Categories: Cyber Security News

Hackers Leverage AutoIT Code to Deliver Malware Attacking Windows System

A sophisticated malware campaign utilizing multiple layers of AutoIT code has been discovered targeting Windows systems.

The attack begins with a seemingly innocent executable file named “1. Project” that initiates a complex infection chain designed to deploy a Remote Access Trojan (RAT).

This campaign represents a concerning evolution in threat actors’ tactics, leveraging the flexibility of AutoIT, a scripting language capable of deep interaction with Windows operating system components.

The initial payload establishes communication with command and control infrastructure hosted at “hxxps://xcvbsfq32e42313[.]xyz” while creating multiple files on the victim’s system, including a PowerShell script and additional AutoIT code.

These components work together to ensure persistence and evade detection while the malware establishes a foothold on the compromised system.

SANS Technology Institute researchers identified the campaign on May 19, 2025, noting its multi-stage approach that makes analysis particularly challenging.

The researchers highlighted that this technique allows attackers to modify individual components independently, creating a modular attack framework that can be rapidly adapted to bypass new security measures.

The infection mechanism employs an intricate, layered approach starting with the initial AutoIT executable. Upon execution, the malware generates a PowerShell script at “C:UsersPublicPublicProfile.ps1” and downloads a secondary AutoIT script named “Secure.au3” from the attacker’s server.

This second-layer script is executed by a component labeled “SwiftWrite.pif” which serves as an AutoIT interpreter.

The second AutoIT layer contains sophisticated obfuscation techniques, including a custom encoding function called “Wales” that decodes strings during runtime.

This layer also performs security product detection, checking specifically for “avastui[.]exe” to determine if Avast antivirus is running on the system.

In the final stage, the malware spawns a “jsc[.]exe” process and injects it with a malicious DLL named “Urshqbgpm.dll” which attempts to establish connection with the command and control server, completing the attack chain.

How SOC Teams Save Time and Effort with ANY.RUN - Live webinar for SOC teams and managers

The post Hackers Leverage AutoIT Code to Deliver Malware Attacking Windows System appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Vanilla Scroll Sky: Pure CSS Scrollytelling Library

Vanilla Scroll Sky is a pure CSS scrollytelling library that creates sticky image reveals and…

3 minutes ago

CSS Framework With Almost No Classes – no.css

no.css is a pure CSS front-end framework that helps developers quickly create modern web pages…

4 minutes ago

Michigan Medicine and Blue Cross negotiations cause stress for thousands of patients

DETROIT, MICH. (WOWO) Patients who rely on both Blue Cross Blue Shield and Michigan Medicine…

31 minutes ago

New BitUnlocker Downgrade Attack on Windows 11 Allows Access to Encrypted Disks Within 5 Minutes

A new tool, BitUnlocker, reveals a practical downgrade attack against Microsoft’s BitLocker encryption, allowing attackers…

32 minutes ago

Hackers Abuse CVE-2026-41940 to Take Over cPanel and WHM Servers

A fatal authentication bypass vulnerability is actively affecting cPanel and WebHost Manager (WHM) servers worldwide.…

32 minutes ago

84 TanStack npm Packages Hacked in Ongoing Supply-Chain Attack Targeting CI Credentials

A significant supply-chain compromise affecting 84 npm package artifacts across the TanStack namespace. The malicious…

32 minutes ago

This website uses cookies.