Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads

Posted on September 11, 2025September 12, 2025 By CWS

A beforehand unknown superior persistent risk (APT) group has unleashed a brand new fileless malware framework, dubbed EggStreme, in a extremely focused espionage marketing campaign towards strategic organizations.

Rising in early 2024, EggStreme exploits the authentic Home windows Mail executable (WinMail[.]exe) to sideload a malicious library, permitting attackers to realize in-memory code execution with out writing decrypted payloads to disk.

This method evades conventional file-based defenses and has set off alarms amongst safety groups working in delicate sectors.

The assault chain begins when a logon script delivered by way of an uncovered SMB share executes WinMail[.]exe from the consumer’s AppData listing.

As an alternative of loading the real .NET runtime library, the binary inadvertently masses mscorsvc[.]dll, which comprises the primary stage loader.

As soon as loaded, this DLL establishes a reverse shell by invoking cmd[.]exe and creating learn/write pipes to a command-and-control (C2) server.

Lateral motion and persistence are then orchestrated via hijacked Home windows providers that run with elevated privileges.

Bitdefender analysts famous that the EggStreme framework consists of a number of tightly built-in parts, every chargeable for a definite part of the operation.

The EggStremeLoader, registered as a service, reads an encrypted payload file (ielowutil[.]exe[.]mui) and extracts two extra layers: a reflective loader and the core backdoor agent.

By leveraging reflective injection into trusted processes like winlogon.exe or explorer.exe, the adversary ensures steady execution in reminiscence.

This multi-stage method, with every layer decrypted and injected solely when wanted, makes detection exceedingly troublesome.

In its closing type, the EggStremeAgent establishes a gRPC-based communication channel secured by mutual TLS, authenticating with certificates issued by a shared malicious certificates authority.

EggStreme multi-stage an infection stream (Supply – Bitdefender)

As soon as the backdoor is in reminiscence, its 58 instructions allow distant fingerprinting, file manipulation, registry operations, course of injection, and complicated lateral motion similar to RPC scans and WMIC-based distant course of creation.

An infection Mechanism and DLL Sideloading

EggStreme’s preliminary an infection leverages a refined however highly effective code snippet to hijack the search order for Home windows libraries.

EggStremeWizard (Supply – Bitdefender)

By inserting a malicious DLL alongside WinMail.exe, the malware forces the authentic binary to load attacker-controlled code. A consultant snippet is proven beneath:-

// Pseudo-code illustrating DLL sideloading
HANDLE hModule = LoadLibraryA(“mscorsvc[.]dll”);
if (hModule) {
FARPROC pFunc = GetProcAddress(hModule, “CorBindToRuntime”);
if (pFunc) {
pFunc();
}
}

When WinMail.exe calls LoadLibraryA(“mscorsvc[.]dll”), the Home windows loader searches the native listing first, discovering the malicious DLL as an alternative of the system model.

The loader decrypts its payload utilizing an RC4 key (“Cookies”), checks for an on-disk configuration at %APPDATApercentMicrosoftWindowsCookiesCookies[.]dat, and updates its in-memory C2 record accordingly.

The preliminary handshake contains a 32-byte RC4-encrypted key change, guaranteeing integrity earlier than the shell is created.

Persistence is achieved via two complementary approaches. In some situations, the attackers alter the ServiceDLL registry worth below HKLMSYSTEMCurrentControlSetServicesParameters to level to a malicious DLL.

In others, they exchange service binaries and grant SeDebugPrivilege, permitting the malicious payload to run below the context of a trusted Home windows service.

Each strategies be sure that EggStreme parts are reloaded on each reboot, sustaining a resilient foothold.

Increase your SOC and assist your group defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Capabilities, DLL, EggStreme, Execute, Fileless, Leverages, Malware, Payloads, Sideloading

Post navigation

Previous Post: Cisco Patches High-Severity IOS XR Vulnerabilities
Next Post: Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media

Related Posts

Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution Cyber Security News
Microsoft Investigating Teams and Exchange Online Services Disruption Impacting Users Cyber Security News
Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations Cyber Security News
AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID Cyber Security News
Microsoft 365 Exchange Online Outage Blocks Email on Outlook Mobile App Cyber Security News
MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News