We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:Win64/ShellCodeRunner!rfn
Aliases: No associated aliases
Summary
Trojan:Win64/ShellCodeRunner!rfn is a behavioral detection name; it does not describe a single malicious file but a category of loaders that launch secondary payloads through shellcode injection and reflective loading. These loaders operate almost entirely in system RAM. They rarely write binaries on the disk. Their goal is to deliver info-stealers, backdoors, or ransomware while avoiding traditional file scanners. Threat actors deploy these loaders in targeted campaigns against government agencies, energy firms, and financial institutions. Infection chains usually start with phishing emails that contain ISO images or malicious shortcut files. When a user mounts the ISO or clicks the shortcut, a hidden loader runs. That loader decrypts an embedded payload, allocates executable memory, and jumps to the decrypted code. Recent variants use advanced evasion tactics. These include Bring Your Own Vulnerable Driver (BYOVD) attacks that deactivate endpoint security tools from kernel mode, and compilers like Go that produce single static binaries with no visible import tables.
- Isolate the device from all networks immediately. Disconnect Ethernet cables, deactivate Wi-Fi adapters through the Windows network settings, and turn off Bluetooth. This stops active data exfiltration and prevents the malware from receiving remote threat actor commands.
- Open Task Manager and end suspicious processes. Look for processes with no valid digital signature. Look for processes running from temporary directories. Look for instances of pyinstaller.exe and ktool.exe. End Task any powershell.exe or cmd.exe processes exhibiting unusual command-line flags.
- Manually clear the %TEMP% directory. Type %temp% in the Run dialog. Select all files. Delete them. This removes many staged loader components and vulnerable drivers.
- Reactivate all deactivated security features. Confirm that Tamper Protection is turned on in Windows Security settings. Confirm that Core Isolation is turned on.
- Open an elevated Command Prompt. Run sfc /scannow to repair system files. Follow this with DISM /Online /Cleanup-Image /RestoreHealth to fix component store corruption.
- Assume all credentials are compromised. Immediately change passwords for any account accessed from the infected device. This includes corporate logins, email, and financial services. Use a known-clean device for these changes.
- Restore encrypted or corrupted data from a known-good offline backup. Do not rely on cloud-synchronized backups until the local environment is confirmed as clean. These backups can also contain the malware or re-introduce it.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.