← Back to Pulse Feed
PULSE DETAIL
In February 2026, an attack chain was discovered that utilized a fraudulent Adobe Acrobat Reader download page to deceive victims into installing ConnectWise's ScreenConnect, a legitimate remote access tool exploited for malicious purposes. The attack employs sophisticated evasion techniques including heavy obfuscation, .NET reflection for in-memory payload execution, and dynamic code construction. A VBScript loader initiates the chain by downloading and executing obfuscated PowerShell commands that compile C# code entirely in memory. The loader manipulates the Process Environment Block to masquerade as legitimate Windows processes and abuses auto-elevated COM objects to bypass User Account Control without user prompts. This multi-layered approach successfully evades signature-based defenses and hinders forensic analysis while ultimately deploying ScreenConnect for unauthorized remote access.
MITRE ATT&CK & Malware Families
Indicators of Compromise (8 / 12 total)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| FileHash-MD5 | 07720d8220abc066b6fdb2c187ae58f5 | — | 2026-04-10 | |
| FileHash-MD5 | 07f95ff34fb330875d80afadca3f0d5b | — | 2026-04-10 | |
| FileHash-MD5 | 3d389886e95f00fade1eea67a6c370d1 | — | 2026-04-10 | |
| FileHash-MD5 | 3effadb977eddd4c48c7850c8dc03b13 | — | 2026-04-10 | |
| FileHash-MD5 | a7e5dbec37c8f431d175dfd9352db59f | — | 2026-04-10 | |
| FileHash-MD5 | c02448e016b2568173de3eedadd80149 | — | 2026-04-10 | |
| FileHash-MD5 | c36910c4c8d23ec93f6ae7d7a2496ce5 | — | 2026-04-10 | |
| FileHash-MD5 | e4b594a18fc2a6ee164a76bdea980bc0 | — | 2026-04-10 |