The FLUX#CONSOLE campaign, a recent cyber threat leveraging Microsoft Common Console Document (.MSC) files to deliver backdoor malware, has shed light on the increasing sophistication of phishing tactics and exploitation of underutilized Windows features.
Identified as a multi-stage attack with malicious intent, the FLUX#CONSOLE campaign demonstrates the lengths to which cybercriminals will go to breach systems and establish persistent access. By utilizing MSC files, threat actors are able to evade traditional antivirus systems and deploy highly obfuscated backdoor payloads, marking a departure from the common practice of using LNK files in phishing campaigns. Key elements of this campaign include tax-themed phishing lures, advanced obfuscation techniques, DLL sideloading, and the establishment of persistence mechanisms to ensure the malware remains active even after system reboots.
The attack begins with phishing emails containing malicious attachments or links that appear to be legitimate tax-related documents, relying on filenames such as “Income-Tax-Deduction-and-Rebates202441712.pdf” to deceive users. The MSC files embedded in these emails leverage Windows’ default file extension hiding feature to mask their true nature, further tricking unsuspecting victims.
Upon opening the MSC file, which is a legitimate Windows administrative tool, embedded malicious scripts or commands are executed under the guise of the mmc.exe process. The malware also employs advanced obfuscation techniques to conceal its activities, making detection and analysis more challenging.
Once activated, the MSC file initiates the delivery of a malicious payload in the form of a DLL file named DismCore.dll, which is sideloaded using the legitimate Dism.exe process. To ensure persistence, the malware creates scheduled tasks that execute the malicious Dism.exe at regular intervals, allowing it to continue running even after the system reboots.
One of the notable aspects of the FLUX#CONSOLE campaign is the use of obfuscation techniques to evade detection. The attackers employ multiple layers of obfuscation, including encoding payloads in Base64 and Hex, as well as incorporating junk code routines in the final DismCore.dll payload to confuse analysts. These tactics make it challenging for traditional security tools to detect and block the malware effectively.
Once inside the system, the backdoor establishes communication with a remote Command-and-Control (C2) server, enabling the exfiltration of sensitive data and providing attackers with the ability to further compromise corporate networks through lateral movement. Despite researchers disrupting the attack within 24 hours, the severity of the breach underscores the vulnerabilities in modern endpoint defenses.
The FLUX#CONSOLE campaign serves as a stark reminder to the cybersecurity community of the evolving threat landscape. By exploiting trusted tools like MSC files and leveraging advanced obfuscation techniques, cybercriminals continue to outpace traditional defenses. Robust security solutions and proactive threat intelligence are crucial to staying ahead of these sophisticated attacks.
As cyber threats evolve, it is imperative for organizations to remain vigilant and adopt comprehensive security measures to mitigate risks and protect their digital assets. The FLUX#CONSOLE campaign highlights the importance of continuous monitoring, threat detection, and incident response capabilities to defend against advanced cyber threats in today’s interconnected world.

