Threat hunters at Securonix have disclosed details of a new malware campaign dubbed DEAD#VAX that employs “disciplined tradecraft and clever abuse of legitimate system features” to deploy the AsyncRAT remote access trojan. The campaign chains together multiple evasion techniques, delivering malware entirely in memory to minimize forensic artifacts.

Campaign overview

AttributeDetails
Campaign nameDEAD#VAX
DiscoverySecuronix Threat Research Team
Disclosure dateFebruary 4, 2026
Primary payloadAsyncRAT
HostingIPFS (InterPlanetary File System)
DeliveryVHD (Virtual Hard Disk) files
ExecutionFileless, in-memory shellcode injection

Attack chain

The DEAD#VAX campaign employs a multi-stage attack chain designed to evade detection at each step:

Stage 1: Initial delivery

StepTechnique
Delivery methodPhishing email
AttachmentLink to IPFS-hosted VHD file
Social engineeringVHD disguised as PDF purchase order

The attackers host malicious VHD files on the InterPlanetary File System (IPFS), a decentralized storage network. IPFS hosting provides:

BenefitDescription
Censorship resistanceNo single point to take down
Legitimate appearanceIPFS gateways are widely used
PersistenceContent remains accessible across nodes
Detection evasionNot traditionally flagged by security tools

Stage 2: Mark-of-the-Web bypass

When a user mounts the VHD file, Windows presents it as a local drive:

BehaviorSecurity implication
VHD mounts as driveFiles appear local, not downloaded
Mark-of-the-Web strippedSecurity warnings bypassed
Files execute freelyNo SmartScreen or Protected View prompts

This technique has been increasingly adopted by threat actors because it circumvents one of Windows’ primary defenses against downloaded malware.

Stage 3: Obfuscated script execution

Inside the VHD, the attack chain proceeds through multiple script stages:

ComponentPurpose
Windows Script Files (WSF)Initial execution trigger
Batch scriptsHeavily obfuscated intermediate layer
PowerShell loadersSelf-parsing, runtime decryption

The scripts use extreme obfuscation:

TechniqueEffect
Variable name randomizationDefeats pattern matching
String concatenationHides command reconstruction
Encoding layersMultiple decryption stages
Runtime assemblyCommands built at execution time

Stage 4: Shellcode injection

The final stage injects AsyncRAT shellcode directly into trusted Windows processes:

StepAction
1PowerShell decrypts x64 shellcode
2Target process identified (trusted Windows binary)
3Shellcode injected into process memory
4AsyncRAT executes within trusted process context

No decrypted binary is ever written to disk, making traditional file-based detection ineffective.

Evasion techniques

DEAD#VAX demonstrates sophisticated anti-analysis capabilities:

Sandbox detection

CheckPurpose
Virtualization detectionIdentifies VM environments
Memory threshold checksDetects low-resource analysis systems
Execution timingIdentifies automated analysis

Anti-forensics

TechniqueEffect
In-memory executionNo malware files on disk
Process injectionRuns within legitimate processes
Reinfection markersPrevents multiple injections that could destabilize system

Persistence mechanisms

MethodImplementation
Scheduled tasksStealthy task creation
Script-based launchersAvoid obvious PowerShell indicators
Auto-rotationAutomatically recreates if removed

Securonix noted that persistence is “maintained through stealthy scheduled tasks and script-based launchers that avoid obvious PowerShell indicators and can rotate automatically if removed.”

AsyncRAT capabilities

AsyncRAT is an open-source remote access trojan providing extensive control over compromised systems:

Surveillance capabilities

CapabilityDescription
KeyloggingCaptures all keystrokes
Screen captureScreenshots of victim display
Webcam accessRemote camera activation
Clipboard monitoringCaptures copied content
File system accessBrowse, read, modify files

Command and control

FeatureDescription
Remote command executionRun arbitrary commands
File transferUpload/download files
Process managementStart, stop, enumerate processes
Persistence managementMaintain access across reboots

Data exfiltration

TargetData type
BrowsersCredentials, cookies, history
Cryptocurrency walletsWallet files, keys
DocumentsSensitive files
CredentialsStored passwords

Why DEAD#VAX is significant

Securonix researchers emphasized that while AsyncRAT attacks are common, the delivery framework represents the real innovation:

Traditional approachDEAD#VAX approach
Email attachmentIPFS-hosted VHD
Direct downloadDecentralized hosting
Disk-based executionIn-memory only
Single obfuscation layerMulti-layer obfuscation
Static persistenceAuto-rotating persistence

The campaign “effectively defeats single-layer detection approaches as it chains together social engineering, disk image abuse, and script-based loaders.”

Detection challenges

ChallengeImpact
IPFS hostingLegitimate infrastructure abuse
VHD mountingBypasses MotW protections
Fileless executionNo malware files to scan
Process injectionHides within trusted processes
Script obfuscationEvades signature detection

Traditional antivirus focused on file scanning will miss this attack because the malicious payload never exists as a file on disk.

Detection opportunities

Network indicators

IndicatorDetection method
IPFS gateway connectionsMonitor for unusual IPFS traffic
VHD downloadsFlag VHD files from external sources
C2 communicationAsyncRAT network patterns

Endpoint indicators

IndicatorDetection method
VHD mountingWindows event logs
Script executionPowerShell logging
Process injectionEDR behavioral detection
Scheduled task creationTask scheduler monitoring
Rule typeFocus
PowerShell loggingScriptBlock logging for obfuscated commands
Process creationUnusual parent-child relationships
Network monitoringConnections following VHD mount
Behavioral analysisMemory injection patterns

Recommendations

For security teams

PriorityAction
HighEnable PowerShell ScriptBlock logging
HighDeploy EDR with behavioral analysis
HighMonitor for VHD file downloads
HighBlock or alert on IPFS gateway connections
MediumImplement memory scanning capabilities
OngoingUpdate detection rules for MotW bypass techniques

For email security

ControlPurpose
Block VHD attachmentsPrevent direct delivery
Scan links for VHD endpointsDetect hosted payloads
User awareness trainingRecognize purchase order lures
Sandbox analysisDetonate suspicious links

For endpoint protection

ControlPurpose
Application controlRestrict VHD mounting
Memory protectionDetect shellcode injection
Behavioral monitoringIdentify process injection
Script controlsConstrained Language Mode

Indicators of compromise

Behavioral indicators

  • VHD files downloaded from IPFS gateways
  • VHD mounting followed by script execution
  • Heavily obfuscated batch or PowerShell scripts
  • Process injection into trusted Windows binaries
  • Scheduled tasks created with unusual names
  • AsyncRAT C2 communication patterns

Network patterns

  • Connections to IPFS gateways (various domains)
  • AsyncRAT C2 traffic patterns
  • Data exfiltration to external servers

Context

DEAD#VAX represents the continued evolution of malware delivery techniques. As defenders improve detection of traditional attack vectors, threat actors develop increasingly sophisticated evasion chains.

EvolutionDEAD#VAX implementation
HostingDecentralized IPFS instead of traditional servers
DeliveryVHD files bypass web download protections
ExecutionFileless, memory-only payload
PersistenceAuto-rotating scheduled tasks
Detection evasionMulti-layer obfuscation

The campaign demonstrates that effective malware delivery now requires:

  • Abuse of legitimate infrastructure (IPFS)
  • Exploitation of trust mechanisms (VHD/MotW)
  • Advanced obfuscation (multi-layer script encoding)
  • Memory-only execution (no disk artifacts)
  • Resilient persistence (auto-rotation)

Organizations should assume that traditional file-based detection is insufficient and invest in behavioral analysis, memory scanning, and comprehensive logging to detect attacks like DEAD#VAX.