Post

Deadvax Threat Research Security Advisory

Deadvax Threat Research Security Advisory

Deadvax Threat Research Security Advisory 🚨

Source: Securonix
Date Published: February 5, 2026

Securonix Threat Research has been tracking a stealthy malware campaign that utilizes an uncommon chain of VHD abuse, script-based execution, self-parsing batch logic, fileless PowerShell injections, and ultimately drops RAT. This research documents a real-world, multi-stage DeadVax campaign that exemplifies this evolution in attacker tradecraft.

Key Findings 🔍

  • The infection chain begins with a phishing email delivering a Virtual Hard Disk (VHD) hosted on IPFS infrastructure.
  • The campaign uses IPFS-hosted VHD files disguised as business documents (DOCX/PDF) to bypass email gateway controls and reduce user suspicion.
  • The script-centric delivery chain flows through WSF, batch, and PowerShell scripts, complicating static detection.
  • The final malware stage is stored as noise-polluted Base64 data, decoded into raw shellcode and never written to disk in decrypted form.

Attack Details 📧

The attack begins with a phishing email impersonating Progressive Components (procoms.com). The attacker spoofs procoms.com via display name, but the actual sending domain is likely the compromised or malicious mingyitc.com. The email includes a fake “Virus scan completed. No threats detected” banner, and while it claims the attachment is a PDF, the downloaded file is actually a virtual hard disk .vhd container.

After downloading, when a user tries to open this PDF-looking file, it mounts as a virtual hard drive. This technique is highly effective for evasion, as files inside the VHD do not inherit the mark of the web. The mounted drive contains a WSF script designed to trick the user into thinking it’s a PDF document.

Conclusion 📝

Dynamic analysis confirmed that the shellcode deploys a fully functional AsyncRAT implant. This advisory serves as a critical reminder of the evolving tactics used by cybercriminals and the importance of vigilance in cybersecurity practices.

To read the complete article see: Read full article

This post is licensed under CC BY 4.0 by the author.