Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 1, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 1, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 1, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 1, 2025

      My top 5 must-play PC games for the second half of 2025 — Will they live up to the hype?

      June 1, 2025

      A week of hell with my Windows 11 PC really makes me appreciate the simplicity of Google’s Chromebook laptops

      June 1, 2025

      Elden Ring Nightreign Night Aspect: How to beat Heolstor the Nightlord, the final boss

      June 1, 2025

      New Xbox games launching this week, from June 2 through June 8 — Zenless Zone Zero finally comes to Xbox

      June 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Record Android App using SQLite

      June 1, 2025
      Recent

      Student Record Android App using SQLite

      June 1, 2025

      When Array uses less memory than Uint8Array (in V8)

      June 1, 2025

      Laravel 12 Starter Kits: Definite Guide Which to Choose

      June 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My top 5 must-play PC games for the second half of 2025 — Will they live up to the hype?

      June 1, 2025
      Recent

      My top 5 must-play PC games for the second half of 2025 — Will they live up to the hype?

      June 1, 2025

      A week of hell with my Windows 11 PC really makes me appreciate the simplicity of Google’s Chromebook laptops

      June 1, 2025

      Elden Ring Nightreign Night Aspect: How to beat Heolstor the Nightlord, the final boss

      June 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Ghost in the Shell: Null-AMSI Bypasses Security to Deploy AsyncRAT

    Ghost in the Shell: Null-AMSI Bypasses Security to Deploy AsyncRAT

    February 21, 2025

    AsyncRAT

    Cyble Research and Intelligence Labs (CRIL) has uncovered a stealthy campaign that uses malicious LNK files disguised as seemingly innocent wallpapers to deliver AsyncRAT—an infamous remote access trojan (RAT).  

    This attack chain is designed to exploit various vulnerabilities, utilizing sophisticated techniques to evade detection and achieve persistence on the victim’s system. With advanced evasion methods like Null-AMSI, this campaign has the potential to bypass traditional security measures, posing a cyber risk to users worldwide. 

    Overview of the AsyncRAT Campaign 

    Cyble Research and Intelligence Labs have traced the origins of this campaign to a Portuguese-speaking threat actor. Evidence in the form of comments and error messages within the malicious scripts indicates that the attackers are likely native to a Portuguese-speaking region, potentially leveraging this to avoid detection or forensic analysis.

    AsyncRAT Campaign 
    Infection chain (Source: Cyble)

    The campaign’s infection method is deceptively simple: attackers exploit the victim’s interests by offering a wallpaper featuring popular characters like Sasuke Uchiha from Naruto—or other anime characters like Itachi Uchiha—through a malicious LNK shortcut. These LNK files, once executed, unleash a multi-stage malware attack, eventually deploying AsyncRAT for remote control of the victim’s machine.

    Upon activation, the LNK file runs an obfuscated PowerShell script that connects to external servers to retrieve additional malicious payloads. These payloads execute directly in memory, ensuring that they don’t leave traces on the disk, making it harder for antivirus software to detect them. The payloads downloaded by these scripts are encrypted and compressed, further hindering security researchers from analyzing them.

    The Role of Null-AMSI 

    Null-AMSI 
    Malicious LNK file (Source: Cyble)

    One of the most concerning aspects of this campaign is the use of Null-AMSI, an open-source tool that allows the attackers to bypass the AMSI—an important security feature built into Windows to detect and block malicious scripts. Null-AMSI enables malware to evade detection by disabling AMSI and ETW. This tool is critical for the attackers as it ensures their payloads can execute without triggering security alerts. 

    Using techniques such as reflection and native .NET functions, Null-AMSI manipulates memory in real-time to bypass AMSI protections. The attackers exploit these memory manipulations to patch key system functions, thus avoiding detection and allowing their malware to run freely in the background without being flagged by security software.

    Infection Chain and Payload Delivery 

    AsyncRAT campaign Sasuke
    Lure Image (Source: Cyble)

    The infection chain begins when the victim unknowingly executes the malicious LNK file, often disguised as a sasuke wallpaper.lnk. This file executes an obfuscated PowerShell script via the command line, which fetches a secondary payload from an external URL and executes it directly in memory. This initial payload is an important step in the infection chain, as it retrieves more files, including batch scripts responsible for ensuring the malware’s persistence. 

    lure image 2
    Lure Image 2 (Source: Cyble)

    Once the malware payload is downloaded, it further obfuscates its actions by employing AES encryption and GZIP compression. This makes it extremely difficult for security solutions to detect the malware before it is executed. Upon successful decryption and decompression, the final stage of the malware deployment involves the AsyncRAT payload, which is responsible for giving the attacker full remote control over the compromised system.

    Technical Deep Dive 

    The attacker’s use of AsyncRAT is crucial to the campaign’s success. AsyncRAT allows the threat actor to steal sensitive data, install additional malware, and execute arbitrary commands on the victim’s machine. The final payload is carefully hidden within encrypted files, such as a sasuke wallpaper, which serves as the lure to distract the victim. The wallpaper file contains hidden Base64-encoded malicious content that activates in the background, ultimately delivering the AsyncRAT payload.

    The output.bat file is a particularly important part of this attack. It is highly obfuscated and contains Base64-encoded PowerShell code that, when executed, retrieves another PowerShell script designed to bypass AMSI and ETW. This step is crucial in ensuring that the attack is not detected by traditional security tools. 

    Once the malware executes, it alters the system’s memory protections and patches key system functions, effectively disabling the AMSI and ETW. This ensures that the malicious activity remains hidden from security programs, allowing the attackers to maintain control over the system.

    Reflection Loading and Persistence 

    The final step in the infection chain involves reflection loading, a technique where the malware executes code directly within PowerShell memory. This allows the attackers to inject malicious code into memory without writing it to disk, making detection even more difficult. The AsyncRAT loader ensures persistence by copying itself to the startup folder, ensuring that it runs every time the system starts.

    Once the AsyncRAT payload is loaded, it establishes control over the victim’s system, allowing the attacker to remotely control the machine, steal data, install additional malware, or launch further attacks.

    Bypassing Traditional Security Measures 

    The campaign’s use of Null-AMSI and other advanced techniques demonstrates a growing trend in the cyber threat landscape: attackers are increasingly leveraging sophisticated tools to bypass traditional security measures. By exploiting vulnerabilities in PowerShell, AMSI, and ETW, the attackers are able to stealthily deploy AsyncRAT without triggering any security alerts. 

    The encryption and compression techniques further complicate the analysis, as the malicious payloads are hidden until they are decrypted and executed dynamically. This makes it difficult for security tools to catch the attack before it is fully deployed. 

    Conclusion 

    This campaign highlights the growing sophistication of cyberattacks, where advanced evasion techniques, like Null-AMSI, allow attackers to bypass traditional security and stealthily execute malware like AsyncRAT.

    To protect against these threats, users should avoid downloading files or clicking links from untrusted sources. Antivirus and endpoint solutions must detect AMSI bypass techniques, and PowerShell policies should restrict unauthorized scripts. Regular network monitoring and timely system updates are essential for patching vulnerabilities.

    Organizations should also educate users about phishing, social engineering, and safe browsing to reduce the risk of such attacks. Cyble, a leader in AI-powered cybersecurity, provides advanced threat intelligence through its Cyble Vision platform. This enables real-time monitoring and proactive defense, helping organizations stay protected from cyber threats.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAI-Powered Deception is a Menace to Our Societies
    Next Article Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

    Related Posts

    Security

    New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

    June 1, 2025
    Security

    DevSecOps Phase 4B: Manual Penetration Testing

    June 1, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Unboxing the Future: Must-Have Gadgets for 2024

    Development

    Meet Rakis: A Decentralized Verifiable Artificial Intelligence AI Network in the Browser

    Development

    Transforming Software Development with Multi-Agent Collaboration: CodeStory’s Aide Framework Sets State-of-the-Art on SWE-Bench-Lite with 40.3% Accepted Solutions

    Development

    How to Build a Real-time Network Traffic Dashboard with Python and Streamlit

    Development
    Hostinger

    Highlights

    Development

    Paginate Multiple Eloquent Models with the Union Paginator Package

    December 20, 2024

    The Laravel Union Paginator package by Austin White combines data from multiple Eloquent models into…

    The 5 most customizable Linux desktop environments – when you want it your way

    May 14, 2025

    JavaScript localeCompare(): String Comparison with Language Support

    February 16, 2025

    Galaxy S25 Ultra is easy to break – and the ‘most repairable’ Samsung flagship in years

    February 12, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.