A new malware campaign called SHADOW#REACTOR uses a sophisticated multi-stage attack chain to deploy Remcos RAT on Windows systems. The attack begins with an obfuscated VBS script that launches PowerShell to download fragmented text-based payloads from a remote server. These fragments are reconstructed in memory using a .NET
Sort: