The ScreenConnect Epidemic: Inside a Live Spanish-Language Invoice Campaign With a Panel Still Serving Payloads
Legitimately signed ConnectWise installers, a VBS dropper with reversed ASCII obfuscation, and an attacker panel we caught mid-operation
ScreenConnect abuse has hit epidemic levels. In the past week alone, MalwareBazaar received 25+ ConnectWise-tagged samples from multiple unrelated threat actors. We caught one of them mid-operation.
The attacker's panel at 80.76.49[.]161:8040 was still live and serving malicious installers when we found it. ScreenConnect v25.8.3.9466, running on a Virtuo Networks France VPS provisioned just seven days before the campaign launched. The server's RDP certificate — created March 4 — leaked the hostname WIN-GD8GO4H15UD. An older hostname, WIN-6MUH29N9UJB, showed up in historical Shodan MSRPC data. That's two machines this operator has burned through.
The Lure: "Factura" Means Invoice
Six samples tie to this cluster, spanning three social engineering themes:
- Factura.rar/Factura.msi — Spanish-language invoice lure targeting Latin American businesses
- Statement_05574_2026-3.exe — English financial statement for US/UK targets
- Scan_Document_xlsx.vbs — Generic document lure, the most interesting sample in the set
The dual-language targeting from identical infrastructure is notable. This isn't a regionally focused crew — they're casting wide.
The VBS Dropper: Reversed ASCII Obfuscation
The VBS dropper (cd3152f3) uses a technique worth documenting. The entire payload is stored as a reversed array of ASCII character codes. The function name ChrW is reconstructed from the array ["W","r","h","C"] evaluated in reverse. The script iterates the array backward to rebuild itself, then executes via ExecuteGlobal.
Once decoded, the behavior is straightforward:
- Checks for admin privileges — if not elevated, re-launches with
ShellExecute "runas"for UAC elevation - Downloads
hxxp://80.76.49[.]161:8040/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guestvia PowerShellNet.WebClient - Silent install:
msiexec /i "%TEMP%\installer556.msi" /qn - Waits 5 seconds, deletes the MSI — basic anti-forensics
The Trust Problem: Legitimately Signed Binaries
Here's what makes ScreenConnect abuse particularly insidious: the EXE and MSI installers carry valid ConnectWise, LLC code signing certificates issued by DigiCert. The attacker didn't modify the binaries — they configured relay server parameters at install generation time on the ScreenConnect panel, then exported standard installers. The code signing remains intact.
Certificate serial 01:DD:DB:C6:E9:16:3D:40:7D:98:0A:3E:AF:79:85:28, valid through February 2027. Every signature check passes. Every allowlist that trusts ConnectWise will wave this through.
The only distinguishing feature is the relay server configuration embedded inside: 80.76.49[.]161:8041 for the self-hosted instance, plus three ConnectWise Cloud relays (instance-jsdbls, instance-wj25xo, instance-rith2x).
Four Relay Servers, One Actor
All samples are configured with e=Access&y=Guest — persistent unattended access, not temporary support sessions. ScreenConnect installs as an auto-starting Windows service.
| Relay Server | Type | Sample |
|---|---|---|
80.76.49[.]161:8041 | Self-hosted | Factura.msi |
instance-jsdbls-relay.screenconnect[.]com:443 | Cloud | ScreenConnect.ClientSetup.msi |
instance-wj25xo-relay.screenconnect[.]com:443 | Cloud | ScreenConnect.ClientSetup.exe |
instance-rith2x-relay.screenconnect[.]com:443 | Cloud | Statement_05574_2026-3.exe |
The attacker is hedging — if the self-hosted relay gets blocked, three cloud instances provide fallback through ConnectWise's own infrastructure. Blocking the raw IP doesn't neutralize the campaign.
The Bigger Picture: An RMM Abuse Epidemic
This is one campaign in a wave. Our MalwareBazaar pivot uncovered at least five unrelated actors abusing ScreenConnect in the same week:
- A Portuguese "ORCAMENTO" (budget) lure targeting Brazil
- Amadey botnet dropping ScreenConnect installers
- An AdobeReader VBS dropper using a compromised WordPress site
- Multiple "ZoomWorkspace" fake installers
- Additional SSA financial statement lures that may be related to our cluster
Legitimate RMM tools are becoming the initial access vector of choice. The binaries are trusted, the infrastructure is cloud-hosted, and the only reliable detection point is the relay server URL embedded in the installer.
IOCs
Primary Infrastructure:
80.76.49[.]161— ScreenConnect panel (:8040) and relay (:8041)instance-jsdbls-relay.screenconnect[.]cominstance-wj25xo-relay.screenconnect[.]cominstance-rith2x-relay.screenconnect[.]com
Sample Hashes (SHA256):
f6cc0e58544b195ff09bdfdcd74a83b754682670d1bd4d264704c31ede0c208b— Factura.rar180b959eaecaa6c410af4f4445befcde5947a537ec396196fda014258625e2dd— Factura.msiff93759e80f3c471fa164b1d228d6f40d6632546d3fbe96e9bfe75ba591d92db— Statement_05574_2026-3.execd3152f3d8ff824027549d4ef43a2cb9b42bb004e139a7911fdf79844be75e95— Scan_Document_xlsx.vbs
OPSEC Leaks:
WIN-GD8GO4H15UD— Current RDP hostnameWIN-6MUH29N9UJB— Historical hostname- ScreenConnect instance scheme:
sc-018f2826ff618efb
Detection Guidance
Network-level detection is the most reliable approach:
- Monitor for ScreenConnect relay connections to non-corporate instances — alert on any
instance-*-relay.screenconnect.comconnections that don't match your organization's known instances - Block
80.76.49[.]161at the firewall - Hunt for
msiexec /qnsilent installs of ScreenConnect MSIs, especially when spawned bywscript.exeorpowershell.exe - Audit installed ScreenConnect services — check the relay server URL in the service configuration against your authorized instances
- VBS dropper detection: Look for
ExecuteGlobalcombined withChrWarray reconstruction patterns in email attachments