<tr>
<td>Operating System</td>
<td>OS name and architecture of the infected machine</td>
</tr>
<tr>
<td>Total Memory</td>
<td>Amount of installed system RAM</td>
</tr>
<tr>
<td>Processor Information</td>
<td>CPU model and hardware details</td>
</tr>
<tr>
<td>Running Process Path</td>
<td>Full path of the executing malware process</td>
</tr>
<tr>
<td>Active Window Title</td>
<td>Title of the currently focused window</td>
</tr>
<tr>
<td>Agent Type</td>
<td>Type of agent (EXE or DLL)</td>
</tr>
<tr>
<td>Registry Key / Mutex</td>
<td>Mutex or registry key used for persistence or identification</td>
</tr>
<tr>
<td>Installation Time</td>
<td>Timestamp when the malware was installed</td>
</tr>
<tr>
<td>Command and Control (C2) IP</td>
<td>Remote server used for communication</td>
</tr>
<tr>
<td>System Uptime</td>
<td>Duration since the system was last started</td>
</tr>
<tr>
<td>Idle Time</td>
<td>Time since the last user activity</td>
</tr>
<tr>
<td>Keylogger File Path</td>
<td>Location where keystroke logs are stored</td>
</tr>
</tbody>
</table>								</div>
				</div>
				<div class="elementor-element elementor-element-791f9c7 elementor-widget elementor-widget-image" data-id="791f9c7" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="768" height="102" src="/wp-content/uploads/2026/03/info_packet-768x102.png" class="attachment-medium_large size-medium_large wp-image-15781" alt="" srcset="/wp-content/uploads/2026/03/info_packet-768x102.png 768w, /wp-content/uploads/2026/03/info_packet-300x40.png 300w, /wp-content/uploads/2026/03/info_packet-1024x136.png 1024w, /wp-content/uploads/2026/03/info_packet-150x20.png 150w, /wp-content/uploads/2026/03/info_packet.png 1276w" sizes="(max-width: 768px) 100vw, 768px" />											<figcaption class="widget-image-caption wp-caption-text">Figure (14) - First packet sent</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-56d2157 elementor-widget elementor-widget-heading" data-id="56d2157" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">C2 commands</h5>				</div>
				</div>
				<div class="elementor-element elementor-element-0da3435 elementor-widget elementor-widget-text-editor" data-id="0da3435" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Remcos receives a control command from the C2 server to perform actions on the victim’s device. It has many C2 commands that let attackers monitor and control the infected system. These commands can be grouped into different categories.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-2c2d8db elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="2c2d8db" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-832c20e" data-id="832c20e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a38f43b elementor-widget elementor-widget-text-editor" data-id="a38f43b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<div class="malware-table-container"><table class="malware-table"><thead><tr><th>Category</th><th>Description</th></tr></thead><tbody><tr><td>File Management</td><td>Browse drives, search files, upload/download files, zip/unzip files, rename or delete files, and modify file attributes to explore and manipulate data on the victim system</td></tr><tr><td>Process Management</td><td>List running processes and terminate, suspend, or resume processes to control applications and system operations</td></tr><tr><td>Service Management</td><td>Start, stop, or manage Windows services to control system functionality</td></tr><tr><td>Window Management</td><td>List, show/hide, maximize/minimize windows and modify window titles to control the user interface</td></tr><tr><td>Registry Management</td><td>Read, create, or delete registry keys and values for persistence and system configuration changes</td></tr><tr><td>Program Management</td><td>Enumerate installed applications and remotely uninstall software</td></tr><tr><td>Remote Shell Access</td><td>Establish a remote shell and execute system commands on the infected machine</td></tr><tr><td>Script Execution</td><td>Execute JavaScript, VBS, or batch scripts remotely for additional malicious operations</td></tr><tr><td>Power Management</td><td>Log off, shutdown, restart, sleep, or hibernate the system remotely</td></tr><tr><td>Password Recovery</td><td>Extract stored passwords from the system or applications</td></tr><tr><td>Network Monitoring</td><td>List processes using network connections to analyze network activity</td></tr><tr><td>Proxy Management</td><td>Start or stop a proxy server on the victim machine to route traffic through the compromised host</td></tr><tr><td>File Download &amp; Execution</td><td>Download and execute files from the command-and-control server to deploy additional malware</td></tr><tr><td>DNS Manipulation</td><td>Modify or retrieve the hosts file to redirect network traffic</td></tr><tr><td>Communication</td><td>Display messages or chat with the victim directly</td></tr><tr><td>Multimedia Actions</td><td>Play sounds or alerts on the system for notification or intimidation</td></tr><tr><td>Credential Cleaning</td><td>Remove stored browser logins and cookies to erase traces</td></tr><tr><td>System Control Features</td><td>Disable input devices, hide taskbar, control monitor power, or manage hardware components</td></tr><tr><td>Malware Self-Management</td><td>Rename, restart, update, elevate privileges, or terminate the Remcos malware to maintain persistence and control</td></tr></tbody></table></div>								</div>
				</div>
				<div class="elementor-element elementor-element-9d84403 elementor-widget elementor-widget-heading" data-id="9d84403" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Conclusion</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-5bba401 elementor-widget elementor-widget-text-editor" data-id="5bba401" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<ul><li>The sample is a multi-stage infection chain that eventually installs Remcos RAT (v7.1.0 Pro), a commercial remote-access tool commonly abused in cyberattacks. The attack begins with a heavily obfuscated JavaScript file, which then drops LuaJIT loaders and shellcode payloads.</li><li>The JavaScript maintains persistence via scheduled tasks (schtasks) and hides meaningful payload data using junk code, large arrays, loops, and string obfuscation.</li><li>The LuaJIT loader injects the payload into <code class="language-plaintext highlighter-rouge">colorcpl.exe</code>, performing in-memory execution without writing the Remcos PE to disk. The shellcode is packed using Donut, with embedded configuration and payload metadata.</li><li>The decrypted Remcos configuration reveals: C2 server addresses and ports, TLS flags, botnet name, mutex, installation paths, module flags (keylogger, screenshots, audio), and embedded license key.</li><li>Remcos collects extensive host information: system username, computer name, OS version, CPU/RAM details, running processes, active window titles, uptime, idle time, and registry keys.</li><li>Active capabilities in this sample include keylogging, screenshot capture, microphone recording, and storage of captured data in configured folders with timestamped filenames.</li><li>Additional capabilities: watchdog process, process injection, UAC bypass, PEB masquerading, remote wallpaper change, DLL loader, credential cleaning, extended system control (mouse, keyboard, monitor, CD, taskbar).</li><li>C2 communication is performed over raw TCP sockets with optional TLS, sending structured packets containing system info and receiving commands for full remote control.</li><li>Persistence is achieved via registry autorun entries, with installation using hidden, system, and read-only attributes</li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9771004 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9771004" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-565effa" data-id="565effa" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-bc821fe elementor-widget elementor-widget-heading" data-id="bc821fe" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">References</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-71dccc0 elementor-widget elementor-widget-text-editor" data-id="71dccc0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<ul>
  <li><a href="https://3xperience.substack.com/p/bite-sized-insights-diving-into-donut" target="_blank">Bite-Sized Insights: Diving into Donut</a></li>
  <li><a href="https://github.com/volexity/donut-decryptor" target="_blank">Volexity Donut Decryptor GitHub Repository</a></li>
  <li><a href="https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos" target="_blank">Malpedia – REMCOS</a></li>
</ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://egfincirt-wpn.azurewebsites.net/remcos-rat-operations-how-attackers-gain-and-maintain-control/">Remcos RAT Operations: How Attackers Gain and Maintain Control</a> appeared first on <a href="https://egfincirt-wpn.azurewebsites.net">EG-FinCIRT</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
