Thursday, March 5, 2026

New REMCOS Variant Leverages LNK Files to Evade Antivirus Detection and Empower Threat Actors

Cybersecurity researchers have identified a sophisticated malware campaign utilizing malicious Windows shortcut (LNK) files to deliver the REMCOS backdoor, demonstrating how threat actors continue to evolve their tactics to bypass security measures.

The attack, identified through analysis of the file “ORDINE-DI-ACQUIST-7263535” (SHA256: 506ecb76cf8e39743ec06129d81873f0e4c1ebfe7a352fc5874d0fc60cc1d7c6), showcases a multi-stage infection process that exploits trusted system utilities to maintain stealth throughout the compromise.

Fileless Attack Chain Exploits PowerShell for Stealthy Deployment

The attack begins with a deceptively simple LNK file disguised as a legitimate document or invoice, distributed primarily through phishing emails or malicious downloads.

When executed, the shortcut triggers a hidden PowerShell command that initiates a three-stage infection process without triggering traditional macro security warnings.

Infection Workflow image

The first stage involves downloading a Base64-encoded payload from “shipping-hr.ro/m/r/r.txt” and saving it as “HEW.GIF” in the Windows ProgramData directory.

The PowerShell command then decodes this Base64 content into a binary executable named “CHROME.PIF,” effectively transforming what appears to be an image file into a functional malware payload.

This technique allows the malware to operate entirely in memory during initial stages, making detection significantly more challenging for traditional antivirus solutions.

The final stage executes the CHROME.PIF file, which serves as a Program Information File (PIF) – a format that can run DOS programs and often evades scrutiny due to Windows’ default extension hiding behavior.

This multi-stage approach effectively bypasses many security controls by leveraging legitimate Windows functionality throughout the infection chain.

REMCOS Backdoor Establishes Comprehensive System Control

Once deployed, the REMCOS backdoor, written in C++, establishes communication with command-and-control servers including IP addresses 92.82.184.33 (Romania) and 198.23.251.10 (United States) using encrypted TLSv1.2 protocols.

The malware demonstrates extensive capabilities, including keystroke logging, screenshot capture, webcam and microphone access, and arbitrary command execution.

Technical analysis reveals that the backdoor utilizes the SetWindowsHookExA API from user32.dll to inject keyboard monitoring hooks, creating comprehensive surveillance capabilities.

All captured data is stored in a “logs.dat” file within a “remcos” folder in the ProgramData directory, providing persistent access to victim activities.

The malware also establishes persistence through registry modifications and creates additional files, including “Xufewgoz.url” and batch files to maintain system access across reboots.

Security experts recommend implementing multi-layered defense strategies, including updated antivirus solutions, user education about suspicious attachments, and regular system monitoring to detect unusual PowerShell activity.

Organizations should particularly focus on monitoring ProgramData directory modifications and network connections to suspicious domains as key indicators of compromise.

Indicators of compromise

SHA256 & File name:

FileSHA-256
ORDINE-DI-ACQUIST-7263535506ecb76cf8e39743ec06129d81873f0e4c1ebfe7a352fc5874d0fc60cc1d7c6
CHROME.PIF5ec8268a5995a1fac3530acafe4a10eab73c08b03cabb5d76154a7d693085cc2
HEW.GIF8bc668fd08aecd53747de6ea83ccc439bdf21b6d9edf2acafd7df1a45837a4e1

Recent News

Recent News