Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Warns: Hackers Use AI to Create Zero- Using Working
May 11, 2026
Go Library fsnotify: Supply Chain Alarms After Access Changes
May 11, 2026
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Home/Threats/Weaponized Performance Reports Deploy Guloader Malware
Threats

Weaponized Performance Reports Deploy Guloader Malware

As cybersecurity threats evolve, attackers increasingly deploy creative social engineering techniques to compromise organizations. A recent threat has emerged involving the Guloader malware, which is...

Emy Elsamnoudy
Emy Elsamnoudy
January 12, 2026 3 Min Read
2 0

As cybersecurity threats evolve, attackers increasingly deploy creative social engineering techniques to compromise organizations.

A recent threat has emerged involving the Guloader malware, which is being disguised as employee performance reports to trick users into downloading and executing malicious files.

This sophisticated attack vector exploits human trust and workplace familiarity to distribute dangerous malware that can compromise sensitive company data and personal information.

The attack begins with a phishing email claiming to contain an October 2025 employee performance report.

Phishing email body (Source - ASEC)
Phishing email body (Source – ASEC)

The email uses urgency tactics by mentioning potential employee dismissals, prompting recipients to open the attachment.

This psychological manipulation increases the likelihood of users bypassing security awareness and opening what appears to be a legitimate business document.

The deceptive nature of this campaign makes it particularly dangerous, as it targets the intersection of workplace communication and security vulnerability.

ASEC analysts and researchers noted that the attached file is a RAR compressed archive containing an NSIS executable file disguised as “staff record pdf.exe”.

If users have file extensions hidden in their operating system settings, this executable appears as a standard PDF document.

Inside the attached compressed file (Source - ASEC)
Inside the attached compressed file (Source – ASEC)

Once executed, the malware initiates a multi-stage infection process designed to evade detection and establish persistent access to the victim’s system.

The Multi-Stage Infection Mechanism

Understanding how Guloader operates reveals the sophisticated nature of this attack.

When the executable runs, it connects to a remote server and downloads encrypted shellcode from a Google Drive URL, specifically from “hxxps://drive.google[.]com/uc?export=download&id=1bzvByYrlHy240MCIX7Cv41gP9ZY3pRsgv” and retrieves a file named “EMvmKijceR91.bin”.

The downloaded shellcode is then injected directly into the system’s memory, allowing the malware to run without writing files to disk.

This memory-only execution technique makes detection significantly more challenging for traditional security solutions that rely on file-based scanning.

The final payload delivered by Guloader is Remcos RAT, a remote access trojan that provides attackers with comprehensive control over infected systems.

C2 information of Remcos RAT (Source - ASEC)
C2 information of Remcos RAT (Source – ASEC)

Remcos enables threat actors to perform keylogging, capture screenshots, control webcams and microphones, and extract browser histories along with stored passwords.

The malware communicates with command and control servers located at “196.251.116[.]219” on ports 2404 and 5000, establishing a persistent connection for ongoing unauthorized access.

Organizations should implement email filtering rules to block suspicious attachments, disable file extension hiding in user systems, and deploy advanced endpoint detection and response solutions to identify and block this threat at multiple stages of the attack chain.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityExploitMalwarephishingSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

X Suspends Account for Rule Violation on Its Platform

Next Post

ValleyRAT_S2 Malware Steals Financial Details from Organizations

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
ShinyHunters Breaches Instructure Canvas LMS Free-
May 11, 2026
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us