Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Home/Threats/PhantomVAI Custom Loader Attacks Users with RunPE Uses Utility
Threats

PhantomVAI Custom Loader Attacks Users with RunPE Uses Utility

Recently identified in global phishing campaigns, the sophisticated custom loader PhantomVAI delivers various stealers and remote access trojans (RATs) to compromised systems. This malware loader...

Sarah simpson
Sarah simpson
February 4, 2026 2 Min Read
3 0

Recently identified in global phishing campaigns, the sophisticated custom loader PhantomVAI delivers various stealers and remote access trojans (RATs) to compromised systems.

This malware loader operates by masquerading as legitimate software and employing process hollowing techniques to inject malicious payloads into Windows processes.

Security researchers across multiple organizations have documented this threat under different names, creating confusion in the cybersecurity community about its true identity and capabilities.

The loader targets users worldwide through diverse phishing lures embedded in malicious email attachments and links.

Once executed, PhantomVAI downloads remote payloads and injects them into legitimate Windows processes, making detection significantly more challenging.

Thread advertising the RunPE utility on turkhackteam (Source - Intrinsec)
Thread advertising the RunPE utility on turkhackteam (Source – Intrinsec)

The malware has been associated with delivering notorious threats including Remcos, XWorm, AsyncRAT, DarkCloud, and SmokeLoader across various geographical regions.

Intrinsec analysts identified that multiple security vendors documented this loader independently, assigning different names such as VMDetectLoader and Caminho Loader to the same threat.

This naming inconsistency stems from different organizations analyzing the loader’s various components separately.

Researchers discovered that all instances share critical characteristics: the presence of a “VAI” method, Portuguese strings within the code, and masquerading as “Microsoft.Win32.TaskScheduler.dll” based on a legitimate GitHub project.

Technical Architecture and Execution Flow

The loader’s core functionality relies on a RunPE utility called “Mandark,” developed by HackForums user “gigajew” and open-sourced several years ago.

Parameters passed to Mandark (Source - Intrinsec)
Parameters passed to Mandark (Source – Intrinsec)

This utility performs process hollowing by creating a suspended legitimate process, unmapping its memory, and injecting malicious code.

The namespace “hackforums.gigajew” found within the loader’s code confirms this connection to the original utility.

PhantomVAI specifically abuses version 2.11.0.0 of the legitimate Microsoft Windows Task Scheduler library.

The malware extracts relevant fields from the downloaded payload’s header, including image size, headers size, entry point, and base address.

It then starts a host process, allocates memory with read/write/execute permissions, and copies both PE headers and sections into the allocated memory.

The loader patches processor registers to ensure correct import resolution and relocation before resuming the thread to execute the malicious payload.

The threat operates under a suspected loader-as-a-service model, evidenced by the large variety of payloads delivered and the acceptance of arbitrary payload URLs as arguments.

This model allows multiple threat actors to leverage the same infrastructure for different malicious campaigns, contributing to the widespread nature of attacks observed globally.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwarePatchphishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

SystemBC Botnet Hijacked 10,000 Devices Worldwide to Use for DDoS

Next Post

CISA Warns: VMware ESXi 0- Vulnerability Exploited

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
node-ipc npm Package Compromised in Supply Weekly Downloads
May 14, 2026
TeamPCP and BreachForums Hackers Running $1,000 Contest for Supply
May 14, 2026
Critical Canon MailSuite Flaw Allows Remote Code Execution
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us