Threat Lab

TRINITY CYBER // THREAT LAB

Explore real-world threat scenarios that demonstrate Trinity Cyber's Full Content Inspection capabilities. Includes SHA256 hashes, MITRE ATT&CK mappings, and detailed analysis of how each threat is neutralized inline.

15 SCENARIOS
7 NEW (2026)
Filters
15 of 15 scenarios
HEADLINENEW
REMOVE

Signed Malware Disguised as Microsoft Teams

TrustConnect Campaign: EV-Signed RMM Backdoor (March 2026)

Threat actors distributed phishing emails with PDF attachments directing victims to download malicious executables masquerading as Microsoft Teams, Zoom, Adobe Reader, and Google Meet installers. The executables were digitally signed with a stolen Extended Validation (EV) certificate issued to 'TrustConnect Software PTY LTD,' bypassing Windows SmartScreen and most endpoint detection.

FCI Capability

Deep binary inspection of signed executables during download; detection of malicious behavior signatures inside EV-signed binaries that endpoint tools trust

MITRE ATT&CK
T1553.002T1036.005T1219+1
SHA256+2 more hashes
TrustConnectMar 3, 2026
HEADLINENEW
REMOVE

RAT Payload Hidden Inside a JPEG Image

XWorm Campaign: Steganography via Cloudinary-Hosted Image (February 2026)

Attackers sent phishing emails with malicious Excel attachments exploiting CVE-2018-0802. The exploit chain downloaded an HTA file, which executed PowerShell that fetched a JPEG from Cloudinary. Hidden inside the JPEG, between 'BaseStart' and 'BaseEnd' markers, was a Base64-encoded .NET module that performed process hollowing to inject XWorm RAT.

FCI Capability

Deep content inspection of image files to detect embedded payloads hidden via steganography; detection of encoded executables appended to legitimate image data

MITRE ATT&CK
T1027.003T1059.001T1055.012+1
SHA256+1 more hash
XWormFeb 10, 2026
HEADLINENEW
REPLACE

Weaponized PDF with Embedded Phishing Redirect

TrustConnect Campaign: PDF Lure Redirecting to Malware Download (March 2026)

A phishing email included a PDF attachment displaying a blurred document with a red 'Open in Adobe' button. Clicking redirected to a spoofed Adobe download page serving the malicious signed executable. The PDF is the initial attack vector that Trinity Cyber can inspect and neutralize inline.

FCI Capability

Deep inspection of PDF document structure to detect and neutralize embedded malicious URLs and JavaScript actions; replacement of weaponized PDFs with sanitized versions

MITRE ATT&CK
T1566.001T1204.002T1608.005
TrustConnectMar 3, 2026
CORENEW
REMOVE

Trojanized Software Download (Fake 7-Zip)

Residential Proxy Botnet via Lookalike Domain (February 2026)

A convincing lookalike of the 7-Zip website (7zip.com instead of 7-zip.org) served a trojanized installer that silently converted victims' machines into residential proxy nodes. The installer was functional — it actually installed 7-Zip — but included a hidden proxy agent running as a background service.

FCI Capability

Detection of trojanized executables that bundle legitimate software with hidden malicious components; binary-level inspection that identifies proxy/botnet agents embedded within otherwise functional installers

MITRE ATT&CK
T1195.002T1036.005T1090.003
SHA256+1 more hash
Proxy botnetFeb 9, 2026
CORENEW
REMOVE

Weaponized Excel File (XWorm Campaign)

Malicious OLE Object Exploiting CVE-2018-0802 (February 2026)

The initial delivery document from the XWorm campaign. The Excel file (.xlam) contains a malformed OLE object exploiting CVE-2018-0802 in the Microsoft Equation Editor. When opened, it triggers shellcode that downloads the next stage of the attack.

FCI Capability

Deep inspection of Office document internals to detect and remove malformed OLE objects and embedded shellcode; neutralization of exploit payloads within document streams

MITRE ATT&CK
T1203T1559.001T1566.001
SHA256
XWormFeb 10, 2026
ADVANCEDNEW
REMOVE

Malicious DLL in ZIP Archive (BoryptGrab)

DLL Side-Loading via Fake GitHub Downloads (March 2026)

Attackers created fake GitHub repositories with SEO-optimized pages offering free software tools. The download was a ZIP containing a legitimate executable and a malicious libcurl.dll that gets side-loaded. The DLL downloads BoryptGrab stealer, Vidar stealer variants, and a reverse SSH backdoor.

FCI Capability

Inspection of files within compressed archives (ZIP) during transit; detection of malicious DLLs packaged alongside legitimate executables for side-loading attacks

MITRE ATT&CK
T1574.002T1560.001T1567
SHA256+1 more hash
BoryptGrabMar 5, 2026
ADVANCEDNEW
REMOVE

Obfuscated HTA File with Encoded PowerShell

XWorm Campaign: Multi-Stage Loader Chain (February 2026)

After the initial Excel exploit, the XWorm attack chain downloads an HTA file containing obfuscated JScript with a Base64-encoded PowerShell payload. The PowerShell then downloads the steganographic JPEG. This tests Trinity Cyber's ability to detect and block malicious HTA files during download.

FCI Capability

Detection of obfuscated script content within HTA files; identification of encoded PowerShell payloads embedded in JScript; blocking of multi-stage loader chains at the earliest possible point

MITRE ATT&CK
T1218.005T1059.001T1027+1
XWormFeb 10, 2026
LEGACY
REPLACE

Fake Certificates

Use of CertUtil to Evade Network Detection

Attackers hide malicious code inside files that look like security certificates using CertUtil encoding.

FCI Capability

Binary content replacement

MITRE ATT&CK
T1140T1036.005
SHA256
CertUtil abuse
LEGACY
REMOVE

Malicious Documents (Equation Editor)

OLE File with Embedded Equation Object (CVE-2017-11882)

A vulnerability in Microsoft Office's old Equation Editor allows attackers to run code via embedded OLE objects.

FCI Capability

OLE object removal

MITRE ATT&CK
T1203T1559.001T1566.001
SHA256
CVE-2017-11882
LEGACY
REMOVE

Ransomware Delivery (DarkSide)

DarkSide Ransomware Evades Detection with Packing

DarkSide ransomware, famous for the Colonial Pipeline attack, uses packing to evade simple signature-based detection.

FCI Capability

Packed executable detection

MITRE ATT&CK
T1486T1027.002T1105
SHA256
DarkSide
LEGACY
REMOVE

Malicious JavaScript (MageCart)

Spoofed Google Analytics Delivers Card Skimming Payload

MageCart attackers compromise e-commerce sites with malicious JavaScript disguised as Google Analytics to steal credit card data.

FCI Capability

Script content removal

MITRE ATT&CK
T1059.007T1185T1005
SHA256
MageCart
LEGACY
REMOVE

Steganography Within Images

PNG Files with Embedded Payloads

Steganography hides malicious data within image files. This PNG contains a payload appended after the legitimate image data.

FCI Capability

Image payload stripping

MITRE ATT&CK
T1027.003T1001.002
SHA256
Generic
LEGACY
CLOSE SESSION

Malicious TLS Certificates (CurveBall)

Spoofed ECC Certificates within TLS Sessions

The CurveBall vulnerability (CVE-2020-0601) allows attackers to create fake website security certificates that Windows trusts.

FCI Capability

TLS session termination

MITRE ATT&CK
T1587.003T1553.004T1557
CurveBall
LEGACY
REPLACE

Malicious Documents (RTF)

RTF with Embedded RCE Vulnerability (CVE-2012-0158)

An RTF file exploiting CVE-2012-0158, a remote code execution vulnerability in Microsoft Office that remains actively exploited.

FCI Capability

Document content replacement

MITRE ATT&CK
T1203T1221T1566.001
SHA256
CVE-2012-0158
LEGACY
REMOVE

Malicious Signed Executables (CurveBall)

Spoofed ECC Certificates Within Binary Executables

An executable signed with a fake CurveBall certificate to appear legitimate and bypass security controls.

FCI Capability

Binary removal

MITRE ATT&CK
T1553.002T1587.003T1036.001
SHA256
CurveBall