Malware News From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect Remote Admin Tool

Khushal

Level 14
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
697
4,123
1,269

Elastic Security Labs details SILENTCONNECT, a new loader that silently installs ScreenConnect via a multi-stage chain using Cloudflare/Google Drive hosting, LOLBins and NT native APIs to evade defenses and provide remote access.
https://t.co/Dwr5m7W3b9
Elastic Security Labs is observing malicious campaigns delivering a multi-stage infection involving a previously undocumented loader. The infection begins when users are diverted to a Cloudflare Turnstile CAPTCHA page under the guise of a digital invitation. After the link is clicked, a VBScript file is downloaded to the machine. Upon execution, the script retrieves C# source code, which is then compiled and executed in memory using PowerShell. The final payload observed in these campaigns is ScreenConnect, a remote monitoring and management (RMM) tool used to control victim machines.

This campaign highlights a common theme: attackers abusing living-off-the-land binaries (LOLBins) to facilitate execution, as well as using trusted hosting providers such as Google Drive and Cloudflare. While the loader is small and straightforward, it appears to be quite effective and has remained under the radar since March 2025.
 
The remote tool in that article:


It's already detected by K.

SHA-256
c3d4361939d3f6cf2fe798fef68d4713141c48dce7dd29d3838a5d0c66aa29c7

ScreenConnect.ClientSetup.msi - SCREENCONNECT Instalador​

Kaspersky even flags as malicious that article URL 😁
 
The file I have is not the same as that in the article, different hash...

1773908463608.png