Trojan:Win64/ShellCodeRunner!rfn
Trojan:Win64/ShellCodeRunner!rfn is a behavioral detection name; it does not describe a single malicious file but a category of loaders that launch secondary payloads through shellcode injection and reflective loading. These loaders operate almost entirely in system RAM. They rarely write binaries on the disk. Their goal is to deliver info-stealers, backdoors, or ransomware while avoiding traditional file scanners. Threat actors deploy these loaders in targeted campaigns against government agencies, energy firms, and financial institutions. Infection chains usually start with phishing emails that contain ISO images or malicious shortcut files. When a user mounts the ISO or clicks the shortcut, a hidden loader runs. That loader decrypts an embedded payload, allocates executable memory, and jumps to the decrypted code. Recent variants use advanced evasion tactics. These include Bring Your Own Vulnerable Driver (BYOVD) attacks that deactivate endpoint security tools from kernel mode, and compilers like Go that produce single static binaries with no visible import tables.