Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows

Posted on June 30, 2025June 30, 2025 By CWS

A complicated new phishing marketing campaign has emerged, leveraging out of date Home windows file codecs and superior evasion methods to distribute the infamous Remcos Distant Entry Trojan.

The assault chain employs DBatLoader as its main supply mechanism, using a mixture of Consumer Account Management bypass strategies, obfuscated scripts, and Dwelling Off the Land Binaries abuse to ascertain persistent entry to compromised programs.

The marketing campaign begins with fastidiously crafted phishing emails containing malicious archives that home an executable named “FAKTURA,” designed to deploy DBatLoader onto goal programs.

This multi-stage assault represents a regarding evolution in malware distribution methods, as menace actors more and more exploit professional Home windows functionalities and outdated file codecs to evade fashionable safety options.

Any.Run analysts recognized this marketing campaign by means of complete sandbox evaluation, revealing the intricate strategies employed by the malware to take care of stealth and persistence.

The researchers famous that the assault leverages Program Info Information (.pif), initially designed for configuring DOS-based applications in early Home windows programs, as a disguise mechanism for malicious executables.

Trailing areas permit attackers to abuse Home windows’s folder identify dealing with (Supply – Any.Run)

The implications of this marketing campaign lengthen past particular person infections, because the methods demonstrated may very well be tailored and weaponized by different menace actors.

The subtle mixture of UAC bypass, course of injection, and scheduled job abuse creates a sturdy an infection framework that challenges conventional detection methodologies and requires superior behavioral evaluation for identification.

An infection Mechanism and UAC Bypass Strategies

The core innovation of this marketing campaign lies in its exploitation of .pif recordsdata and Home windows folder identify dealing with vulnerabilities.

The malicious alpha.pif file, functioning as a Moveable Executable, circumvents Consumer Account Management by creating misleading directories comparable to “C:Home windows ” with trailing areas.

ANY.RUN flags PING.EXE exercise and identifies it as a delay simulation (Supply – Any.Run)

This system exploits Home windows’s folder identify parsing mechanisms, permitting the malware to realize elevated privileges with out triggering customary UAC prompts.

The assault employs refined time-based evasion by means of PING.EXE abuse, executing the command to ping the native loopback handle (127.0.0.1) ten instances.

Whereas professional purposes use this for community connectivity testing, DBatLoader repurposes this performance to introduce synthetic delays, serving to evade time-sensitive detection programs.

For persistence, the malware establishes a scheduled job that triggers a Cmwdnsyn.url file, which subsequently launches the .pif dropper.

The marketing campaign additional employs BatCloak obfuscation for .cmd recordsdata and makes use of extrac32.exe to control Home windows Defender exclusion lists.

As soon as deployed, Remcos injects itself into trusted system processes together with SndVol.exe and colorcpl.exe, various its goal processes throughout situations to mix seamlessly with professional system operations.

Examine stay malware habits, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:.PIF, Bypass, Drop, Files, Hackers, Malware, Remcos, UAC, Windows

Post navigation

Previous Post: NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO
Next Post: 2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability

Related Posts

Behavioral Analysis for Detecting APT Intrusions in Real Time Cyber Security News
2,000+ Devices Hacked Using Weaponized Social Security Statement Themes Cyber Security News
Top 5 WMIC Commands Used By Malware  Cyber Security News
Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Cyber Security News
AI Security Frameworks – Ensuring Trust in Machine Learning Cyber Security News
Securing Generative AI – Mitigating Data Leakage Risks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News