Arda Büyükkaya
February 11, 2025

Sandworm APT Targets Ukrainian Users with Trojanized Microsoft KMS Activation Tools in Cyber Espionage Campaigns

Blog

Executive Summary

EclecticIQ analysts assess with high confidence that Sandworm (APT44) [1], a threat actor supporting Russia's Main Intelligence Directorate (GRU), is actively conducting a cyber espionage campaign against Ukrainian Windows users. Likely ongoing since late 2023, following Russia's invasion of Ukraine, Sandworm leverages pirated Microsoft Key Management Service (KMS) activators and fake Windows updates to deliver a new version of BACKORDER [2], a loader previously associated with the group. BACKORDER ultimately deploys Dark Crystal RAT (DcRAT) [3], enabling attackers to exfiltrate sensitive data and conduct cyber espionage.

Multiple pieces of evidence strongly link this campaign to Sandworm, also tracked by CERT-UA as UAC-0145 [4], based on recurring use of ProtonMail accounts in WHOIS records, overlapping infrastructure, and consistent Tactics, Techniques and Procedures (TTPs). Additionally, the reuse of BACKORDER, DcRAT, and TOR network mechanisms, along with debug symbols referencing a Russian-language build environment, further reinforce confidence in Sandworm’s involvement.

Figure 1 - Sandworm TTPs and malware in the EclecticIQ Threat Intelligence Platform.Figure 1 - Sandworm TTPs and malware in the EclecticIQ Threat Intelligence Platform.

Ukraine’s heavy reliance on cracked software, including in government institutions, creates a major attack surface. According to a public report [5], Microsoft has estimated that 70% of software in Ukraine’s state sector was unlicensed, a trend likely worsened by economic hardships from the ongoing war. Many users, including businesses and critical entities, have turned to pirated software from untrusted sources, giving adversaries like Sandworm (APT44) a prime opportunity to embed malware in widely used programs. This tactic enables large-scale espionage, data theft, and network compromise, directly threatening Ukraine’s national security, critical infrastructure, and private sector resilience.

KMS Update Campaign: Trojanized KMS Activators Targeting Ukrainian Victims

EclecticIQ analysts observed an password protected ZIP file titled “KMSAuto++x64_v1.8.4.zip” [6] uploaded to Torrent [7], that was Trojanized with BACKORDER loader. The threat actors disguised the file as a KMS activation tool [8] to targeting users who wants to cracking Windows licensing requirements. According to a report from Mandiant, another GRU-linked threat actor tracked as UNC4166, previously employed similar tactics against the Ukrainian government by using a trojanized Windows 10 operating system installer [9].

Figure 2 - Torrent info of the malicious KMS Auto Tool.Figure 2 - Torrent info of the malicious KMS Auto Tool.

Since this initial case, EclecticIQ analysts have identified seven distinct malware distribution campaigns tied to the same activity cluster, each employing similar lures and TTPs. On 12 January 2025, analysts observed the most recent campaign using a typosquatted domain and slightly modified tactics to download and execute Dark Crystal RAT - a remote administration tool known for data exfiltration capabilities and previous use by Sandworm [10].

BACKORDER Loader Deliverers Dark Crystal RAT (DcRAT)

The KMS activation tool displays a fake Windows activation interface upon execution. Meanwhile, the threat actor’s GO-based loader BACKORDER initializes in the background, enabling malicious operations to proceed undetected against Windows Defender.

Figure 3 - Execution of Trojanized KMS Auto Tool.Figure 3 - Execution of Trojanized KMS Auto Tool.

BACKORDER loader disables Windows Defender and adds exclusion rules to certain folders via powershell.exe -Command Add-MpPreference –ExclusionPath <Folder-Path> command, preparing the victim’s system for the final DcRAT payload.

Figure 4 - Disassembled BACKORDER Loader.Figure 4 - Disassembled BACKORDER Loader.

The BACKORDER loader variant uses multiple Living Off the Land Binaries (LOLBAS/LOLBIN) during defence evasion process to ensure successful system infection. Figure 5 illustrates the LOLBAS/LOLBIN techniques utilized by the loader:

Figure 5 - List of LOLBAS/LOLBIN used by the BACKORDER Loader.Figure 5 - List of LOLBAS/LOLBIN used by the BACKORDER Loader.

Based on the disassembled code, function main_convert_B64_to_Str() was responsible for retrieving and decoding the Base64-encoded domain string, ultimately revealing the static URL kmsupdate2023[.]com/kms2023.zip. The payload name kms2023 is not obfuscated and appears in the .data section of the Portable Executable (PE) file. This section typically stores initialized global and static variables, indicating that the malware stores the payload name in plaintext within this segment.

After decoding the Base64, another function main_get_zip()downloads the heavily obfuscated DcRAT malware from the decoded URL and executes the payload. It then stores the malicious file at \AppData\Roaming\kms2023\kms2023.exe and saves an additional copy into \AppData\Local\staticfile.exe.

Figure 6 - Base64 encoded URL inside the disassembled BACKORDER Loader.Figure 6 - Base64 encoded URL inside the disassembled BACKORDER Loader.

Once infected, DcRAT kms2023.exe [11] establishes a remote connection to the command-and-control server onedrivepack[.]com/pipe_RequestPollUpdateProcessAuthwordpress.php, that is very likely operated by the threat actor. The DcRAT malware exfiltrates the following details from the victim´s computer to the attacker-controlled command and control server:

  • Screenshot of the device
  • The victim’s keystrokes
  • Browser cookies, history and saved credentials
  • Credentials from popular FTP applications
  • System information such as hostname, usernames, language preference settings, and installed applications
  • Saved credit card details

Using Scheduled Tasks to Maintain Access

EclecticIQ analysts observed that the DcRAT sample created multiple scheduled tasks to maintain persistent access on the victim’s device by regularly launching the malicious payload. The malware used the Windows built-in binary schtasks.exe to register two different scheduled tasks named as staticfiles and staticfile and executed staticfile.exe with elevated privileges from C:\Users\Admin\AppData\Local. This tactic ensures the adversary retains a foothold on the system, allowing malicious operations to continue even after reboots or user logoffs.

Figure 7 - Scheduled tasks for persistent access on a victim’s device.Figure 7 - Scheduled tasks for persistent access on a victim’s device.

Russian-Language Comments and Debug Symbol Expose Likely Russian Origin

On 25 November 2024, EclecticIQ analysts detected another trojanized KMS activation lure uploaded to VirusTotal from Ukraine [12], using tactics consistent with prior campaigns of BACKORDER loader.

The malware sample was compiled as a 64-bit Python 3.13 application via PyInstaller, this sample contained debug paths and Russian-language comments, signaling likely Russian origins. The malicious KMS activator downloads and executes a second-stage payload upon execution.

Closer analysis revealed that the fake activator deploys a Python code main.py alongside two scripts—Functions.py and Functions_2.py—to perform various tasks. These scripts:

  • Disable Windows security features
  • Load the malware
  • Establish persistence through scheduled tasks

In Functions.py :

Figure 8 – Russian language comments inside the source code.Figure 8 – Russian language comments inside the source code.

English translations:

  • “We will change the working directory to the script directory”
  • “We will change back to the working directory”

In Functions_2.py:

Figure 9 - Russian language print output inside the source code.Figure 9 - Russian language print output inside the source code.

English translation:

  • “Permission error while creating file: {target_file_path}”

Functions.py downloads a ZIP file with Windows Office activation scripts from a GitHub repository and extracts them into %LOCALAPPDATA%\Microsoft-Activation-Scripts. It then displays a user interface for the victim.

Functions_2.py further preps the system by disabling Defender scans, stopping Windows Updates, and establishing persistence through a scheduled task. As part of this process, it copies malicious DLLs (e.g., Runtime Broker.dll, stream.x86.x.dll) into the same Microsoft-Activation-Scripts directory. This defense evasion technique is also used by the BACKORDER loader sample.

Figure 10 - Microsoft Defender exclusion function very similar to previous campaign of BACKORDER.Figure 10 - Microsoft Defender exclusion function very similar to previous campaign of BACKORDER.

The script creates a scheduled task named OneDrive Reporting Task-S-1-6-91-2656291417-2341898128-2085478365-1000. Each time the user logs in, Windows runs:

  • rundll32.exe %LOCALAPPDATA%\Microsoft-Activation-Scripts\stream.x86.x.dll,ExportedFunction

Analysts assess with medium confidence that the dropped malicious DLL file, Runtime Broker.dll [13], is very likely a new version of BACKORDER loader, developed in GO Language and designed to download and execute second stage malware from the remote host https://activationsmicrosoft[.]com/activationsmicrosoft.php. Since the time of writing, analysts have been unable to obtain the second-stage malware due to shutdown of the attacker controlled remote server.

Figure 11 - URL for downloading second stage payload.Figure 11 - URL for downloading second stage payload.

One of the most revealing mistakes was the actor’s failure to remove debug symbols from the binary, which exposed the original build location and file name New_dropper.go:

Figure 12 - Debug symbol remnants in the new version of the BACKORDER loader.Figure 12 - Debug symbol remnants in the new version of the BACKORDER loader.

The IEUser reference matches Microsoft’s previously provided test virtual machines (VMs), suggesting the threat actor compiled the malware on this default user account.

Shared Registrars and Emails Connect Multiple Malicious Domains to the Same Threat Cluster

The onedrivestandalone.php URL path on the kmsupdate2023[.]com C2 domain links to a broader malware-delivery campaign. Analysts pivoted from this indicator to uncover multiple additional C2 servers, each using a “KMS activation” lure, suggesting they are very likely part of the same operation. Figure 13 in the EclecticIQ Threat Intelligence Platform’s graph view highlights several more domains tied to this campaign, reinforcing its scale and coordinated infrastructure very likely used by Sandworm members.

Figure 13 - Graph view of the domain pivoting and WHOIS details.Figure 13 - Graph view of the domain pivoting and WHOIS details.

Registrar and Emails:

  • Four of the domains (windowsupdatesystem[.]org, kms-win11-update[.]net, kalambur[.]net, and ratiborus2023[.]com, kmsupdate2023[.]com)share the same registrar, PDR Ltd. d/b/a PublicDomainRegistry.com,

  • Two registrant emails appear multiple times:

    • email: inekawaki@proton[.]me
    • email: asmohamed2030@protonmail[.]com
  • onedrivestandaloneupdater[.]com, is registered with GMO Internet, Inc. and uses the email:

    • email: repgoti@proton[.]me

From these WHOIS records, analysts identified several shared characteristics:

  • Consistent abuse of Cloudflare nameservers
  • Recurrent proton.me and protonmail.com registrant email addresses
  • Overlapping registrars, predominantly PDR Ltd. and GMO Internet, Inc.
  • Creation dates clustered between late 2023 and late 2024

Kalambur: Analysts Discovered New RDP Backdoor Disguised as Windows Update, Leverages TOR for Stealth

EclecticIQ analysts observed a new backdoor following the domain pivot. In this case, the threat actor used a domain kalambur[.]net to download a Microsoft Windows Update-themed RDP backdoor. Analysts named this malware as Kalambur (каламбур) based on the file and domain name chosen by the attacker. In Russian (and some other Slavic languages), «каламбур» (kalambur) refers to a pun.

The malware execution flow starts with the kalambur2021_v39.exe C#-based backdoor [14] and downloader. It is designed to download a repackaged TOR binary inside a ZIP file and retrieve additional tools from what is likely an attacker-controlled TOR onion site.

Analysis of the Loader and Embedded PowerShell Script

During static and dynamic analysis of kalambur2021_v39.exe, analysts discovered a PowerShell script in the loader's resources section. Upon execution, the script performs a series of malicious actions:

1. Tor-based Command-and-Control (C2)

Figure 14 - PowerShell code using CURL.exe for the C2 activity over onion site.Figure 14 - PowerShell code using CURL.exe for the C2 activity over onion site.

  • Terminates any pre-existing Tor service, installs its own Tor service, and reconfigures it to listen on 127.0.0.1:9050 for SOCKS5 proxy. Similar attack pattern also observed by Mandiant and attributed to UNC4166 [9].
  • 2zilmiystfbjib2k4hvhpnv2uhni4ax5ce4xlpb7swkjimfnszxbkaid[.]onion
  • Uses curl.exe with the SOCKS5 tunnel to communicate with the .onion domain, sending and receiving commands discreetly.

2. Persistence via Scheduled Tasks

Figure 15 - Kalambur references in the PowerShell Script and Scheduled Tasks creation function.Figure 15 - Kalambur references in the PowerShell Script and Scheduled Tasks creation function.

  • Creates a scheduled task named WindowsUpdateCheck, pointing to rata.vbs, running every 60 minutes under the SYSTEM account.
  • This ensures the malicious script runs repeatedly, even after reboots, maintaining persistence.

3. System Information Gathering and Exfiltration

  • Retrieves the machine’s public IP (using ident.me) and fetches the UUID from Win32_ComputerSystemProduct.
  • Saves this data locally (e.g., ip0, uuid0, cn0) and then exfiltrates it to the attacker’s hidden service.

4. Downloads TOR Browser for C2 activity

Figure 16 - Downloading TOR browser from remote host inside the ZIP folder.

Figure 16 - Downloading TOR browser from remote host inside the ZIP folder.

  • Downloads a ZIP file (commonly called WindowsUpdate.zip) from kalambur[.]net, extracts it, and runs the included executable (searchindex.exe).
  • Fetches hid.dll [15] from the same domain, placing it in CommonProgramFiles\Microsoft Shared\ink\, used for DLL Injection and TOR Browser installation.

5. OpenSSH Deployment

Figure 17 - Installation of OpenSSH and SSH backdoor creation.

Figure 17 - Installation of OpenSSH and SSH backdoor creation.

  • The script downloads and silently installs Win32-OpenSSH, opening TCP port 22 in the firewall.
  • This creates an additional remote-control channel for the attackers, beyond the RDP backdoor.

6. RDP Backdoor Setup

Figure 18 - Creation of new user for RDP Backdoor.











Figure 18 - Creation of new user for RDP Backdoor.

  • Modifies registry and firewall settings to enable Remote Desktop Protocol (RDP) on port 3389, reduces RDP security layers, and allows inbound connections.
  • Creates or reactivates a hidden administrator user (e.g., Admin or WGUtilityOperator) with a predefined password (1qaz@WSX). The user account is hidden in Windows logon settings via registry edits.

7. Cleanup of Traces

  • Deletes leftover installers and temporary scripts, such as the MSI file for OpenSSH, the downloaded ZIP archive, and helper .vbs files, minimizing evidence on disk.

Conclusion:  From Pirated Software to the Compromise of Critical Infrastructure in Ukraine  

EclecticIQ assesses with medium confidence that Sandworm (APT44) is distributing trojanized pirated software through Ukrainian-speaking forums, warez sites, and other illicit software-sharing platforms. This assessment is based on multiple sources indicating such activity [9], but with some gaps in data related to new campaigns that prevent a higher confidence level. Given Ukraine's high piracy rates and economic constraints [16], these channels likely serve as weak points for initial infection vectors. According to a 2018 Business Software Alliance (BSA) report [17], Ukraine had a software piracy rate of approximately 80%, making it one of the highest in Europe.

By embedding malware within pirated Windows activators, fake updates, and software cracks, Sandworm has very likely gained access to home users, businesses, and potentially government networks. CERT-UA's findings suggest this method has already been exploited in at least one confirmed incident [18].

On April 3, 2023, CERT-UA reported [19] that a Ukrainian utility company employee installed a pirated version of Microsoft Office, unknowingly executing malicious DarkCrystal RAT and DWAgent Remote Monitoring and Management (RMM) software. This gave attackers unauthorized access to the company’s information and communication system (ICS) devices, posing a direct threat to operational technology (OT). Although no major disruptions were publicly reported, the incident underscores the risk associated with trojanized software in critical infrastructure environments.

By leveraging trojanized software to infiltrate ICS environments, Sandworm (APT44) continues to demonstrate its strategic objective of destabilizing Ukraine's critical infrastructure in support of Russian geopolitical ambitions. This tactic aligns with Moscow’s broader hybrid warfare strategy, where cyber operations complement kinetic and economic pressure to undermine Ukrainian sovereignty.

SIGMA Rules

title: Kalambur Backdoor TOR/SOCKS5 Detection

id: E99375EB-3EE0-407A-9F90-79569CC6A01C

date: 2025-02-02

status: test

author: Arda Buyukkaya (EclecticIQ)

description: >

  Detects executions of curl.exe where the command-line arguments include a SOCKS5 proxy

  indicator ("socks5h://127.0.0.1:9050") or a reference to an onion domain. In addition to

  checking the arguments, the rule confirms that the process is indeed curl.exe by verifying

  that either the process name or one of the description fields indicates the use of curl.

references:

  - https://www.eclecticiq.com

tags:

  - attack.t1090

  - attack.t1573

  - attack.t1071.001

  - attack.t1059.001

  - attack.t1059.003

  - attack.s0183

logsource:

  category: process_creation

  product: windows

 

detection:

  selection:

    Image|endswith: '\\curl.exe'

    CommandLine|contains:

      - 'socks5h://127.0.0.1:9050'

      - '.onion/'

    Description|contains: 'The curl executable'

    Product|contains: 'The curl executable'

    Company|contains: 'curl, https://curl.se/'

  condition: selection

 

falsepositives:

  - Legitimate use of curl with SOCKS5 proxies or TOR

 

level: high

 

 

title: "Suspicious Windows Defender Exclusion in BACKORDER Loader"

id: "76FEE02A-AB0E-49A6-8972-C2FC7ECBD51E"

date: "2025-02-02"

status: test

author: Arda Buyukkaya (EclecticIQ)

description: >

  This Sigma rule detects process creation events that may indicate malicious activity

  associated with the BACKORDER Loader Deliverers Dark Crystal RAT (DcRAT) campaign.

  The loader disables Windows Defender and adds exclusion rules via multiple Living Off the Land Binaries (LOLBAS) to evade detection.

references:

  - https://www.eclecticiq.com

tags:

  - attack.t1546.003

  - attack.s0075

  - attack.t1562.001

  - attack.t1059.001

  - attack.t1053.005

 

logsource:

  category: process_creation

  product: windows

 

detection:

  selection_wmic_add_exclusion:

    Image|endswith: "\\WMIC.exe"

    CommandLine|contains:

      - '/NAMESPACE:\\root\\Microsoft\\Windows\\Defender'

      - 'MSFT_MpPreference'

      - 'Add ExclusionPath='

 

  selection_wmic_networkadapter:

    Image|endswith: "\\WMIC.exe"

    CommandLine|contains:

      - "path Win32_NetworkAdapter"

 

  selection_reg_query_defender:

    Image|endswith: "\\reg.exe"

    CommandLine|contains:

      - "query"

      - "Windows Defender"

      - "DisableAntiSpyware"

 

  selection_sc_query:

    Image|endswith: "\\sc.exe"

    CommandLine|contains:

      - "query WinDefend"

      - "query SecurityHealthService"

 

  selection_powershell_add_mppreference:

    Image|endswith: "\\powershell.exe"

    CommandLine|contains:

      - "-Command"

      - "Add-MpPreference"

      - "ExclusionPath"

 

  condition: 1 of selection_*

 

falsepositives:

  - "Legitimate administrative actions to disable Windows Defender."

 

level: "high"

 

YARA Rule

import "pe"

 

rule MAL_BACKORDER_LOADER_WIN_Go_Jan23 {

 

   meta:

      description = "Detects the BACKORDER loader compiled in GO which download and executes a second stage payload from a remote server."

      author = "Arda Buyukkaya"

      date = "2025-01-23"

      reference = "EclecticIQ"

      tags = "loader, golang, BACKORDER, malware, windows"

      hash = "70c91ffdc866920a634b31bf4a070fb3c3f947fc9de22b783d6f47a097fec2d8"

 

   strings:

      $x_GoBuildId = /Go build ID: \"[a-zA-Z0-9\/_-]{40,120}\"/ ascii wide

 

      $s_DefenderExclusion = "powershell Add-MpPreference -ExclusionPath"

 

      // Debug symbols commonly seen in BACKORDER loader

      $s_DebugSymbol_1 = "C:/updatescheck/main.go"

      $s_DebugSymbol_2 = "C:/Users/IEUser/Desktop/Majestic/14.11/New_droper.go"

      $s_DebugSymbol_3 = "C:/Users/IEUser/Desktop/Majestic/14.11/Droper.go"

 

      // Function name patterns observed in BACKORDER loader

      $s_FunctionNamePattern_1 = "main.getUpdates.func"

      $s_FunctionNamePattern_2 = "main.obt_zip"

      $s_FunctionNamePattern_3 = "main.obtener_zip"

      $s_FunctionNamePattern_4 = "main.get_zip"

      $s_FunctionNamePattern_5 = "main.show_pr0gressbar"

      $s_FunctionNamePattern_6 = "main.pr0cess"

 

   condition:

      pe.is_pe

      and

      filesize < 10MB

      and

      $x_GoBuildId

      and

      (

         $s_DefenderExclusion

         or

         1 of ($s_DebugSymbol_*)

         or

         2 of ($s_FunctionNamePattern_*)

      )

}

 

 

IOCs

KMS Lure Uploaded to Torrent:

btdig[.]com/172d3750e3617526563dd0b24c4ba88f907622b9

Fake Microsoft Activation Program – SHA 256 Hash:

afc6131b17138a6132685617aa60293a40f2462dc3a810a4cf745977498e0255

ed5735449a245355706fc58f4b744251f6e499833f02a972f9bd448c28467194

fdc3f0516e1558cc4c9105ac23716f39a6708b8facada3a48609073a16a63c83

 BACKORDER loader - SHA 256 Hash:

48450c0a00b9d1ecce930eadbac27c3c80db73360bc099d3098c08567a59cdd3

22c79153e0519f13b575f4bfc65a5280ff93e054099f9356a842ce3266e40c3d

a42de97a466868efbfc4aa1ef08bfdb3cc5916d1accd59cfffff1a896d569412

8cfa4f10944fc575420533b6b9bbcabbf3ae57fe60c6622883439dbb1aa60369

8a4df53283a363c4dd67e2bda7a430af2766a59f8a2faf341da98987fe8d7cbd

70c91ffdc866920a634b31bf4a070fb3c3f947fc9de22b783d6f47a097fec2d8

0e58d38fd2df86eeb4a556030a0996c04bd63e09e669b34d3bbc10558edf31a6

5bff08a6aa7a7541c0b7b1660fd944cec55fa82df6285166f4da7a48b81f776e

4b9e32327067a84d356acb8494dc05851dbf06ade961789a982a5505b9e061e3

Dark Crystal RAT (DcRAT) - SHA 256 Hash:

039c8dd066efa3dd7ac653689bfa07b2089ce4d8473c907547231c6dd2b136ec

0e58d38fd2df86eeb4a556030a0996c04bd63e09e669b34d3bbc10558edf31a6

1a1ffcbab9bff4a033a26e8b9a08039955ac14ac5ce1f8fb22ff481109d781a7

2de08a0924e3091b51b4451c694570c11969fb694a493e7f4d89290ae5600c2c

4b0038de82868c7196969e91a4f7e94d0fa2b5efa7a905463afc01bfca4b8221

7c0da4e314a550a66182f13832309f7732f93be4a31d97faa6b9a0b311b463ff

a00beaa5228a153810b65151785596bebe2f09f77851c92989f620e37c60c935

b45712acbadcd17cb35b8f8540ecc468b73cac9e31b91c8d6a84af90f10f29f8

cd7c36a2f4797b9ca6e87ab44cb6c8b4da496cff29ed5bf727f0699917bae69a

4b2e4466d1becfa40a3c65de41e5b4d2aa23324e321f727f3ba20943fd6de9e5

553f7f32c40626cbddd6435994aff8fc46862ef2ed8f705f2ad92f76e8a3af12

d774b1d0f5bdb26e68e63dc93ba81a1cdf076524e29b4260b67542c06fbfe55c

70cad07a082780caa130290fcbb1fd049d207777b587db6a5ee9ecf15659419f

c5853083d4788a967548bee6cc81d998b0d709a240090cfed4ab530ece8b436e

Kalambur Backdoor – SHA 256 Hash:

aadd85e88c0ebb0a3af63d241648c0670599c3365ff7e5620eb8d06902fdde83

7d92b10859cd9897d59247eb2ca6fb8ec52d8ce23a43ef99ff9d9de4605ca12b

d13f0641fd98df4edcf839f0d498b6b6b29fbb8f0134a6dae3d9eb577d771589

dd7a9d8d8f550a8091c79f2fb6a7b558062e66af852a612a1885c3d122f2591b

 C2 Ipv4 Address:

5.255.122[.]118

 C2 Domains :

Activationsmicrosoft[.]com

kmsupdate2023[.]com

kms-win11-update[.]net

Windowsupdatesystem[.]org

ratiborus2023[.]com

Onedrivestandaloneupdater[.]com

Kalambur[.]net

Windowsdrivepack[.]com

akamaitechcdns.com

MITRE TTPs

T1204.002 – User Execution: Malicious File

T1059.001 – Command and Scripting Interpreter: PowerShell

T1218.011 – Signed Binary Proxy Execution: Rundll32

T1569.002 – System Services: Service Execution

T1053.005 – Scheduled Task/Job: Scheduled Task

T1548.002 – Abuse Elevation Control Mechanism: Bypass User Account Control

T1562.001 – Impair Defenses: Disable or Modify Tools

T1218 – Signed Binary Proxy Execution

T1070.004 – Indicator Removal on Host: File Deletion

T1555.003 – Credentials from Web Browsers

T1056.001 – Input Capture: Keylogging

T1082 – System Information Discovery

T1021.001 – Remote Services: Remote Desktop Protocol (RDP)

T1021.004 – Remote Services: SSH

T1113 – Screen Capture

T1005 – Data from Local System

T1090.003 – Proxy: Multi-hop Proxy

T1071.001 – Application Layer Protocol: Web Protocol

T1105 – Ingress Tool Transfer

T1041 – Exfiltration Over C2 Channel

References

[1]           “Sandworm Team, ELECTRUM, Telebots, IRON VIKING, BlackEnergy (Group), Quedagh, Voodoo Bear, IRIDIUM, Seashell Blizzard, FROZENBARENTS, APT44, Group G0034 | MITRE ATT&CK®.” Accessed: Jan. 21, 2025. [Online]. Available: https://attack.mitre.org/groups/G0034/

[2]           “2024-04-17-Mandiant-APT44-Unearthing-Sandworm.pdf.” Accessed: Jan. 21, 2025. [Online]. Available: https://nsarchive.gwu.edu/sites/default/files/documents/semon9-ryglx/2024-04-17-Mandiant-APT44-Unearthing-Sandworm.pdf

[3]           “Analyzing Dark Crystal RAT, a C# Backdoor,” Google Cloud Blog. Accessed: Jan. 21, 2025. [Online]. Available: https://cloud.google.com/blog/topics/threat-intelligence/analyzing-dark-crystal-rat-backdoor

[4]           “CERT-UA,” cert.gov.ua. Accessed: Jan. 21, 2025. [Online]. Available: https://cert.gov.ua/article/4279195

[5]           O. Removska and R. Coalson, “Ukraine’s Trade Privileges On Line Over Intellectual-Piracy Concerns,” Radio Free Europe/Radio Liberty, 00:48:24Z. Accessed: Feb. 06, 2025. [Online]. Available: https://www.rferl.org/a/ukraine-sanctions-intellectual-property/24928537.html

[6]           “VirusTotal - File - ed5735449a245355706fc58f4b744251f6e499833f02a972f9bd448c28467194.” Accessed: Jan. 21, 2025. [Online]. Available: https://www.virustotal.com/gui/file/ed5735449a245355706fc58f4b744251f6e499833f02a972f9bd
448c28467194

[7]           “KMSAuto++x64_v1.8.4 torrent.” Accessed: Jan. 21, 2025. [Online]. Available: https://btdig.com/172d3750e3617526563dd0b24c4ba88f907622b9

[8]           Xelu86, “Key Management Services (KMS) client activation and product keys for Windows Server and Windows.” Accessed: Jan. 21, 2025. [Online]. Available: https://learn.microsoft.com/en-us/windows-server/get-started/kms-client-activation-keys

[9]           “Trojanized Windows 10 Operating System Installers Targeted Ukrainian Government | Mandiant,” Google Cloud Blog. Accessed: Jan. 19, 2025. [Online]. Available: https://cloud.google.com/blog/topics/threat-intelligence/trojanized-windows-installers-ukrainian-government

[10]        S. I. Gutierrez James Slaughter, and Fred, “Ukraine Targeted by Dark Crystal RAT (DCRat) | FortiGuard Labs,” Fortinet Blog. Accessed: Jan. 19, 2025. [Online]. Available: https://www.fortinet.com/blog/threat-research/ukraine-targeted-by-dark-crystal-rat

[11]        “VirusTotal - URL.” Accessed: Jan. 21, 2025. [Online]. Available: https://www.virustotal.com/gui/file/b9be4a6271c4660bb9a45985c85975330ab98454d0581de979
738e3d3e71d03a/details

[12]        “VirusTotal - File - afc6131b17138a6132685617aa60293a40f2462dc3a810a4cf745977498e0255.” Accessed: Jan. 21, 2025. [Online]. Available: https://www.virustotal.com/gui/file/afc6131b17138a6132685617aa60293a40f2462dc3a810a4cf74597
7498e0255/telemetry

[13]        “VirusTotal - File - a42de97a466868efbfc4aa1ef08bfdb3cc5916d1accd59cfffff1a896d569412.” Accessed: Jan. 21, 2025. [Online]. Available: https://www.virustotal.com/gui/file/a42de97a466868efbfc4aa1ef08bfdb3cc5916d1accd59cfffff1a89
6d569412/details

[14]        “VirusTotal - File - aadd85e88c0ebb0a3af63d241648c0670599c3365ff7e5620eb8d06902fdde83.” Accessed: Jan. 21, 2025. [Online]. Available: https://www.virustotal.com/gui/file/aadd85e88c0ebb0a3af63d241648c0670599c3365ff7e5620eb
8d06902fdde83

[15]        “VirusTotal - File - b545c5ee0498637737d4edff4b0cc672fe097a1ecfba1a08bb4d07e8affe79d3.” Accessed: Jan. 21, 2025. [Online]. Available: https://www.virustotal.com/gui/file/b545c5ee0498637737d4edff4b0cc672fe097a1ecfba1a08bb4d
07e8affe79d3/details

[16]        “1924a044-b30f-48a2-99c1-50edeac14da1_en.pdf.” Accessed: Feb. 07, 2025. [Online]. Available: https://enlargement.ec.europa.eu/document/download/1924a044-b30f-48a2-99c1-50edeac14da1_en?filename=Ukraine%20Report%202024.pdf

[17]        “2018_BSA_GSS_Report_en.pdf.” Accessed: Feb. 07, 2025. [Online]. Available: https://gss.bsa.org/wp-content/uploads/2018/05/2018_BSA_GSS_Report_en.pdf

[18]        “CERT-UA,” cert.gov.ua. Accessed: Feb. 07, 2025. [Online]. Available: https://cert.gov.ua/article/4279195

[19]        M. B. April 4 and 2023, “Pirated Software Compromised Ukrainian Utility Company.” Accessed: Feb. 07, 2025. [Online]. Available: https://www.bankinfosecurity.com/pirated-software-compromised-ukrainian-utility-company-a-21618

Talk to one of our experts

Protect your organization with cutting-edge threat intelligence. Book your free demo today and explore how our products and services can help you meet your security needs.
Book a call
cta-footer

Related blogs

Book a demo