Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/Threats/DesckVB RAT Evades Detection with Ob Uses Obfuscated
Threats

DesckVB RAT Evades Detection with Ob Uses Obfuscated

A new Remote Access Trojan (RAT), DesckVB, has been observed targeting systems in 2026. This threat leverages obfuscated JavaScript and a fileless .NET loader, enabling it to remain hidden from...

Sarah simpson
Sarah simpson
April 10, 2026 3 Min Read
6 0

A new Remote Access Trojan (RAT), DesckVB, has been observed targeting systems in 2026. This threat leverages obfuscated JavaScript and a fileless .NET loader, enabling it to remain hidden from traditional security tools.

The malware gives attackers full remote control over a victim’s machine, making it a serious threat for individuals and organizations alike.

DesckVB RAT starts its infection chain with a heavily obfuscated JavaScript file that, once executed, silently drops a PowerShell script into the C:UsersPublic directory on the target system.

The JavaScript replicates its code into PowerShell and text files, giving the malware multiple ways to run. What makes this threat particularly dangerous is that it avoids writing most of its core components to disk, making it much harder for conventional antivirus tools to catch it.

Point Wild analysts from the LAT61 Threat Intelligence Team identified and examined DesckVB RAT in detail, uncovering how it uses layered obfuscation to hide its true purpose at every stage of execution.

Their research found that the malware combines Base64 encoding with URL string reversal to conceal its command-and-control (C2) server addresses, a tactic designed to trick automated scanning tools.

The overall structure of the malware suggests it was built with a clear understanding of how modern security defenses work.

Once fully deployed, DesckVB RAT loads a .NET assembly directly into memory using .NET reflection techniques, bypassing the need to leave any files on the hard drive.

This in-memory execution method allows the malware to run its harmful routines without triggering many standard file-based detection systems.

At runtime, the malware activates several harmful capabilities, including keylogging, webcam access, antivirus detection evasion, and encrypted communication with its C2 server.

The overall impact of DesckVB RAT is broad and concerning. Attackers who deploy it can steal sensitive information, monitor user activity in real time, and maintain long-term access to a compromised system without raising immediate alarms.

Its use of encrypted HTTPS traffic over port 443 allows it to blend in with normal internet activity, making network-level detection just as difficult.

The Fileless Infection Chain

The most notable aspect of DesckVB RAT is how it moves through its infection stages without relying on traditional file drops. The malware’s flow begins with the JavaScript file, acting as the first entry point.

Shows flow of malware (Source - Point Wild)
Shows flow of malware (Source – Point Wild)

This file is heavily obfuscated and drops a PowerShell file directly into C:UsersPublic, keeping its activities within commonly overlooked system folders.

JS obfuscated file (Source - Point Wild)
JS obfuscated file (Source – Point Wild)

The PowerShell script first checks for internet connectivity by pinging Google, then attempts to connect to a malicious external domain. The C2 domain is hidden using Base64 encoding combined with string reversal.

The malware uses the legitimate Windows tool InstallUtil.exe to execute its payload — a known technique for bypassing application control policies.

From there, the script loads ClassLibrary3.dll directly into memory and invokes the obfuscated method prFVI, which then loads ClassLibrary1.dll.

The Execute method within this loader uses CreateProcessA to spawn a new process in a suspended state before injecting the malicious payload.

Obfuscated method (Source - Point Wild)
Obfuscated method (Source – Point Wild)

This process injection approach allows the malware to hide inside trusted processes and avoid drawing attention.

Encoded String Array (Source - Point Wild)
Encoded String Array (Source – Point Wild)

The final payload, Microsoft.exe, carries encoded string arrays that hold a hidden runtime configuration. Once active, it drops Keylogger.dll directly into memory and begins C2 communication over manikandan83.mysynology.net on port 7535, resolving to IP 45.156.87.226.

Network captures confirm the malware transmits its module names and internal activity to its remote server.

Security teams should watch for unusual PowerShell execution, unexpected use of InstallUtil.exe, and outbound connections to unknown domains or IPs.

Blocking script execution from C:UsersPublic and enabling detailed PowerShell script logging are practical first steps to catching this threat early.

Keeping endpoint protection software current also remains a critical defense, as detection tools have already shown the ability to flag key components of this malware.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Single Line of Code Jailbreaks 11 Including ChatGPT

Next Post

Juniper Default Password Flaw Allows Full Device Takeover

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us