Executive Summary
At Point Wild, our threat research continuously monitors evolving attacker techniques designed to bypass traditional security controls. Modern malware campaigns are no longer defined by a single file dropped onto disk; They are carefully orchestrated, multi-stage intrusions engineered for stealth, evasion, and persistence. This analysis uncovers a sophisticated fileless Remcos RAT attack chain that begins with a socially engineered phishing email and rapidly escalates into a fully in-memory compromise, leveraging native Windows components to evade conventional detection mechanisms.
The attack chain is initiated through a phishing email containing a ZIP attachment disguised as a legitimate business document. Upon execution, an obfuscated JavaScript dropper establishes the initial foothold and retrieves a remote PowerShell script, which acts as a reflective loader. This loader employs multiple layers of obfuscation, including Base64 encoding, Raw Binary manipulation, and rotational XOR encryption, to reconstruct and execute a .NET payload entirely in memory. By eliminating reliance on disk-based artifacts, the malware significantly reduces its detection surface while maintaining full control over the infected system.
A defining characteristic of this campaign is its abuse of trusted system binaries, specifically aspnet_compiler.exe, as a Living-off-the-Land Binary (LOLBin) to proxy malicious execution under the guise of legitimate processes. The final payload is not statically embedded but retrieved dynamically from a remote Command-and-Control (C2) server, enabling flexible payload delivery and further complicating detection. This layered execution flow( phishing → JavaScript dropper → PowerShell reflective loading → network-delivered) payload demonstrates how attackers combine scripting environments, obfuscation, and legitimate tools to operate covertly.
Notably, the use of encoded PowerShell (Base64/ASCII) alongside aspnet_compiler.exe for in-memory execution aligns with techniques observed in prior Remcos campaigns, reinforcing the reuse and evolution of proven attacker tradecraft. This campaign highlights the increasing sophistication of multi-stage, obfuscated, and fileless malware, where attackers rely on trusted binaries and encrypted execution chains to bypass security defenses.
Introduction
This research presents a comprehensive analysis of a malicious .eml sample that exemplifies this shift in attacker tradecraft. The investigated sample demonstrates a complete end-to-end infection chain, beginning with a socially engineered phishing email and progressing through multiple execution stages, ultimately resulting in the in-memory deployment of a .NET payload.
The study provides a detailed breakdown of each stage of the attack lifecycle, including:
- Initial Access: Delivery of a phishing email containing a ZIP attachment disguised as a legitimate business document
- Execution: Use of an obfuscated JavaScript file acting as a dropper via Windows Script Host
- Payload Delivery: Retrieval and execution of a remote PowerShell script using execution policy bypass techniques
- Multi-Layer Obfuscation: Decoding of embedded payloads using Base64 encoding and rotational XOR encryption
- Fileless Execution: Reflective loading and in-memory execution of a .NET Portable Executable
- Defense Evasion: Abuse of trusted Windows binaries such as aspnet_compiler.exe (LOLBin) to proxy execution
- Post-Exploitation Behavior: Command-and-control (C2) communication for tasking and data exfiltration, along with the creation of artifacts such as C:\ProgramData\remcos\logs.dat, indicating active data collection and staging.
- Network-Based Additional Payload Delivery: Retrieval of a secondary payload from a remote Command-and-Control (C2) server following initial in-memory execution, enabling extended functionality and dynamic capability enhancement
Overall, this research aims to provide both a technical deep dive into a real-world multi-stage malware campaign and actionable insights into how such threats operate, evolve, and can be mitigated in environments where traditional detection approaches face increasing limitations.
Attack Flow

Fig 1: Attack Flow
Stage 1: Initial Access via Phishing Email
The attack begins with a malicious .eml file containing a ZIP attachment: MV MERKET COOPER SPECIFICATION.zip
This naming mimics a legitimate business document, leveraging social engineering to trick users into execution.

Fig 2: Email Attachment
Stage 2: Malicious Attachment (JavaScript Dropper)
Inside the archive:

Fig 3: Zip containing javascript File
MV MERKET COOPER SPECIFICATION.zip contains MV MERKET COOPER SPECIFICATION.js
Analysis of MV MERKET COOPER SPECIFICATION.js :-

Fig 4: MV MERKET COOPER SPECIFICATION.js image
The extracted JavaScript file is heavily obfuscated, using string-mapping functions and encoded arrays to conceal its true behavior. This technique hides critical indicators such as URLs, commands, and object names, making static analysis difficult.
Upon deobfuscation, the script reveals the following core functionality:
- Creates ActiveX objects including:
- WScript.Shell (command execution)
- MSXML2.XMLHTTP (HTTP communication)
- Scripting.FileSystemObject (file operations)
- Initiates an outbound request to download a remote PowerShell payload:
https[:]//almacensantangel[.]com/ENCRYPT[.]Ps1
- Executes the payload using PowerShell with execution policy bypass (nop -ep bypass), ensuring unrestricted execution.
This stage is critical, as it transforms a simple phishing attachment into an active infection by retrieving and executing the next-stage payload without raising immediate suspicion.
Stage 3: PowerShell Obfuscation and Fileless Payload Execution Technique
The technique is not fully fileless, as the initial PowerShell loader exists as a file or artifact; however, the embedded payload is reconstructed, decrypted, and executed entirely in memory without being written to disk.
Analysis of Encrypt.ps1:
Step 1: Encrypted Data

Fig 5: Encrypted Data in ps1 file
This PowerShell snippet implements the first stage of a multi-layered obfuscation framework. The payload is stored as a large Base64-encoded string in the $securecontainer variable, concealing its actual content. This data is later processed through rotational XOR-based decryption in subsequent stages, making analysis difficult. Such techniques are commonly used in PowerShell malware to hide payloads and enable in-memory execution while evading detection.
Step 2: Base64 Reconstruction Module

Fig 6: Base64 Reconstruction Module image
The function $base64reconstruction removes newline characters from the encoded strings and converts them using [Convert]::FromBase64String, producing raw byte arrays for both the payload and the key.
Step 3: Rotational XOR Decryption Module

Fig 7: Rotational XOR Decryption Module image
The function $xorrotational decrypts the payload by XORing each byte with a dynamically selected key byte. The key index is calculated using ($bytePosition + $rotationTracker) % $keyMaterial.Length, and the rotation state is updated as ($rotationTracker + keyByte) % 7, introducing a variable key progression.
Step 4: Decryption Orchestration Module

Fig 8: Decryption Orchestration Module image
The $masterdecoder function invokes Base64 reconstruction for both payload and key, applies the rotational XOR decryption, and converts the resulting byte array into a UTF-8 string for execution.
Step 5: Execution Handler Module

Fig 9: Execution Handler Module image
The $executionhandler executes the decrypted script using multiple methods: Invoke-Expression, inline script execution, and [ScriptBlock]::Create().Invoke(). It employs a try-catch fallback mechanism to ensure execution even if one method fails.
Decoded Script: In-Memory Execution of ALTERNATE.dll
After completing the decryption stages in ENCRYPT.Ps1, the recovered PowerShell script reveals a secondary execution layer responsible for loading and executing a .NET assembly entirely in memory.

Fig 10: Base64 encoded blob image
The script contains a large Base64-encoded blob which, upon decoding and analysis using CFF Explorer, the embedded payload was identified as ALTERNATE.dll, confirming that the script functions as a loader for a compiled .NET binary rather than a standalone PowerShell payload.

Fig 11: ALTERNATE.dll File info
Reflection-Based Assembly Loading

Fig 12: Reflection-Based Assembly Loading image
The decoded ALTERNATE.dll is loaded directly into memory using the .NET reflection API. This technique avoids writing the binary to disk, significantly reducing forensic artifacts and enabling stealthy execution, one of the core characteristics of fileless malware.
Dynamic Method Invocation

Fig 13: Dynamic Method Invocation image
The script dynamically resolves and invokes a method within the loaded assembly. This approach allows flexible execution of the payload without hardcoding entry points, increasing adaptability and complicating static analysis.
Process-Based Execution Control

Fig 14: Process-Based Execution Control image
Execution of the assembly is conditionally triggered based on the absence of the Aspnet_compiler process. This likely serves as an execution guard or anti-analysis mechanism, ensuring controlled payload deployment.
Execution Behavior and Fileless Characteristics
The decoded script operates as a memory-resident loader that continuously evaluates execution conditions and triggers payload execution when criteria are met.
Notably, the malware demonstrates clear fileless execution behavior:
- The .NET assembly (ALTERNATE.dll) is loaded and executed directly in memory using reflection
- No intermediate files are written to disk during assembly execution
- The script leverages a trusted system binary (Aspnet_compiler.exe), blending malicious activity with legitimate processes
- Payload delivery and execution occur without creating traditional file-based artifacts
Second-Stage Payload Extraction: Cqeqpvzeia.exe
Further analysis revealed that the script embeds a secondary payload within a byte array assigned to $ExecutionPayload.

Fig 15: Second-Stage payload image
The byte sequence begins with 77, 90 (“MZ”), confirming that it represents a valid Portable Executable (PE) file. Unlike the initial stage, this payload is stored in its raw binary form, without additional encoding or encryption.
Although not explicitly dropped to disk by the script, this payload is passed during execution, indicating that it is likely executed via in-memory techniques such as reflective loading or process injection.
Manual Reconstruction
To analyze this payload, I manually reconstructed the byte array into a binary file:
- Converted the byte array into a binary stream
- Rebuilt the PE structure
- Validated the file using PE analysis tools
This process successfully recovered the final payload, identified as:

Fig 16: Cqeqpvzeia.exe file Info
Observed Behavior: Living-off-the-Land Binary (LOLBins) Abuse

Fig 17: Embedding payload in aspnet_compiler.exe
The use of Aspnet_compiler.exe, a legitimate Microsoft .NET utility, indicates a Living-off-the-Land (LotL) technique combined with fileless execution techniques. Instead of dropping and executing a standalone malicious executable, the attacker leverages a trusted system binary to facilitate payload execution.
Network Activity from aspnet_compiler.exe to External Host

Fig 18: Network Activity from aspnet_compiler.exe to external host
The abused process aspnet_compiler.exe (a legitimate Microsoft .NET tool) is repeatedly performing:
- TCP Connect
- TCP Send
- TCP Receive
It is communicating from a local machine (DESKTOP-LHEVM3U on port 53352) to a remote host : 192-3-27-141.host.colocrossing.com:8087
All operations return SUCCESS, meaning the connections are active and data is being exchanged.The repeated send/receive entries indicate continuous communication, not just a one-time request.
Network Packet Analysis

Fig 19: Network Packet Analysis image

Fig 20: Decrypted Network Packet string image
The captured traffic confirms that aspnet_compiler.exe is initiating outbound communication from host to 192[.]3[.]27[.]141[:]8087, and the payload includes the path ProgramData\Remcos\logs.dat, which corresponds to an actual file present on the infected system.

Fig 21: Keystroke log image
Live Capture: Obfuscated Malware Delivered Across the Network

Fig 22: Live Capturing of malware delivered across the network image
The packet capture shows a Windows PE (.EXE) file being transferred from an external host (192[.]3[.]27[.]141[:]8087) to an internal host system.
Key Points:
- PE Signature: Contains MZ header and .text / .data sections, confirming a Windows executable.
- Packed Binary: MPRESS1 indicates the executable is compressed/obfuscated, likely to evade detection.
- Transfer Pattern: Continuous TCP stream suggests full binary delivery in chunks.
The capture provides strong evidence of a maliciously packed executable being delivered in real time from an external host to a local system.
Detection and Mitigation

Fig 23: Threat detected with UltraAV
UltraAV, powered by Point Wild, helps defend against such threats by focusing on early-stage detection and known malicious indicators across the attack chain. This includes:
- Detection of malicious and obfuscated script files.
- Identification of encoded and packed payload patterns
- Blocking of known malicious files, URLs, and indicators of compromise (IOCs)
- Continuous updates driven by threat intelligence and malware research
While fileless malware reduces traditional disk visibility, it still depends on identifiable components such as malicious scripts, encoded payloads, and known infrastructure. By targeting these critical elements, UltraAV provides effective protection at early entry and staging points helping prevent compromise before full payload execution.
Indicators of Compromise (IOCs)
| Md5/File name | Description |
| 75b7ed9f524cdb1c6f044864c4d3353c | Initial eml file(Phishing email) |
| a739d0c4821d2bc1b8a226a5d8846c28 | MV MERKET COOPER SPECIFICATION.zip |
| a5c70d896526146238a15a93dfdb2f97 | MV MERKET COOPER SPECIFICATION.js |
| https[:]//almacensantangel[.]com/ENCRYPT[.]Ps1 | Malicious payload delivery URL. |
| d79dbfab8af7a6f19b6abf934a90c1b7 | ENCRYPT.Ps1 |
| 957b2710fef66141707064c76f1dd1a9 | ALTERNATE.dll |
| 508c092eaf1c1a178195aadfa1b7ecae | Cqeqpvzeia.exe |
| 192[.]3[.]27[.]141[:]8087 | C2 server |
| 0a9728de22d85c6a2b375924bfb643dc | MPress Packed payload delivered from C2 server |
Conclusion
This campaign follows a structured, multi-stage attack chain beginning with a phishing email delivering a ZIP attachment containing an obfuscated JavaScript dropper. The script executes via Windows Script Host and retrieves a remote PowerShell loader, which applies multiple layers of obfuscation (Base64 and XOR) to prepare the payload. The malware then performs fileless execution through reflective in-memory loading while abusing aspnet_compiler.exe as a Living-off-the-Land Binary to evade detection.
Following initial execution, the malware establishes C2 communication and performs additional network-based payload delivery, retrieving secondary components to extend functionality. Post-exploitation activity includes data collection and staging, evidenced by the creation of “C:\ProgramData\remcos\logs.dat”, confirming active exfiltration behavior.
Additional Resources
For readers interested in related Remcos research, how Remcos has evolved over time, and the latest attack techniques:
- Trojan.WinLNK/Powershell Runner – Analysis of a Remcos delivery chain leveraging LNK files and PowerShell-based staged execution https://www.pointwild.com/threat-intelligence/trojan-winlnk-powershell-runner/
- Remcos Revisited: Inside the RAT’s Evolving Command-and-Control Techniques – Overview of Remcos C2 communication patterns, modular payload delivery, and evasion techniques https://www.pointwild.com/threat-intelligence/remcos-revisited-inside-the-rats-evolving-command-and-control-techniques/
- Executive Summary
- Introduction
- Attack Flow
- Decoded Script: In-Memory Execution of ALTERNATE.dll
- Reflection-Based Assembly Loading
- Dynamic Method Invocation
- Process-Based Execution Control
- Execution Behavior and Fileless Characteristics
- Second-Stage Payload Extraction: Cqeqpvzeia.exe
- Manual Reconstruction
- Observed Behavior: Living-off-the-Land Binary (LOLBins) Abuse
- Network Activity from aspnet_compiler.exe to External Host
- Network Packet Analysis
- Live Capture: Obfuscated Malware Delivered Across the Network
- Detection and Mitigation
- Indicators of Compromise (IOCs)
- Conclusion
- Additional Resources