Threat Actors Using WerFault.exe to Deploy Pupy RAT

Threat Level – Red | Vulnerability Report
Download PDF

The Pupy RAT malware is using a technique called DLL side-loading to disguise itself as the legitimate WerFault.exe process in order to evade detection. The malware is delivered via an ISO image that contains a malicious DLL file, a shortcut file, and an Excel file. When the shortcut file is opened, it runs the WerFault.exe process, which then uses the DLL side-loading technique to load and execute the malicious DLL.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs