Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

Gaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News

Hegseth warns about China’s threat as Beijing’s Top Brass Skip Singapore Summit | Military News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers
Identity

New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers

userBy userMay 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 29, 2025Ravi LakshmananMalware/Windows Security

Windows rats avoid detection

According to new Fortinet research, cybersecurity researchers are removing unusual cyberattacks that have been revered with DOS and PE headers that have corrupted malware.

The DOS (Disk Operating System) and PE (Portable Executable) headers are important parts of Windows PE files and provide information about the executable.

The DOS header makes the executable file backwards compatible with MS-DOS and allows the operating system to recognize it as a valid executable, but the PE header contains the metadata and information needed for Windows to load and run the program.

Cybersecurity

“For weeks, we discovered malware running on compromised machines,” Xiaopeng Zhang and John Simmons said in a report shared with Hacker News of the Fortiguard Incide Response team. “Threat actors were running scripts and PowerShell batches to run malware in window processes.”

Fortinet said that it cannot extract the malware itself, but it has obtained a memory dump of running malware processes and a full memory dump of a compromised machine. It is not clear how malware is distributed, or how widespread the attacks it distributes.

Malware running within the dllhost.exe process is a 64-bit PE file with corrupted DOS and PE headers to challenge analysis efforts and reconstruct payloads from memory.

Despite these failures, cybersecurity companies have further noted that they can dismantle dumped malware within a controlled local configuration by replicating the environment of a compromised system after “multiple attempts, errors, and repeated fixes.”

When malware runs, it decrypts the command and control (C2) domain information stored in memory and establishes contact with the server (“Rash Paper”[.]com “) Newly created threat.

“After launching the thread, the main thread enters sleep state until the communication thread completes execution,” the researcher said. “Malware communicates with the C2 server via the TLS protocol.”

Cybersecurity

Further analysis determined that the malware was a remote access trojan (rat) with the ability to capture screenshots. Enumerate and operate system services for compromised hosts. It can even act as a server waiting for an incoming “client” connection.

“We’re implementing a multi-threaded socket architecture. Every time a new client (attacker) connects, the malware generates a new thread to handle the communication,” says Fortinet. “This design allows for concurrent sessions and supports more complex interactions.”

“By operating in this mode, malware effectively transforms the compromised system into a remote access platform, allowing an attacker to launch further attacks or perform various actions on behalf of the victim.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDeepseek quietly releases the upgraded R1 AI model and escalates competition with Openai
Next Article New York Times and Amazon Inc AI Licensing Agreement
user
  • Website

Related Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

May 31, 2025

US DOJ seizes four domains that support cybercrime crypto services in global operations

May 31, 2025

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

Gaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News

Hegseth warns about China’s threat as Beijing’s Top Brass Skip Singapore Summit | Military News

US DOJ seizes four domains that support cybercrime crypto services in global operations

Trending Posts

Gaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News

May 31, 2025

Hegseth warns about China’s threat as Beijing’s Top Brass Skip Singapore Summit | Military News

May 31, 2025

Chinese Navy conducts combat patrols near the contested shallows of the South China Sea | South China Sea News

May 31, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

zircuit allows for top-up of non-curative wallets for crypto.com visa cards

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.