Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads

Posted on September 11, 2025September 12, 2025 By CWS

A beforehand unknown superior persistent risk (APT) group has unleashed a brand new fileless malware framework, dubbed EggStreme, in a extremely focused espionage marketing campaign towards strategic organizations.

Rising in early 2024, EggStreme exploits the authentic Home windows Mail executable (WinMail[.]exe) to sideload a malicious library, permitting attackers to realize in-memory code execution with out writing decrypted payloads to disk.

This method evades conventional file-based defenses and has set off alarms amongst safety groups working in delicate sectors.

The assault chain begins when a logon script delivered by way of an uncovered SMB share executes WinMail[.]exe from the consumer’s AppData listing.

As an alternative of loading the real .NET runtime library, the binary inadvertently masses mscorsvc[.]dll, which comprises the primary stage loader.

As soon as loaded, this DLL establishes a reverse shell by invoking cmd[.]exe and creating learn/write pipes to a command-and-control (C2) server.

Lateral motion and persistence are then orchestrated via hijacked Home windows providers that run with elevated privileges.

Bitdefender analysts famous that the EggStreme framework consists of a number of tightly built-in parts, every chargeable for a definite part of the operation.

The EggStremeLoader, registered as a service, reads an encrypted payload file (ielowutil[.]exe[.]mui) and extracts two extra layers: a reflective loader and the core backdoor agent.

By leveraging reflective injection into trusted processes like winlogon.exe or explorer.exe, the adversary ensures steady execution in reminiscence.

This multi-stage method, with every layer decrypted and injected solely when wanted, makes detection exceedingly troublesome.

In its closing type, the EggStremeAgent establishes a gRPC-based communication channel secured by mutual TLS, authenticating with certificates issued by a shared malicious certificates authority.

EggStreme multi-stage an infection stream (Supply – Bitdefender)

As soon as the backdoor is in reminiscence, its 58 instructions allow distant fingerprinting, file manipulation, registry operations, course of injection, and complicated lateral motion similar to RPC scans and WMIC-based distant course of creation.

An infection Mechanism and DLL Sideloading

EggStreme’s preliminary an infection leverages a refined however highly effective code snippet to hijack the search order for Home windows libraries.

EggStremeWizard (Supply – Bitdefender)

By inserting a malicious DLL alongside WinMail.exe, the malware forces the authentic binary to load attacker-controlled code. A consultant snippet is proven beneath:-

// Pseudo-code illustrating DLL sideloading
HANDLE hModule = LoadLibraryA(“mscorsvc[.]dll”);
if (hModule) {
FARPROC pFunc = GetProcAddress(hModule, “CorBindToRuntime”);
if (pFunc) {
pFunc();
}
}

When WinMail.exe calls LoadLibraryA(“mscorsvc[.]dll”), the Home windows loader searches the native listing first, discovering the malicious DLL as an alternative of the system model.

The loader decrypts its payload utilizing an RC4 key (“Cookies”), checks for an on-disk configuration at %APPDATApercentMicrosoftWindowsCookiesCookies[.]dat, and updates its in-memory C2 record accordingly.

The preliminary handshake contains a 32-byte RC4-encrypted key change, guaranteeing integrity earlier than the shell is created.

Persistence is achieved via two complementary approaches. In some situations, the attackers alter the ServiceDLL registry worth below HKLMSYSTEMCurrentControlSetServicesParameters to level to a malicious DLL.

In others, they exchange service binaries and grant SeDebugPrivilege, permitting the malicious payload to run below the context of a trusted Home windows service.

Each strategies be sure that EggStreme parts are reloaded on each reboot, sustaining a resilient foothold.

Increase your SOC and assist your group defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Capabilities, DLL, EggStreme, Execute, Fileless, Leverages, Malware, Payloads, Sideloading

Post navigation

Previous Post: Cisco Patches High-Severity IOS XR Vulnerabilities
Next Post: Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media

Related Posts

Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Cyber Security News
New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities Cyber Security News
Amazon Uncovers Root Cause of Major AWS Outage That Brokes The Internet Cyber Security News
Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Cyber Security News
NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads Cyber Security News
Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News