Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Home/Threats/Remcos RAT Infection Uses Obfuscated Scripts & Windows Bin
Threats

Remcos RAT Infection Uses Obfuscated Scripts & Windows Bin

A recently uncovered Remcos RAT campaign highlights cybercriminals’ evolving evasion tactics. This particular attack doesn’t rely on dropping a single malicious file onto a compromised...

Sarah simpson
Sarah simpson
April 2, 2026 4 Min Read
3 0

A recently uncovered Remcos RAT campaign highlights cybercriminals’ evolving evasion tactics. This particular attack doesn’t rely on dropping a single malicious file onto a compromised system, indicating a more sophisticated approach.

Instead, it uses a carefully built, multi-stage chain that starts with a simple phishing email and ends with a full, in-memory system compromise — leaving almost no trace on the disk.

Remcos RAT, short for Remote Control and Surveillance, has been a known threat for years. Attackers use it to steal data, log keystrokes, and remotely control infected machines.

What makes this latest campaign stand out is how it reaches the victim. Rather than relying on easy-to-spot delivery methods, this operation strings together multiple layers of obfuscation, trusted Windows tools, and a live C2 server to deliver its payload with precision.

Analysts and researchers at Point Wild’s LAT61 Threat Intelligence Team identified this campaign after examining a malicious email file (.eml).

They found that the attack begins with a ZIP attachment named “MV MERKET COOPER SPECIFICATION.zip,” designed to look like a routine business document.

Once opened, it releases an obfuscated JavaScript file that quietly sets the attack in motion, all without triggering standard security alerts.

The campaign’s impact is serious. Once fully deployed, Remcos establishes a persistent connection to a remote C2 server at 192[.]3[.]27[.]141:8087, actively sending and receiving data.

Evidence of data collection was confirmed through the creation of a log file at C:ProgramDataremcoslogs.dat, which stores captured keystrokes and other system information. This indicates the malware was actively staging data for exfiltration.

What makes this threat particularly difficult to stop is its ability to hide inside the very tools Windows users trust every day.

By abusing legitimate system binaries and running entirely in memory, the attackers managed to bypass many traditional security defenses. This kind of attack shows how far threat actors have come in designing operations that blend into normal system activity.

Multi-Stage Infection Mechanism: From Phishing to In-Memory Execution

The infection begins the moment a user opens the phishing email and extracts the ZIP file.

Attack Flow (Source - Point Wild)
Attack Flow (Source – Point Wild)

Inside the archive is a JavaScript file — MV MERKET COOPER SPECIFICATION.js — that is heavily obfuscated using string-mapping functions and encoded arrays to hide its true purpose.

MV MERKET COOPER SPECIFICATION.js (Source - Point Wild)
MV MERKET COOPER SPECIFICATION.js (Source – Point Wild)

Upon execution via Windows Script Host, the script creates ActiveX objects to handle HTTP communication, command execution, and file operations, and then contacts almacensantangel[.]com to download a remote PowerShell script called ENCRYPT.Ps1.

Email Attachment (Source - Point Wild)
Email Attachment (Source – Point Wild)

The PowerShell loader applies multiple layers of obfuscation to rebuild the payload in memory.

Encrypted Data in ps1 file (Source - Point Wild)
Encrypted Data in ps1 file (Source – Point Wild)

The data is stored as a large Base64-encoded string inside the $securecontainer variable, which the $base64reconstruction function converts into raw byte arrays.

Base64 Reconstruction Module (Source - Point Wild)
Base64 Reconstruction Module (Source – Point Wild)

A rotational XOR function then decrypts the data using a shifting key mechanism, and the $masterdecoder function brings the full decryption together.

The $executionhandler finally runs the recovered script through Invoke-Expression with built-in fallback methods.

The decrypted script reveals a .NET assembly called ALTERNATE.dll, loaded directly into memory through .NET Reflection APIs with no file written to disk.

A secondary payload, Cqeqpvzeia.exe, is embedded as a raw byte array starting with the “MZ” PE signature and injected into aspnet_compiler.exe — a legitimate Microsoft .NET tool — through a Living-off-the-Land technique.

This abused process handles all outbound C2 communication, making malicious traffic appear as routine system activity.

Organizations should monitor PowerShell execution events, especially those involving Base64-encoded commands and execution policy bypass flags.

Outbound connections from system utilities like aspnet_compiler.exe to unknown external hosts should be treated as suspicious.

Security teams should also watch for the file C:ProgramDataremcoslogs.dat as a key indicator of compromise. Blocking known malicious URLs, hashes, and C2 infrastructure from the IOC table remains a critical step in containing this threat early.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Symantec DLP Agent Flaw Allows Attackers to Esc Vulnerability Escalate

Next Post

Critical Cisco IMC Flaw Allows Attackers to Bypass Authentication

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
WatchGuard Agent Flaws Grant Full SYSTEM Privileges on
May 7, 2026
Hackers Abuse Google Ads to Steal GoDaddy Manage Users ManageWP
May 7, 2026
Fake Call History Apps on Google Play Steal Payments
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us