Questions? +1 (202) 335-3939 Login
Trusted News Since 1995
A service for global professionals · Sunday, March 2, 2025 · 790,463,065 Articles · 3+ Million Readers

ANY.RUN Unveils Detailed Analysis of PSLoramyra: A Fileless Malware Loader

DUBAI, DUBAI, UNITED ARAB EMIRATES, December 2, 2024 /EINPresswire.com/ -- The cybersecurity team at ANY.RUN has shared an in-depth look at PSLoramyra, an advanced fileless malware loader that uses PowerShell, VBS, and BAT scripts to break into systems, run malicious code directly in memory, and stay hidden. This in-depth analysis demonstrates the behavior of the loader step by step, showing how it evades traditional detection, bypasses security and maintains control.

๐€๐ง ๐Ž๐ฏ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐จ๐Ÿ ๐๐’๐‹๐จ๐ซ๐š๐ฆ๐ฒ๐ซ๐šโ€™๐ฌ ๐…๐ข๐ฅ๐ž๐ฅ๐ž๐ฌ๐ฌ ๐€๐ญ๐ญ๐š๐œ๐ค ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ

The analysis by ANY.RUN reveals how PSLoramyra, a sophisticated fileless malware loader, uses PowerShell, VBS, and BAT scripts to deliver and execute payloads like Quasar RAT directly in memory, bypassing traditional detection methods.

๐Š๐ž๐ฒ ๐…๐ข๐ง๐๐ข๐ง๐ ๐ฌ ๐Ÿ๐ซ๐จ๐ฆ ๐ญ๐ก๐ž ๐๐’๐‹๐จ๐ซ๐š๐ฆ๐ฒ๐ซ๐š ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ

The research breaks down its infection chain, showing how it creates scheduled tasks for persistence and uses obfuscation techniques to stay hidden, giving cybersecurity professionals a closer look at how to tackle this type of threat:

ยท ๐—™๐—ถ๐—น๐—ฒ๐—น๐—ฒ๐˜€๐˜€ ๐—ผ๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: PSLoramyra operates entirely in memory, leveraging PowerShell to execute malicious payloads, leaving minimal traces on the disk and evading traditional detection methods.

ยท ๐— ๐˜‚๐—น๐˜๐—ถ-๐˜€๐˜๐—ฎ๐—ด๐—ฒ ๐—ถ๐—ป๐—ณ๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ฐ๐—ต๐—ฎ๐—ถ๐—ป: The malware uses a combination of VBS, BAT, and PowerShell scripts, working together to deliver and execute payloads such as the Quasar RAT.

ยท ๐—ฆ๐˜๐—ฒ๐—ฎ๐—น๐˜๐—ต๐˜† ๐—ฝ๐—ฒ๐—ฟ๐˜€๐—ถ๐˜€๐˜๐—ฒ๐—ป๐—ฐ๐—ฒ: It ensures long-term access by creating a Task Scheduler task that runs every two minutes, executing its scripts without user awareness.

ยท ๐—”๐—ฑ๐˜ƒ๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐—ผ๐—ฏ๐—ณ๐˜‚๐˜€๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Obfuscates payloads using hex-encoded strings and custom delimiters, making static analysis and detection more challenging for security tools.

ยท ๐—ž๐—ฒ๐˜† ๐—œ๐—ป๐—ฑ๐—ถ๐—ฐ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€ ๐—ผ๐—ณ ๐—–๐—ผ๐—บ๐—ฝ๐—ฟ๐—ผ๐—บ๐—ถ๐˜€๐—ฒ (๐—œ๐—ข๐—–๐˜€): Unique script names (roox.vbs, roox.bat, roox.ps1), command lines, and malicious domains provide valuable clues for identifying and mitigating the threat.

To dive deeper into the details of PSLoramyraโ€™s techniques, visit ANY.RUNโ€™s blog.

๐€๐›๐จ๐ฎ๐ญ ๐€๐๐˜.๐‘๐”๐

ANY.RUN provides interactive malware analysis tools trusted by over 500,000 cybersecurity professionals worldwide. With powerful features for real-time behavioral analysis, ANY.RUN helps identify threats, reduce investigation time, and provide actionable insights for incident response.

The ANY.RUN team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
X
LinkedIn

Powered by EIN Presswire

Distribution channels: Banking, Finance & Investment Industry, Companies, IT Industry, International Organizations, Technology

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.

Submit your press release