Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New Malware Framework: Screen Control, Browser & Enables Artifact
May 14, 2026
node-ipc npm Package Compromised in Supply Weekly Downloads
May 14, 2026
TeamPCP and BreachForums Hackers Running $1,000 Contest for Supply
May 14, 2026
Home/Threats/New Malware Framework: Screen Control, Browser & Enables Artifact
Threats

New Malware Framework: Screen Control, Browser & Enables Artifact

A novel malware framework has emerged, drawing significant attention from the cybersecurity community. Researchers recently identified a previously unknown implant, dubbed TencShell, which provides...

David kimber
David kimber
May 14, 2026 4 Min Read
2 0

A novel malware framework has emerged, drawing significant attention from the cybersecurity community. Researchers recently identified a previously unknown implant, dubbed TencShell, which provides attackers with full remote control over compromised systems. Further details on this sophisticated threat are outlined in a

Analysts at Cato Networks identified the attempted intrusion in April 2026 and blocked it before the attacker could establish durable remote control.

Their investigation revealed a carefully constructed attack chain involving staged payloads, masqueraded file types, and command-and-control communication specifically designed to blend into normal web traffic.

The initial infection vector remains unknown but likely involved phishing, a malicious download, or another web-based delivery method.

Screen Control, UAC Bypass, and Browser Artifact Access

TencShell is derived from Rshell, an open-source framework designed for cross-platform offensive security use.

The threat actor customized and repackaged it, adding communication patterns that closely mimic Tencent-style API traffic to make malicious requests look like ordinary application activity.

The name combines “Tenc” for those Tencent-like C2 paths and “Shell” for its core remote access behavior.

The broader concern goes beyond this single incident. Attackers no longer need custom malware development pipelines to pull off a sophisticated intrusion.

Adapting freely available offensive frameworks is often enough to build a capable, hard-to-detect tool, and that reality lowers the barrier for a much wider range of threat actors.

TencShell functions as a full operator framework, and its capabilities stretch far beyond basic command execution.

Recovered code modules confirm that the implant supports screen capture, live screen streaming over WebSocket, and real-time keyboard and mouse simulation.

Functions like SendInput, MouseClick, KeyTap, and GetScreenWebSocket were all embedded within the tool, giving an operator direct interactive control of an infected host.

Extracted TencShell package paths and function names (Source - CATO Networks)
Extracted TencShell package paths and function names (Source – CATO Networks)

The implant also includes dedicated routines for accessing browser artifacts from both Chrome and Microsoft Edge. Recovered opcodes confirm operations for reading and clearing saved sessions, login data, and cookies from both browsers.

This creates a direct path to credential theft and session hijacking for any organization where TencShell takes hold.

A UAC bypass module, documented under the opcode UAC_BYPASS, allows the attacker to gain elevated privileges without triggering the standard Windows security prompt.

Combined with SOCKS5 proxying, DLL loading, file transfer, and persistence through a registry run key disguised as “OneDriveHealthTask,” TencShell is built for long-term, stealthy access rather than a quick smash-and-grab.

TencShell Infection Chain and Delivery Method

The attack followed a clear multi-stage delivery pattern. A lightweight first-stage dropper was executed after initial access, designed to stay small and quietly pull down the next payload while using a fake User-Agent to blend outbound requests into normal traffic.

OencShell infection chain (Source - CATO Networks)
OencShell infection chain (Source – CATO Networks)

The dropper then retrieved what appeared to be a standard web font file with a .woff extension, the kind websites routinely use to load custom typefaces.

Inside that file was Donut shellcode, an open-source tool capable of loading Windows payloads directly in memory, bypassing the need to write anything to disk.

This disguise helps the request look like a routine browser asset fetch rather than a malware delivery operation.

After retrieval, the shellcode was loaded into a memory region, marked as executable, and launched through a new thread within the originating process.

Donut then reflectively mapped TencShell into memory, completing the chain and preparing the implant for active command-and-control communication.

Security teams are advised to flag unusual outbound requests to unfamiliar endpoints, unexpected .woff paths outside of normal browser context, and unknown autorun entries in the Windows Registry.

Indicators of Compromise (IoCs):-

Type Indicator Description
IP Address 45[.]64[.]52[.]242 Attacker-controlled C2 infrastructure 
IP Address 192[.]238[.]134[.]166 Attacker-controlled C2 infrastructure 
IP Address 45[.]115[.]38[.]27 Attacker-controlled C2 infrastructure 
Domain gin-tne-fahcesmukw[.]cn-hangzhou[.]fcapp[.]run Attacker-controlled C2 domain 
SHA256 Hash c3ecb90c9915daa23aec51f93ff8665778866f05 TencShell-related malware sample 
SHA256 Hash 92b2413578c8ba9708df6091660af53acdc505f3 TencShell-related malware sample 
SHA256 Hash 33f6d4f4269cec740a5eb05e41a4c7926742606b TencShell-related malware sample 
SHA256 Hash 18f22d3337facbbd0047c19f4efdea75ccb9e3ec TencShell-related malware sample 
SHA256 Hash 793cb9b1d7846afa4fb8e900d6e9ed9501dc3e7e TencShell-related malware sample 
SHA256 Hash 673b4f2682f29b19ecabf9a6ec9c3042c9b1cfb3 TencShell-related malware sample 
SHA256 Hash 9dbdddf1dda680ab750a707084839fe970266964 TencShell-related malware sample 
SHA256 Hash 957b8eaa7e25b4d9ca1050cd7ab19e4a2add707d TencShell-related malware sample 
SHA256 Hash 12f76f48727916d6c05f53f8cd94915db5de5ffcbfa02c4807c27e090cfa47c TencShell-related malware sample 
SHA256 Hash 14ae8de40153c66455d972e6e98fe06fb68db7301ba126557e96599527bc5509 TencShell-related malware sample 
SHA256 Hash c1ba73df60e12b3feb8b5574e65cfceb6910460ab7fae2cf5554769fafdad049 TencShell-related malware sample 
SHA256 Hash e5eff99959683480d2280c931e433af836adf6a8b7a8489b1af17cddcf480cf6 TencShell-related malware sample 
SHA256 Hash 30fe91200a2bb4aed13b1a1ba4ec8fd4454566f5929ffed4f537d9a87c1bf118 TencShell dropper or payload 
SHA256 Hash 77f6bec5dd217151fcd03087a6e7ba1070f0fa603801fb128a4097076c9976d3 TencShell dropper or payload 
SHA256 Hash 6ed6058f0b0735ba56b781dea39353625fcb56bc3e77bf2d26a648511d754d21 TencShell dropper or payload 
Registry Key SoftwareMicrosoftWindowsCurrentVersionRun Persistence registry run key used by TencShell 
Registry Value OneDriveHealthTask Registry value name used by TencShell for autorun persistence 

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityExploitMalwarephishingSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

node-ipc npm Package Compromised in Supply Weekly Downloads

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Compromise 170 npm Packages to Steal GitHub
May 14, 2026
Dell SupportAssist Updates Force Windows to BSOD Loop
May 14, 2026
Critical Exim Mailer Flaw Allows Remote Code Execution
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us