Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Take: Who will become Poland’s next president? |Election News

Meta destroys the influence of the OPS targeting Romania, Azerbaijan and Taiwan.

Climate activist Greta Samberg joins aid ship efforts to break the siege of Gaza | Israeli-Palestinian conflict news

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers
Identity

New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers

userBy userMay 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 29, 2025Ravi LakshmananMalware/Windows Security

Windows rats avoid detection

According to new Fortinet research, cybersecurity researchers are removing unusual cyberattacks that have been revered with DOS and PE headers that have corrupted malware.

The DOS (Disk Operating System) and PE (Portable Executable) headers are important parts of Windows PE files and provide information about the executable.

The DOS header makes the executable file backwards compatible with MS-DOS and allows the operating system to recognize it as a valid executable, but the PE header contains the metadata and information needed for Windows to load and run the program.

Cybersecurity

“For weeks, we discovered malware running on compromised machines,” Xiaopeng Zhang and John Simmons said in a report shared with Hacker News of the Fortiguard Incide Response team. “Threat actors were running scripts and PowerShell batches to run malware in window processes.”

Fortinet said that it cannot extract the malware itself, but it has obtained a memory dump of running malware processes and a full memory dump of a compromised machine. It is not clear how malware is distributed, or how widespread the attacks it distributes.

Malware running within the dllhost.exe process is a 64-bit PE file with corrupted DOS and PE headers to challenge analysis efforts and reconstruct payloads from memory.

Despite these failures, cybersecurity companies have further noted that they can dismantle dumped malware within a controlled local configuration by replicating the environment of a compromised system after “multiple attempts, errors, and repeated fixes.”

When malware runs, it decrypts the command and control (C2) domain information stored in memory and establishes contact with the server (“Rash Paper”[.]com “) Newly created threat.

“After launching the thread, the main thread enters sleep state until the communication thread completes execution,” the researcher said. “Malware communicates with the C2 server via the TLS protocol.”

Cybersecurity

Further analysis determined that the malware was a remote access trojan (rat) with the ability to capture screenshots. Enumerate and operate system services for compromised hosts. It can even act as a server waiting for an incoming “client” connection.

“We’re implementing a multi-threaded socket architecture. Every time a new client (attacker) connects, the malware generates a new thread to handle the communication,” says Fortinet. “This design allows for concurrent sessions and supports more complex interactions.”

“By operating in this mode, malware effectively transforms the compromised system into a remote access platform, allowing an attacker to launch further attacks or perform various actions on behalf of the victim.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDeepseek quietly releases the upgraded R1 AI model and escalates competition with Openai
Next Article New York Times and Amazon Inc AI Licensing Agreement
user
  • Website

Related Posts

Meta destroys the influence of the OPS targeting Romania, Azerbaijan and Taiwan.

May 30, 2025

Cybercriminals target AI users using malware load installers that pretend to be popular tools

May 29, 2025

Dragonforce exploits SimpleHelp flaws to deploy ransomware across customer endpoints

May 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Take: Who will become Poland’s next president? |Election News

Meta destroys the influence of the OPS targeting Romania, Azerbaijan and Taiwan.

Climate activist Greta Samberg joins aid ship efforts to break the siege of Gaza | Israeli-Palestinian conflict news

Faizan Zaki wins Scripps National Spelling Bee

Trending Posts

Take: Who will become Poland’s next president? |Election News

May 30, 2025

Climate activist Greta Samberg joins aid ship efforts to break the siege of Gaza | Israeli-Palestinian conflict news

May 30, 2025

Federal Court of Appeals temporarily recovers Trump’s tariffs International Trade News

May 29, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startup and Tech Funding News – May 28, 2025

Grammarly raises $1 billion from popular catalysts, expands its AI platform and accelerates growth towards IPOs

The exchange raises $2.1 million to accelerate clean energy projects with AI-powered site intelligence

Donut Lab raises $7 million pre-seed round to launch its first “agent” crypto browser

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.