PULSE NAME
In-Memory Loader Drops ScreenConnect
WHITE AlienVault 2026-04-10 Modified: 2026-04-10
12
IOCs
MEDIUM VOLUME
In February 2026, an attack chain was discovered that utilized a fraudulent Adobe Acrobat Reader download page to deceive victims into installing ConnectWise's ScreenConnect, a legitimate remote access tool exploited for malicious purposes. The attack employs sophisticated evasion techniques including heavy obfuscation, .NET reflection for in-memory payload execution, and dynamic code construction. A VBScript loader initiates the chain by downloading and executing obfuscated PowerShell commands that compile C# code entirely in memory. The loader manipulates the Process Environment Block to masquerade as legitimate Windows processes and abuses auto-elevated COM objects to bypass User Account Control without user prompts. This multi-layered approach successfully evades signature-based defenses and hinders forensic analysis while ultimately deploying ScreenConnect for unauthorized remote access.
Indicators of Compromise (12)
All FileHash-MD5 URL domain
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 07720d8220abc066b6fdb2c187ae58f5 2026-04-10
FileHash-MD5 07f95ff34fb330875d80afadca3f0d5b 2026-04-10
FileHash-MD5 3d389886e95f00fade1eea67a6c370d1 2026-04-10
FileHash-MD5 3effadb977eddd4c48c7850c8dc03b13 2026-04-10
FileHash-MD5 a7e5dbec37c8f431d175dfd9352db59f 2026-04-10
FileHash-MD5 c02448e016b2568173de3eedadd80149 2026-04-10
FileHash-MD5 c36910c4c8d23ec93f6ae7d7a2496ce5 2026-04-10
FileHash-MD5 e4b594a18fc2a6ee164a76bdea980bc0 2026-04-10
URL http://eshareflies.im/ad/ 2026-04-10
URL http://x0.at/qOfN.msi 2026-04-10
URL https://x0.at/qOfN.msi 2026-04-10
domain eshareflies.im 2026-04-10