Multi-Stage Windows Malware Uses PowerShell and Text Files to Deliver Payloads

Related

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

A multi-stage Windows malware uses text-based payloads to invoke a PowerShell Downloader, known as SHADOW#REACTOR. The malware has been identified by Securonix researchers as a sophisticated Windows threat employing a multi-stage delivery mechanism. Initial infection occurs when a victim runs an obfuscated Visual Basic Script (typically delivered via social engineering or compromised websites), which then spawns PowerShell processes to retrieve segmented payload fragments from a remote host. These fragments are encoded as plain text files (e.g., .txt) to evade traditional binary detection and are later reconstructed in memory using reflective loading techniques linked to Remcos RAT. This layered approach complicates detection and enables persistent remote access. 

Who is affected

Windows systems where users execute untrusted scripts are at direct risk of SHADOW#REACTOR infection and subsequent installation of remote access tools; enterprise environments relying on endpoint defenses may face undetected in-memory threats. 

Why CISOs should care

This campaign highlights increasing threat actor sophistication in using living-off-the-land tools and text-based staging to bypass detection, emphasizing the need for advanced behavioral monitoring and script control to mitigate in-memory malware threats. 

3 practical actions

  • Control script execution: Restrict execution of scripts from untrusted sources and enforce application control policies.
  • Enhance behavioral detection: Deploy endpoint detection capable of identifying anomalous PowerShell and in-memory activity.
  • Educate users on phishing risks: Train staff to recognize and avoid executing suspicious attachments or links.