Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hundreds of organizations that violated SharePoint Mass-Hacks

New Coyote Malware Variants Abuse Windows UI Automation to Steal Bank Credentials

Trump is set to unveil his AI roadmap: What does this know?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers
Identity

New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers

userBy userMay 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 29, 2025Ravi LakshmananMalware/Windows Security

Windows rats avoid detection

According to new Fortinet research, cybersecurity researchers are removing unusual cyberattacks that have been revered with DOS and PE headers that have corrupted malware.

The DOS (Disk Operating System) and PE (Portable Executable) headers are important parts of Windows PE files and provide information about the executable.

The DOS header makes the executable file backwards compatible with MS-DOS and allows the operating system to recognize it as a valid executable, but the PE header contains the metadata and information needed for Windows to load and run the program.

Cybersecurity

“For weeks, we discovered malware running on compromised machines,” Xiaopeng Zhang and John Simmons said in a report shared with Hacker News of the Fortiguard Incide Response team. “Threat actors were running scripts and PowerShell batches to run malware in window processes.”

Fortinet said that it cannot extract the malware itself, but it has obtained a memory dump of running malware processes and a full memory dump of a compromised machine. It is not clear how malware is distributed, or how widespread the attacks it distributes.

Malware running within the dllhost.exe process is a 64-bit PE file with corrupted DOS and PE headers to challenge analysis efforts and reconstruct payloads from memory.

Despite these failures, cybersecurity companies have further noted that they can dismantle dumped malware within a controlled local configuration by replicating the environment of a compromised system after “multiple attempts, errors, and repeated fixes.”

When malware runs, it decrypts the command and control (C2) domain information stored in memory and establishes contact with the server (“Rash Paper”[.]com “) Newly created threat.

“After launching the thread, the main thread enters sleep state until the communication thread completes execution,” the researcher said. “Malware communicates with the C2 server via the TLS protocol.”

Cybersecurity

Further analysis determined that the malware was a remote access trojan (rat) with the ability to capture screenshots. Enumerate and operate system services for compromised hosts. It can even act as a server waiting for an incoming “client” connection.

“We’re implementing a multi-threaded socket architecture. Every time a new client (attacker) connects, the malware generates a new thread to handle the communication,” says Fortinet. “This design allows for concurrent sessions and supports more complex interactions.”

“By operating in this mode, malware effectively transforms the compromised system into a remote access platform, allowing an attacker to launch further attacks or perform various actions on behalf of the victim.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDeepseek quietly releases the upgraded R1 AI model and escalates competition with Openai
Next Article New York Times and Amazon Inc AI Licensing Agreement
user
  • Website

Related Posts

New Coyote Malware Variants Abuse Windows UI Automation to Steal Bank Credentials

July 23, 2025

A new approach to the challenges of 10 years ago

July 23, 2025

Google launches OSS Rebuild to expose malicious code in widely used open source packages

July 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hundreds of organizations that violated SharePoint Mass-Hacks

New Coyote Malware Variants Abuse Windows UI Automation to Steal Bank Credentials

Trump is set to unveil his AI roadmap: What does this know?

A new approach to the challenges of 10 years ago

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.