Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers

Posted on May 29, 2025May 29, 2025 By CWS

Could 29, 2025Ravie LakshmananMalware / Home windows Safety
Cybersecurity researchers have taken the wraps off an uncommon cyber assault that leveraged malware with corrupted DOS and PE headers, based on new findings from Fortinet.
The DOS (Disk Working System) and PE (Moveable Executable) headers are important elements of a Home windows PE file, offering details about the executable.
Whereas the DOS header makes the executable file backward appropriate with MS-DOS and permits it to be acknowledged as a legitimate executable by the working system, the PE header comprises the metadata and knowledge mandatory for Home windows to load and execute this system.

“We found malware that had been operating on a compromised machine for a number of weeks,” researchers Xiaopeng Zhang and John Simmons from the FortiGuard Incident Response Workforce mentioned in a report shared with The Hacker Information. “The menace actor had executed a batch of scripts and PowerShell to run the malware in a Home windows course of.”
Fortinet mentioned whereas it was unable to extract the malware itself, it acquired a reminiscence dump of the operating malware course of and a full reminiscence dump of the compromised machine. It is at the moment not recognized how the malware is distributed or how widespread the assaults distributing it are.
The malware, operating inside a dllhost.exe course of, is a 64-bit PE file with corrupted DOS and PE headers in a bid to problem evaluation efforts and reconstruct the payload from reminiscence.

Regardless of these roadblocks, the cybersecurity firm additional famous that it was capable of take aside the dumped malware inside a managed native setting by replicating the compromised system’s surroundings after “a number of trials, errors, and repeated fixes.”
The malware, as soon as executed, decrypts command-and-control (C2) area info saved in reminiscence after which establishes contact with the server (“rushpapers[.]com”) in a newly created menace.
“After launching the thread, the principle thread enters a sleep state till the communication thread completes its execution,” the researchers mentioned. “The malware communicates with the C2 server over the TLS protocol.”

Additional evaluation has decided the malware to be a distant entry trojan (RAT) with capabilities to seize screenshots; enumerate and manipulate the system companies on the compromised host; and even act as a server to await incoming “consumer” connections.
“It implements a multi-threaded socket structure: every time a brand new consumer (attacker) connects, the malware spawns a brand new thread to deal with the communication,” Fortinet mentioned. “This design permits concurrent classes and helps extra complicated interactions.”
“By working on this mode, the malware successfully turns the compromised system right into a remote-access platform, permitting the attacker to launch additional assaults or carry out varied actions on behalf of the sufferer.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Corrupted, Detection, DoS, Evades, Headers, RAT, Weeks, Windows

Post navigation

Previous Post: Victoria’s Secret Website Taken Offline After Cyberattack
Next Post: GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability

Related Posts

15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign The Hacker News
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks The Hacker News
Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign The Hacker News
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros The Hacker News
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing The Hacker News
GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
  • Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report 
  • GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms
  • Venezuela’s Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies
  • LunaLock Ransomware Attacking Artists to Steal and Encrypt Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
  • Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report 
  • GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms
  • Venezuela’s Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies
  • LunaLock Ransomware Attacking Artists to Steal and Encrypt Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News