Your employees are not falling for “bad grammar” phishing anymore. They are being pulled into fake Microsoft logins, banking pages, AI tool instructions, real OAuth flows, and event invitations that look close enough to daily work to pass without alarm.
For CISOs, that is the real social engineering problem in 2026: attacks are no longer easy to separate from normal business activity. And when the SOC cannot quickly see what happened after the click, every investigation becomes a race against exposure.
The New CISO Problem: Social Engineering That Looks Like Business as Usual
Modern social engineering attacks are harder to stop because they no longer rely only on suspicious attachments or poorly written emails. They copy the workflows employees use every day.
For CISOs, this leads to difficult operational issues. The SOC may detect a suspicious link, page, or login attempt, but still lack the full context to understand whether the incident led to credential theft, token abuse, remote access, or exposure of business-critical systems.
That creates several problems at once:
Too many gray-zone alerts that require manual validation
Slow confidence during triage because the activity looks close to legitimate work
Context gaps between Tier 1, Tier 2, and IR teams
Delayed prioritization when the business impact is unclear
Higher pressure on senior SOC resources due to unnecessary or poorly prepared escalations
Limited executive visibility into whether the incident is a minor phishing attempt or a real access risk
This is why modern social engineering is a visibility, escalation, and decision-making problem for the entire security operation.
Turn unclear phishing alerts into confident SOC decisions.
Use interactive analysis to validate risks faster.
1. Fake Microsoft Login Pages Still Work Because They Abuse Daily Business Habits
Fake Microsoft login pages remain one of the most common social engineering tactics because they imitate a workflow employees already trust: opening a shared file, checking email, accessing OneDrive, or signing into Microsoft 365.
Fake Microsoft login page exposed inside ANY.RUN sandbox
For security leaders, the concern is that this attack still hits one of the most valuable parts of the business: identity. Microsoft accounts often connect employees to email, files, SaaS tools, internal conversations, customer communication, and partner access. Once one account is compromised, the impact can quickly move beyond a single inbox.
CISO blind spot: The SOC may treat a fake login page as a simple phishing event, while the real business risk may be account takeover, email compromise, or lateral movement through connected cloud services.
2. Banking Phishing Turns Employee Trust into Financial Exposure
Banking-themed phishing attacks are especially risky because they target workflows employees may already treat as urgent: payment alerts, transaction issues, account notices, invoices, or financial document requests.
In the BlobPhish campaign observed by ANY.RUN, attackers impersonated major financial and cloud services, including Chase, Capital One, FDIC, E*TRADE, Schwab, Microsoft 365, OneDrive, and SharePoint. The campaign used phishing pages that appeared directly inside the browser, making them harder for traditional tools to detect through normal URL, file, or network visibility.
Phishing pseudo-MS365 page loaded as a blob object
The danger is that these lures touch systems tied to money, approvals, vendors, customer data, and cloud access. A single captured credential can open the door to payment fraud, mailbox abuse, partner-facing scams, or sensitive data exposure.
CISO blind spot: A banking phishing lure may look like a narrow credential-theft attempt, but in a corporate environment, it can expose financial operations, cloud accounts, partner communication, and sensitive business data.
3. ClickFix Attacks Abuse Employee Trust in AI Tools
ClickFix attacks are becoming more dangerous as employees rely on AI tools for coding, research, automation, and daily productivity. Instead of sending a suspicious attachment, attackers imitate the tools people already use and guide them through actions that feel like normal setup or troubleshooting.
In one ANY.RUN case, attackers used fake documentation pages for popular AI tools, including Claude Code and Grok. The victim was prompted to run a command that appeared to be part of the installation or configuration process. In reality, that action launched a malware infection on macOS.
Multi-OS attack: malicious terminal commands for various platforms
This tactic is especially risky because it targets high-value users. Developers, product teams, finance employees, and executives often use Macs and AI tools, and they may also have access to source code, cloud environments, financial systems, customer data, or internal documents.
CISO blind spot: ClickFix attacks may not look like a traditional phishing incident. The user is not opening a strange attachment. They are following instructions from what appears to be a trusted AI tool page. That makes the attack harder to catch early and easier to underestimate until credentials, session data, or endpoint access are already exposed.
Close the visibility gap around business-critical users.
Protect the teams and systems attackers target first.
4. OAuth Device Code Phishing Turns Legitimate Microsoft Login into an Access Risk
OAuth device code phishing is dangerous as it does not follow the usual fake-login-page pattern. The victim is sent to a real Microsoft verification page, enters a code, completes authentication, and may even pass MFA.
In the EvilTokens campaign observed by ANY.RUN, attackers abused Microsoft’s OAuth Device Code flow to get access tokens without directly stealing the user’s password. More than 180 phishing URLs were detected in one week, showing how quickly this technique can spread across Microsoft 365 environments.
This makes the attack harder to recognize as phishing. From the user’s side, the process looks legitimate. From the security team’s side, the activity may blend into normal authentication traffic until the account is already exposed.
CISO blind spot: OAuth device code phishing may not trigger the same warning signs as a fake login page. The user authenticates through Microsoft, but the attacker receives the token. That can lead to Microsoft 365 account takeover, mailbox access, cloud data exposure, and delayed response because the compromise does not look like classic credential theft.
5. Fake Invitations Turn Simple Lures into Access Risk
Fake invitation phishing works because it feels harmless. An event invite, a CAPTCHA check, and a sign-in page can look like a normal online workflow, especially when employees are used to opening meeting links, webinars, vendor invitations, and shared business events.
In a U.S.-targeted campaign analyzed by ANY.RUN, attackers used fake event invitation pages to push victims toward credential theft, OTP interception, or remote management tool installation. Some pages collected email credentials and one-time codes, while others delivered legitimate RMM tools such as ScreenConnect, ITarian, Datto RMM, ConnectWise, and LogMeIn Rescue.
Fake invitation used as a lure, exposed inside ANY.RUN sandbox
That makes the campaign harder to judge quickly. The same type of lure can lead to different outcomes: stolen mailbox access, intercepted MFA codes, or remote access inside the environment. For the SOC, this creates a gray-zone investigation where several small signals need to be connected before the real risk becomes clear.
CISO blind spot: A fake invitation may look like a low-priority phishing page, but it can become an access problem fast. If the SOC cannot quickly see whether the page led to credential theft, OTP capture, or RMM installation, response may start only after exposure has already grown.
Don’t let trusted login flows hide real compromise.
Give your SOC clearer evidence.
How CISOs Can Close These Social Engineering Blind Spots
The hardest part of modern social engineering response is often not spotting something suspicious. It is proving what happened next fast enough to make the right decision.
A suspicious email, link, page, or file may be detected, but the SOC still needs to answer the questions that determine the real risk: Did the user submit credentials? Was MFA or OAuth abused? Was remote access delivered? Did the activity reach an endpoint? Does this require escalation, containment, or leadership attention?
To close this gap, social engineering investigations need to move through a clearer workflow:
1. Validate the threat before it becomes a bigger incident
When a suspicious email, link, file, or phishing page reaches the SOC, the priority is not only to label it as malicious or benign. The team needs to understand what the object actually does and how far the activity could go if left unchecked.
Phishing sample analyzed inside ANY.RUN sandbox
ANY.RUN’s Interactive Sandbox lets teams safely open the suspicious object and observe the full behavior in real time: redirects, fake login pages, OTP prompts, file downloads, remote access activity, and concealment attempts. Instead of guessing from isolated alerts, the SOC can see and interact whenever needed.
This gives teams earlier certainty during the most critical stage of triage. They can confirm the real risk faster, decide whether the case needs escalation, and reduce the chance that a “small” social engineering alert becomes a larger business incident.
2. Turn investigation results into evidence the whole SOC can use
Even when the attack is visible, teams still need to communicate the findings clearly. Raw telemetry can slow down handoffs, create context loss, and make it harder for managers to understand severity.
With Tier 1 Reports and AI Summary inside the sandbox, findings become structured, SOC-ready context: what happened, why it matters, what evidence supports escalation, and where the team should focus next.
This gives teams several practical benefits:
Faster triage because Tier 1 gets a clear threat overview without manually rebuilding the attack story
Cleaner escalations as Tier 2 and IR receive context, not just raw indicators
Less context loss when the case moves between teams or shifts
More consistent reporting across analysts and incidents
Clearer management visibility into severity, exposure, and required next steps
Better response decisions because teams can act on confirmed behavior, not assumptions
This way, social engineering investigations do not stop at “we found suspicious activity.” They become ready-to-use evidence for prioritization, escalation, containment, and leadership reporting.
Clarity for analysts. Visibility for decision-makers. Faster response across your SOC.
3. Understand whether the case is isolated or part of a wider campaign
After the behavior is confirmed, the next question is scope. Is this one phishing attempt, or part of a broader campaign targeting similar companies, industries, or regions?
With ANY.RUN Threat Intelligence, teams can pivot from one case to related domains, IOCs, URL patterns, infrastructure, and similar sandbox sessions. This gives the SOC broader context for detection, hunting, and prioritization, so teams are not making decisions from one alert alone.
Relevant sandbox sessions displayed inside ANY.RUN’s TI Lookup for better context and deeper analysis
For security leaders, this creates a stronger operating model for social engineering response:
Earlier risk confirmation before credential theft, token abuse, or remote access turns into a larger incident
Better campaign awareness when one suspicious case is connected to related infrastructure and repeated attack patterns
Stronger SOC consistency because investigations follow the same process instead of depending on individual experience
Improved resource allocation as senior teams focus on cases with confirmed exposure, not unclear alerts
More defensible incident decisions based on visible behavior, threat context, and structured reporting
Clearer business-risk communication when leaders need to understand what happened, what is exposed, and what happens next
This turns social engineering response into a repeatable process: observe the attack, enrich the context, document the findings, and act before exposure spreads.
From Social Engineering Visibility to SOC Performance
Closing social engineering blind spots is about reducing the operational drag these attacks create across the SOC: unclear alerts, manual validation, repeated handoffs, and delayed decisions.
Boosting SOC performance with ANY.RUN’s sandbox analysis and threat intelligence solutions
Organizations using ANY.RUN report:
21 minutes faster MTTR per case, helping reduce the time between detection and containment
94% faster triage reported by users during suspicious file, URL, and phishing investigations
30% fewer Tier 1 to Tier 2 escalations, helping protect senior team capacity
Up to 20% lower Tier 1 workload by reducing manual investigation effort
Up to 3x stronger SOC efficiency across validation, enrichment, escalation, and response workflows
These results show the practical value of closing social engineering blind spots: fewer delays, less wasted effort, and faster confidence when the business needs a clear answer.
Reduce the delay between detection and confident action.
Give your SOC the context to respond before exposure spreads.
ANY.RUN delivers cybersecurity solutions built to support real-world SOC operations. Its platform helps security teams investigate threats faster, make informed decisions, and apply threat intelligence across detection, triage, response, and reporting workflows.
The company’s solutions include the Interactive Sandbox for enterprise-grade malware and phishing analysis, as well as ANY.RUN Threat Intelligence solutions, including TI Lookup, TI Feeds, TI Reports, and YARA Search. Together, they provide fresh, behavior-based intelligence built on live attack analysis.
ANY.RUN is SOC 2 Type II attested, reflecting strong security controls and a commitment to protecting customer data. For SOCs, MSSPs, and enterprise security teams, ANY.RUN helps reduce investigation uncertainty, improve triage speed, and turn complex threat activity into clear, actionable evidence.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-05-19 12:06:352026-05-19 12:06:35Top 5 Phishing-Driven Social Engineering Attacks on Companies in 2026
Cisco Talos has uncovered a BadIIS variant — identifiable by its embedded “demo.pdb” strings — that functions as commodity malware. This variant is likely sold or shared among multiple Chinese-speaking cybercrime groups that operate under a malware-as-a-service (MaaS) model for continuous monetization.
Analysis of program database (PDB) file paths reveals a sustained, multi-year development effort by an author operating under the alias “lwxat”, spanning from at least September 2021 through January 2026, with evidence of rapid iterative updates, feature branching, and reactive evasion tactics targeting specific security vendors such as Norton.
Talos recovered a dedicated builder tool that allows threat actors to generate configuration files, customize payloads, and inject parameters into BadIIS binaries — enabling capabilities including traffic redirection to illicit sites, reverse proxying for search engine crawler manipulation, content hijacking, and backlink injection for malicious search engine optimization (SEO) fraud.
Beyond BadIIS, the same author has developed a suite of auxiliary tools — including service-based installers, droppers, and persistence mechanisms that automate deployment, ensure survivability across IIS server restarts, and evade detection through custom Base64 encoding and obfuscation techniques.
Mystery BadIIS containing “demo.pdb”
Since 2024, Talos has investigated numerous attacks across the Asia-Pacific region (along with a few in South Africa, Europe and North America) that utilize a specific variant of BadIIS characterized by “demo.pdb” strings. While multiple security vendors are tracking the global spread of these variants, Talos’ observed tactics, techniques, and procedures (TTPs) show notable divergences from those documented by other vendors like Trend Micro, Ahnlab, VNPT, and Elastic. Consequently, it is difficult to attribute these attacks to a single threat actor. However, we assess with moderate confidence that the “demo.pdb” BadIIS variant is a commodity tool utilized by multiple Chinese-speaking cybercrime groups.
Insights from embedded PDB strings
Although the core functionality of this BadIIS variant is largely limited to SEO fraud, content injection, and proxy‑based traffic manipulation, our investigation pivoted toward the malware’s embedded PDB strings. The consistent PDB path pattern offers much more intelligence value than the generic “demo.pdb” filename. The combination of a stable “AdministratorDesktop” build environment, Chinese-language folder names, and date-based versioning creates a highly reliable fingerprint for tracking and clustering this BadIIS version toolset. Beyond reinforcing our assessment that this is a commodity IIS malware family, the PDB paths enabled attribution to a possible customer name alias “x神” (“xshen”). Furthermore, the PDB artifacts reveal the existence of customized builds, some explicitly tailored to:
Bypass specific antivirus products, such as Norton
Perform site‑wide hijacking
Redirect users conditionally based on browser language or environment
Figure 1. “Custom site hijacking: redirect based on browser language” version.Figure 2. PDB with 过诺顿 (bypass Norton antivirus) version.
Prompted by these initial discoveries, Talos expanded our threat hunting efforts to identify similar PDB strings associated with this author with high confidence. The PDB paths extracted from these BadIIS variants reveal a sustained, multi-year development effort spanning from at least September 2021 to January 2026. By analyzing the developer’s folder naming conventions, we can accurately map the malware’s evolutionary trajectory, feature branching, and commercialization model.
Timeline and iterative maintenance
Talos observed that the earliest explicit timestamp in the PDB paths is Sept. 30, 2021, indicating that the development of this specific toolset began on or before this date. The naming conventions observed in folders such as “dll0217”, “dll0301”, and “dll0315” (likely representing February 17, March 1, and March 15) demonstrate periods of rapid, sprint-like updates. Additionally, the “dll-no503” directory is particularly notable; it likely represents a troubleshooting build designed to resolve an issue where the malware caused IIS to throw “503 Service Unavailable” errors, which would otherwise alert server administrators to the infection. Finally, the latest observed compilation date, “dll20260106” (Jan. 6, 2026), confirms that this toolset remains actively maintained and deployed in the wild as of early 2026.
Feature branching and evasion tactics
Talos also observed that the folder “兼容百度浏览器+劫持robots.txt” (“Compatible with Baidu browser + hijacking robots.txt”) explicitly confirms the malware’s role in malicious SEO campaigns, specifically targeting the Chinese search engine ecosystem. Furthermore, the “2024-05-05-tcp” branch indicates a shift or enhancement in how the malware handles network traffic, potentially introducing custom proxying or SEO fraud communication protocols over raw TCP. Additionally, the inclusion of “过诺顿” (”bypass Norton”) in the build paths highlights a reactive development cycle, demonstrating that the author actively modifies the code to evade specific security vendor detections.
C:UsersAdministratorDesktop2025-11-21 (x神订制全站劫持按浏览器语言跳转)dllReleasedemo.pdb (translation:“xshencustom site hijacking:redirect based on browser language)”
C:UsersAdministratorDesktop2025-11-21 (x神订制全站劫持按浏览器语言跳转)dllx64Releasedemo.pdb (translation:“xshencustom site hijacking:redirect based on browser language”)
During our research into these BadIIS campaigns, Talos discovered a builder tool specifically designed for this malware variant. The threat actor utilizes this utility to generate configuration files, JavaScript redirectors, and PHP backlink scripts, as well as to inject custom parameters directly into the BadIIS malware. Figure 3 shows a screenshot of the builder’s interface.
Figure 3. Builder screenshot.
The observed builder is labeled as “version 1.0,” with an estimated original release year of 2021. However, the application header and compilation timestamp indicate that this specific artifact is an updated build compiled on August 22, 2022. The interface fields and configurable settings perfectly align with known BadIIS capabilities, which can be categorized into four primary functions:
Trafficredirection: The builder allows threat actors to input target URLs, typically JavaScript-based redirectors, designed to be injected into the victim’s browser. This feature forcibly redirects legitimate user traffic to spam infrastructure, such as illegal gambling, adult content, or other malicious websites.
Reverse proxy: This feature manipulates how the compromised server interacts with search engine crawlers. When a crawler visits specific hidden URLs, the BadIIS malware acts as a reverse proxy, silently fetching illicit content from the threat actor’s command-and-control (C2) backend and serving it to the crawler for indexing. Furthermore, the builder includes a toggle to enable this reverse proxy behavior globally, intercepting crawlers even if they do not visit the designated hidden URLs.
Contenthijacking: The builder includes a site hijacking function capable of replacing the compromised website’s original content for both normal users and search engine crawlers. Threat actors can configure the hijacking rate (percentage of traffic affected), toggle whether the homepage is explicitly targeted, and supply a remote URL to dynamically fetch malicious title, description, and keyword (TDK) metadata.
Internalandbacklinks setting: The final component configures the injection of internal links and external backlinks. Internal links force search engines to discover and index the spam pages hosted directly on the compromised server. Meanwhile, external backlinks siphon the compromised server’s Domain Authority, passing that high reputation onto external illicit websites to artificially inflate their search engine rankings.
Figure 4. Builder workflow.
Furthermore, operating this builder is not a simple, single-click process. Prior to generating the final payloads, the threat actor must stage unconfigured 32-bit and 64-bit BadIIS binaries within the same directory as the builder. Upon initiating the build process, the builder generates a “config.txt” file based on the threat actor’s configured parameters.
Figure 5. Configured parameters.
It then attempts to authenticate with the C2 server by checking for the specific response string “lwxat”. Although the builder does not enforce this validation step — continuing the payload generation process regardless of whether the authentication succeeds or fails — this specific network behavior is highly valuable. Notably, this unique authentication mechanism serves as a critical pivot point, enabling us to identify and attribute other tools developed by the same author.
Figure 6. Unique authentication mechanism.
The final step of the build process involves obfuscating the C2 server address using a single-byte XOR operation with the key 0x3. Once encoded, the builder embeds these addresses, along with all other configured parameters, directly into the final BadIIS malware under the output folder. This configured and output files are illustrated in Figure 7.
Figure 7. Configuration embedded in a BadIIS sample. Figure 8. BadIIS output files and its original name.
Advancement of the builder architecture
Talos has been tracking multiple cybercrime groups, including those detailed in our previous reports on DragonRank and UAT-8099, that utilize various BadIIS variants to turn global web servers into compromised assets for search engine manipulation. The BadIIS variants deployed by those two groups primarily relied on hardcoded C2 infrastructure and statically compiled payloads to spread. However, the variant characterized by the “demo.pdb” strings represents a significant departure from these previous iterations.
Based on the recovered builder and PDB strings, Talos assesses with moderate confidence that this “demo.pdb” variant is commodity malware, likely sold privately or shared within underground markets. The architecture of this toolset suggests a modular, MaaS business model designed for continuous monetization. The malware developer can initially sell a basic version of BadIIS alongside the builder tool. If a threat actor later requiresan advanced, updated, or customized version (such as the “Norton bypass” or “custom site hijacking: redirect based on browser language” modules), they can request a bespoke payload from the developer and use their existing builder to inject the necessary configurations. Figure 9 shows the workflow Talos assessed.
Figure 9. Workflow assessed for commodity BadIIS.
Additional tools developed by same author
By pivoting on the previously identified PDB strings and the authentication mechanism, Talos discovered that this author has developed a suite of additional tools designed to facilitate the installation of BadIIS on target machines. The observed PDB strings are listed below, followed by a detailed analysis of the differences between these tools and their respective capabilities.
D:\vc\dll封装进exe\x64\Release\moduleinit.pdb (translation:“DLLpackaged into EXE”)
Talos identified an additional tool that we assess with high confidence is linked to the same author. Upon execution, the tool verifies that it is running as a Windows service named “Winlogin.” If this condition is met, it initiates a two-stage C2 communication process. First, it connects to a primary C2 server for authentication. During this phase, the malware validates the connection by checking if the server’s response matches the specific string “lwxat”.
Figure 10. First C2 server for authentication.
Once authenticated, it connects to a secondary C2 server to download and execute additional malicious payloads on the target machine. Furthermore, the malware uses double Base64 encoding to obfuscate the addresses of both C2 servers.
Figure 11. Second C2 to download payload.
Configuration‑driven service installer
Talos observed another service-based tool that dynamically locates and reads an external configuration file to deploy BadIIS onto target machines. This component serves the same operational purpose as the installation batch scripts traditionally observed in earlier BadIIS campaigns. Upon execution, the malware identifies its own absolute path and searches its current directory for a file named “config.txt”. This configuration file uses an XML-like syntax, employing custom tags such as “<globalModules>”, “<name>”, “<path>”, and “<cmd>”. The tool employs a custom parsing routine to segment the file based on these tags, extracting string arrays that dictate its subsequent actions. Using this extracted data, the malware dynamically assembles command-line instructions by iterating through the parsed modules and replacing placeholders like “{name}” and “{path}” with randomized DLL paths and command snippets.
Figure 12. Configuration tags.
During this assembly phase, the tool specifically prepares commands for both 32-bit and 64-bit BadIIS (e.g., appending “32.dll” /y and “64.dll” /y). These fully-formed commands are then executed, likely via cmd.exe /c, using a function designed to capture the command output.
Figure 13. Preparing commands for 32-bit BadIIS.
Authentication and configuration‑driven unified tool
The threat actor continues to update this tool, recently merging two distinct capabilities into a single binary. The malware still impersonates the Winlogin system service for registration and persistence, but it now utilizes a higher volume of command-line executions to successfully install the BadIIS payload. Notably, these command lines closely resemble the syntax used in earlier BadIIS batch scripts. To evade detection by security products, the tool obfuscates its command lines and parameters using a custom Base64 encoding algorithm. A list of the encoded strings and their decoded counterparts is provided below.
Based on the decoded strings and the tool’s code structure, we can categorize the functionality of this upgraded tool into three primary areas. The first group of strings focuses on file discovery, searching for “module.txt”, “.dll”, and “.config” files. The “.config” and “.dll” searches serve the same purpose as in previous versions, targeting IIS configuration files and the BadIIS malware, respectively. The “module.txt” file likely acts as a staging file to temporarily store the IIS modules list before committing changes to the active configuration. Furthermore, this phase targets the “<globalModules>” and “<modules>” sections to register the malicious DLL at the server level. The second group handles payload registration; the tool utilizes specific XML nodes to inject its payloads into the IIS configuration, dynamically replacing placeholders (e.g., “{name32}” and “{path64}”) with actual values. Finally, the third group is responsible for locating the primary BadIIS DLL and establishing its backup location to ensure persistence. However, prior to executing its primary functions, the tool sends a request to the C2 server for authentication. The validation process remains identical to previous versions; the tool verifies the connection by checking if the server’s response matches the specific string “lwxat”.
Figure 14. Specific string “lwxat” for authentication.
Latest two‑stage installation toolset
Talos observed that the latest version of the service installation tool is now separated into two distinct files. The workflow is shown in Figure 15.
Figure 15. Installation workflow.
The first file acts as the primary installer and begins by authenticating with the C2 server. Following successful authentication, it searches for the BadIIS malware, copies the payloads to specific primary and backup directories, and registers them within the IIS server module list to ensure persistence. Subsequently, it drops a secondary malware component, installing it as a Windows service. During our research, Talos observed this secondary malware impersonating legitimate services such as FaxService or AudiosService. Additionally, we recovered customization parameters and execution logs associated with this installer, which provided deeper insights into its overall capabilities.
Figure 16. Customization parameters and execution logs file.
The commands and parameters embedded in the install are also encoded. Below is a list of the encoded strings and their decoded counterparts.
The secondary malware component functions similarly to the previously described service tool. However, recognizing that security operations centers (SOCs) or antivirus products can easily quarantine or delete the primary BadIIS malware, the author has implemented a robust persistence mechanism. The installer now copies the BadIIS malware not only to the active directory used for hooking IIS requests and responses but also to a hidden backup location. This ensures that the malicious BadIIS is automatically restored and launched every time the compromised IIS server is restarted. The table below provides a list of the encoded strings and their decoded counterparts.
Module initialization dropper
Alongside the service-based tools, Talos identified another utility that shares the same C2 authentication mechanism, custom Base64 encoding algorithm, and similar code structure. However, rather than operating as a persistent service, this tool functions primarily as a dropper designed to install the BadIIS malware onto the target IIS server. The embedded PDB string (“D:vcdll封装进exex64Releasemoduleinit.pdb”, which translates to “DLL packaged into EXE”) explicitly confirms its purpose: packaging malicious DLL payloads within a standalone executable. The BadIIS are found in the resource and named as “IIS32” and “IIS64” (see Figure 17).
Figure 17. BadIIS malware in the resource.
The drop location for this BadIIS malware is identical to the one used by the installation script previously documented by Trend Micro.
Figure 18. BadIIS malware drop location.
“lwxat”: BadIIS author identification
Through detailed analysis of numerous BadIIS samples, associated tools, and builder artifacts, Talos assesses with moderate-to-high confidence that the string “lwxat” is the author’s alias or handle. This assessment is based on the following converging evidence:
Builderauthenticationmechanism: The BadIIS builder and service tool uses the string “lwxat” as a hardcoded match string within its authentication routine, suggesting the author embedded their identity into the tool’s access control logic.
Configurationparameter: The string “lwxat” is used as the enable function parameter within the builder’s “config.txt” file, further indicating authorship attribution embedded in the tool’s operational configuration.
User-agent signature: Most notably, several BadIIS malware samples were observed using “lwxatisme” as a custom user-agent string during HTTP communications — a strong behavioral indicator that directly ties the malware to the “lwxat” persona.
Figure 19. The custom user-agent string “lwxatisme”.
Additionally, corroborating evidence was identified through PDB path strings found within certain samples. One PDB path contained the Chinese-language string:
Figure 20. A folder for x神’s requirements.
This suggests that the author created a dedicated development folder for a user or client named “xshen” (x神), indicating that this particular BadIIS variant was a customized build tailored specifically for “xshen’s”requirements that a full-site traffic hijacking with redirection logic based on the victim’s browser language settings.
Collectively, these findings presence of “lwxat” across the builder’s authentication, configuration, and in-the-wild user-agent strings, combined with the PDB path referencing a customized build for “xshen” and provide converging evidence indicating that “lwxat” is the primary developer or operator behind the BadIIS malware family, potentially offering customization services to other threat actors.
Coverage
The following ClamAV signatures detect and block this threat:
Win.Malware.BadIIS-10059971-0
Win.Malware.BadIIS-10059977-0
Win.Malware.BadIIS-10059984-0
Win.Malware.BadIIS-10059985-0
The following SNORT® rules (SIDs) detect and block this threat:
Snort2: 1:66400, 1:66399, 1:66398
Snort3: 1:66400, 1:301491
Indicators of compromise (IOCs)
The IOCs can also be found in our GitHub repository here.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-05-19 10:07:512026-05-19 10:07:51From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat
Ten years in cybersecurity is a long journey. Threats have changed, attacks have become harder to spot, and security teams now need answers faster than ever.
What started as an interactive sandbox is now a trusted company with threat analysis and intelligence solution used by 15,000+ organizations, 600,000 security professionals, and teams at Fortune 100 companies worldwide.
For our 10th anniversary, we want to thank everyone who helped us get here: our users, customers, partners, and community.
From May 18 to May 31, we’re celebrating ANY.RUN’s 10th anniversary with special offers across our core threat analysis and intelligence solutions.
Special offers available for your team
This year’s offers are available for Hunter, Enterprise Suite, and Threat Intelligence solutions. Depending on your plan and team needs, you can get extra months, special discounts, exclusive pricing, or added value to support your security workflows.
Whether you’re an individual researcher, a SOC team, an MSSP, or an enterprise organization, this is a good moment to expand your access to ANY.RUN, improve threat visibility, and give your team more room to investigate, validate, and respond faster.
Claim more SOC value before May 31.
Speed up triage, reduce workload, and strengthen response.
ANY.RUN’s Interactive Sandbox helps security teams investigate suspicious files, links, phishing pages, and malware behavior in real time. Instead of relying only on static alerts or delayed reports, teams can safely open, interact with, and observe threats as they behave, giving them the evidence they need to act faster.
How to boost SOC efficiency of Tier 1/2/3 with Enterprise Suite
For individual security professionals, the Hunter plan gives more privacy, flexibility, and access for everyday malware and phishing investigations.
For SOCs and MSSPs, the Enterprise Suite brings interactive threat analysis into a secure team environment. It gives organizations private analysis, team collaboration, user and role management, SSO, access control, and shared visibility across investigations.
This matters most in high-pressure security operations, where teams need to move from alert to decision quickly. Tier 1 specialists can open suspicious files, URLs, and phishing pages in a safe cloud environment, observe real behavior, collect IOCs, and decide whether a case needs escalation. Senior specialists get fewer low-confidence cases. SOC managers get clearer evidence for containment, reporting, and customer communication.
That is why more than 1,700 MSSPs worldwide trust ANY.RUN to support malware analysis, phishing investigation, and faster threat validation across customer environments.
Strengthen SOC resilience with real-time threat analysis.
Reduce escalations and respond with evidence.
94% of users report faster triage, because they get clear behavior-based evidence early in the investigation
Up to 20% decrease in Tier 1 workload, as routine malware and phishing checks become faster and easier to complete
30% reduction in Tier 1 to Tier 2 escalations, because more cases can be validated before they reach senior specialists
21-minute MTTR reduction per case, helping teams respond faster when a real threat is confirmed
Lower infrastructure costs, since teams can use a secure cloud-based sandbox instead of maintaining local analysis environments
Broader threat coverage, with one cloud-based environment for analyzing threats across Windows, macOS, Linux, and Android instead of relying on separate platforms or manual workarounds
Less alert fatigue, with instant threat insights that help teams focus on real risk instead of chasing every suspicious signal
Lower business risk, because earlier detection and better context support faster containment and more informed response
For teams under pressure, this leads to a cleaner investigation process, better use of analyst time, stronger control over sensitive cases, and clearer evidence when decisions need to be made quickly.
During ANY.RUN’s 10th anniversary campaign, SOCs, MSSPs, enterprises, and individual security professionals can get access to these Interactive Sandbox capabilities with extra value, special discounts, exclusive pricing, or more flexible options.
Explore the Interactive Sandbox anniversary offers and give your team faster investigations, stronger privacy, and measurable SOC impact.
Threat Intelligence Solutions Anniversary Offer
ANY.RUN’s Threat Intelligence helps teams to achieve rapid triage and response
Threat intelligence is most valuable when it helps teams move from an indicator to a decision faster.
ANY.RUN Threat Intelligence solutions give SOC and MSSP teams fresh, behavior-based context powered by live attack data from 15,000 organizations and 600,000 security professionals worldwide. Instead of working with isolated IOCs, teams can connect indicators to related samples, infrastructure, attacker behavior, campaigns, and detection logic.
This helps teams improve the SOC processes where context matters most:
Faster triage: Validate suspicious hashes, IPs, domains, URLs, and other indicators with clear context on whether they are connected to malware, phishing activity, or active campaigns.
More confident response: Move from one indicator to the full attack picture, including related infrastructure, artifacts, behavior, and connected threats that may also need containment.
Evidence-driven threat hunting: Test hypotheses against real-world attack data, find related samples, and confirm whether suspicious patterns are relevant to the organization.
Stronger detection engineering: Build and improve detection rules based on current malware and phishing behavior, not outdated or theoretical threat models.
Clearer reporting: Give SOC leaders, MSSP customers, and internal teams stronger evidence behind investigation and response decisions.
With TI Lookup, TI Feeds, TI Reports, and YARA Search, teams can bring threat intelligence directly into the places where SOC work usually slows down: alert validation, investigation, hunting, detection, and reporting.
Instead of checking one IOC at a time or jumping between disconnected tools, teams get fresh attack context in one workflow. They can validate suspicious indicators faster, understand related infrastructure, uncover connected samples, and see how an attack behaves in real environments.
Bring live attack context into your SOC.
Validate threats faster and improve detection accuracy.
For SOC and MSSP teams, this leads to practical outcomes:
Faster alert validation, because teams can check indicators against real-world attack data in seconds
Fewer uncertainty-driven escalations, because Tier 1 teams get clearer context before passing cases to senior specialists
Better incident scoping, as responders can connect one IOC to related infrastructure, artifacts, behavior, and campaigns
Stronger threat hunting, with access to live malware and phishing data for testing hypotheses and finding related samples
More accurate detections, since teams can build and improve rules based on current attack behavior
Lower investigation time, because analysts spend less time switching between tools and more time acting on confirmed risk
Stronger reporting, with evidence that is easier to explain to SOC leaders, customers, and internal teams
Together, these outcomes help teams reduce noise, improve response accuracy, and use security resources where they matter most: on real threats with confirmed business risk.
During ANY.RUN’s 10th anniversary campaign, teams can access special value for Threat Intelligence solutions, including extra months and flexible options.
Explore the Threat Intelligence anniversary offer and bring fresh, actionable attack context into your SOC.
Trusted by Teams That Work with Real Threats Every Day
Ten years of ANY.RUN is also ten years of building for the people who use it in real investigations: SOC teams, MSSPs, enterprise security teams, researchers, and threat hunters.
Today, ANY.RUN supports the work security teams do every day: validating alerts, investigating suspicious activity, collecting evidence, escalating confirmed threats, and reporting outcomes clearly.
How ANY.RUN solutions help accelerate SOC processes
For customers, the value is often felt in one simple change: less time lost to uncertainty.
As one Fortune 500 technology company shared: “We just stopped losing time to uncertainty. Now we can confirm what’s happening faster and escalate only when it actually makes sense.”
For MSSPs, the value also shows up in reporting and customer communication. A healthcare MSSP described the change this way: “Since we implemented new solutions, every investigation now comes with evidence and threat data, from MITRE tags to screenshots.”
This is what ANY.RUN continues to build for: faster decisions, clearer evidence, fewer unnecessary escalations, and security workflows that are easier to scale across teams and customers.
ANY.RUN trusted by 15k organizations worldwide
Today, 74% of Fortune 100 companies rely on ANY.RUN to strengthen their SOC operations, alongside SOC and MSSP teams around the world.
As we celebrate our 10th anniversary, this trust means a lot. It is also why this year’s offers are a chance for more teams to get extra value from solutions already helping security operations investigate faster, reduce workload, and respond with more confidence.
Thank You for Trusting and Growing with Us
ANY.RUN’s 10th anniversary is a moment to thank the people who helped us build, improve, and grow along the way.
To our users, customers, partners, researchers, and community — thank you for growing with us, trusting us, sharing your feedback, and making ANY.RUN part of your daily security work.
And we’re just getting started.
More updates, product improvements, threat intelligence capabilities, and security operations features are coming. Our goal stays the same: to help teams investigate threats faster, reduce uncertainty, and make stronger decisions when every minute matters.
Celebrate 10 years of ANY.RUN with us and explore your anniversary offer before May 31!
About ANY.RUN
ANY.RUN delivers cybersecurity solutions designed to support real-world SOC operations. Its tools help security teams understand threats faster, make informed decisions, and use threat intelligence across detection, investigation, and response workflows.
The company’s solutions include Interactive Sandbox for enterprise-grade malware and phishing analysis, as well as ANY.RUN Threat Intelligence solutions with modules such as TI Lookup, TI Feeds, TI Reports, and YARA Search. Together, they give teams fresh, behavior-based intelligence built on live attack analysis.
ANY.RUN is SOC 2 Type II attested, reflecting strong security controls and a commitment to protecting customer data. For SOCs, MSSPs, and enterprise teams, ANY.RUN helps reduce investigation uncertainty, improve triage speed, and turn threat analysis into clear, actionable evidence.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-05-16 07:06:342026-05-16 07:06:34Why geopolitical turmoil is a gift for scammers, and how to stay safe
ESET researchers uncovered new activities attributed to FrostyNeighbor, updating its compromise chain to support the group’s continual cyberespionage operations
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-05-15 08:06:332026-05-15 08:06:33FrostyNeighbor: Fresh mischief and digital shenanigans
Welcome to this week’s edition of the Threat Source newsletter.
Many solutions have been proposed to reduce software bugs: zero-defect mandates, pair programming, formal methods, and mathematical software proofs. The reality is that software engineering is hard. Identifying and fixing bugs before they make it into production code is hard. Source code peer review and extensive unit testing have improved code quality, but bugs still get through.
Not every bug is a vulnerability, and not every fault that appears to be a vulnerability can be usefully exploited. Nevertheless, through extensive testing and review, a skilled vulnerability researcher can still uncover faults in software that has already undergone rigorous quality assurance. However, skilled vulnerability researchers are a scarce resource and can only review so much software.
AI is the great hope for improving software quality. Iterative improvements in AI’s ability to find bugs mean that each new version of these systems is better than the last. We’re now at the point where AI, although still not as good as a skilled vulnerability researcher, can scan code to find errors at a scale and speed that human analysis cannot match. Used well, it can identify potential vulnerabilities before they reach production.
In the long term, this is very good news. Better automated review and analysis of software is how we will improve code quality. However, in the short term, decades of technical debt and latent errors will be uncovered and will need to be addressed. To make things more complex, threat actors will have access to these same tools to search for exploitable vulnerabilities for their own ends.
The result is likely to be a surge in patches. More vulnerabilities discovered means more fixes released, placing additional pressure on already stretched operations teams. Many of these patches will be urgent; some will address vulnerabilities that are being actively exploited. Without proper planning, the volume of fixes may outpace an organization’s capacity to deploy them.
The surge of patches has yet to happen, but the first signs may already be visible. Now is an excellent time to consider how you prioritise patching, apply patches at scale, and manage systems that cannot be patched quickly — or at all. We can reflect on these questions now, and improve our processes, or we can flounder when the surge of patches arrives. Either way, ready or not, the time of much patching is coming.
The one big thing
In Cisco Talos’ latest blog, we outline the differences between responding to state-sponsored threat actors and handling commodity ransomware. These advanced adversaries log in using valid credentials and leverage your own trusted tools to remain invisible for months. Because their primary objectives are long-term espionage and pre-positioning rather than immediate financial gain, standard incident response playbooks are entirely inadequate.
Why do I care?
State-sponsored actors operate inside your trust boundary and aim to remain completely undetected. They have the patience and resources to map your infrastructure, exploit supply chain vulnerabilities, and blend their lateral movement into routine administrative tasks. If your security architecture assumes internal traffic is inherently trustworthy, these adversaries will exploit that gap to establish deep, persistent access across both IT and operational technology environments. Prematurely containing these threats can even tip off the attacker, causing you to lose critical intelligence and the chance to fully eradicate their foothold.
So now what?
Shift to a zero trust architecture that continuously verifies access and plans for inevitable failures, starting with maximizing your visibility through centralized log aggregation and enabling Windows command-line and PowerShell script block logging. Prioritize identity management by enforcing multi-factor authentication on all administrative accounts and implementing a tiered access model. Update your incident response playbooks to specifically address living-off-the-land techniques, supply chain compromises, and the complex operational timing required for state-sponsored containment. Read the blog here for more information.
Top security headlines of the week
Linux bitten by second severe vulnerability in as many weeks The leaked exploit is deterministic, meaning it works precisely the same way each time it’s run and across different Linux distributions. It causes no crashes, making it stealthy to run. Install patches immediately. (Ars Technica)
A DOD contractor’s API flaw exposed military course data and service member records The issue affected Schemata, an AI-powered virtual training platform used in military and defense settings. According to Strix, an ordinary low-privilege account was able to access data across multiple tenants. (CyberScoop)
Fake OpenAI Privacy Filter repo hits No. 1 on Hugging Face, draws 244K downloads A malicious repository managed to take a spot in the platform’s trending list by impersonating OpenAI’s Privacy Filter open-weight model to deliver a Rust-based information stealer to Windows users. (The Hacker News)
TanStack, Mistral AI, UiPath hit in fresh supply chain attack The same as in previous campaigns, the worm targets sensitive information, including developer credentials, API keys, tokens, cloud credentials and secrets, cryptocurrency wallets, and more. (SecurityWeek)
Official CheckMarx Jenkins package compromised with infostealer Checkmarx warned over the weekend that a rogue version of its Jenkins Application Security Testing (AST) plugin had been published on the Jenkins Marketplace. (BleepingComputer)
Can’t get enough Talos?
Breaking things to keep them safe with Philippe Laulheret From his memorable experiment using a green onion to bypass a biometric fingerprint reader to his experience on the frontlines of cybersecurity, Philippe shares the journey that led him to vulnerability research.
Inside the SOC: AI-powered DNS defense against ransomware Learn how Cisco Talos’ advanced AI-driven detection, including domain generation algorithm (DGA) analysis, integrates within Cisco Secure access to proactively identify and predict malicious domains.
Clustering and reuse of phone numbers in scam emails Cisco Talos has recently started to collect and gather intelligence around phone numbers within emails as an additional indicator of compromise (IOC). In this blog, we discuss new insights into in-the-wild phone number reuse in scam emails.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-05-14 18:06:402026-05-14 18:06:40The time of much patching is coming
Cisco Talos is tracking the active exploitation of CVE-2026-20182, an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage.
Successful exploitation of CVE-2026-20182 allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.
The exploitation of CVE-2026-20182 appears to have been limited so far and Talos clusters this activity under UAT-8616 with high confidence.
Talos is also aware of a series of threat actors, distinct from UAT-8616, that have been observed to be exploiting a different, previously disclosed set of vulnerabilities, in a new way than previously identified, beginning March 2026 – specifically CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122. It is important to note that those vulnerabilities are distinct from and pre-date CVE-2026-20182. Cisco released software updates and a security advisory addressing those vulnerabilities in February 2026, strongly recommending customers to upgrade.
We have identified multiple clusters of post-compromise activity, beginning March 2026, associated with the exploitation of CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122 that deployed webshells and other malicious tooling, described in this post.
We observed the vast majority of this exploitation involved the use of ZeroZenX labs’ proof-of-concept and accompanying JSP-based webshell which we track as “XenShell.”
UAT-8616 in-the-wild (ITW) exploitation of CVE-2026-20182
Talos is aware of the active, in-the-wild (ITW) exploitation of CVE-2026-20182 in Cisco Catalyst SD-WAN Controller and Manager, that allows log in to the affected system as an internal, high-privileged, non-root user account. Talos clusters the exploitation of this vulnerability and subsequent post-compromise activity under UAT-8616, whom we assess is a highly sophisticated cyber threat actor. UAT-8616 previously exploited a similar vulnerability in Cisco Catalyst SD-WAN Controller, CVE-2026-20127 to gain unauthorized access to SD-WAN systems.
UAT-8616 performed similar post-compromise actions after successfully exploiting CVE-2026-20182, as was observed in the exploitation of CVE-2026-20127 by the same threat actor. UAT-8616 attempted to add SSH keys, modify NETCONF configurations, and escalate to root privileges. Our findings indicate that the infrastructure used by UAT-8616 to carry out exploitation and post-compromise activities also overlaps with the Operational Relay Box (ORB) networks that Talos monitors closely.
Customers are strongly advised to follow the guidance and recommendations published in Cisco’s Security Advisory on CVE-2026-20182. Customer support is also available by initiating a TAC request. Please refer to the Recommendations and Detection Guidance section for additional coverage information. We also recommend referring to Rapid7’s disclosure on CVE-2026-20182 for additional details.
In-the-wild (ITW) exploitation of CVE-2026-20133, CVE-2026-20122, and CVE-2026-20128
Talos is also aware of the widespread in-the-wild active exploitation of three vulnerabilities in unpatched Cisco Catalyst SD-WAN Manager infrastructure (CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122) that, when chained together, can allow a remote unauthenticated attacker to gain access to the device. Cisco released software updates and a security advisory addressing these vulnerabilities in February 2026. Following the public release of proof-of-concept code exploiting these vulnerabilities by ZeroZenX Labs in March, we observed the exploitation of the unpatched systems from March to April 2026.
Talos has observed several other threat clusters, separate from UAT-8616, leveraging publicly available proof-of-concept exploit code to deploy webshells to affected systems. Following successful exploitation, the webshells would allow the attacker to execute bash commands on the affected system.
The vast majority of observed exploitation attempts involved the use of the ZeroZenX Labs proof-of-concept code and accompanying JavaServer Pages (JSP) shell, which we are calling “XenShell.” However, we observed several other JSP-based webshell variants, which are outlined below.
Note: The CVE referenced in the ZeroZenX Labs proof-of-concept is incorrectly attributed to CVE-2026-20127. Talos’ analysis indicates that the targeted CVEs in the proof-of-concept are in-fact CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122.
So far, Talos has observed the following clusters of malicious activity being conducted post successful exploitation of CVE-2026-20133, CVE-2026-20122, and CVE-2026-20128: Cluster #1 to Cluster #10.
Cluster 1
This cluster has been actively exploiting CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122 since at least March 6, 2026. Following the exploitation of these CVEs, the threat actor deployed a variant of the Godzilla web shell under the filename “20251117022131.jsp”. This variant is associated with a publicly available GitHub project.
The following IPs were used to carry out the exploit and subsequently interact with the shell:
38.181.52[.]89
89.125.244[.]33
89.125.244[.]51
Figure 1. Tas9er Godzilla shellcode deployed in Cluster #1.
Cluster 2
This cluster has been actively exploiting CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 since at least March 10, 2026. Following their exploitation, the threat actor deployed a variant of the Behinder webshell under the filename “conf.jsp”. This variant has been modified to only use Base64 for encoding, as opposed to AES encryption commonly observed in other variants.
The IP “71.80.85[.]135” was used to carry out the exploit and interact with the shell.
Figure 2. Behinder webshell deployed in Cluster #2.
Cluster 3
This cluster has been actively exploiting CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 since at least March 4, 2026. Following successful exploitation, the threat actor deployed XenShell under the name “sysv.jsp”, before returning hours later to deploy a variant of the Behinder webshell under the filename “sysinit.jsp”.
The IP “212.83.162[.]37” was used to carry out the exploit and interact with the shell.
Figure 3. Behinder webshell deployed in Cluster #3.
Cluster 4
This cluster has been actively exploiting CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122 since at least March 3, 2026. Following successful exploitation, the threat actor deployed a variant of the Godzilla webshell under the filename “vmurnp_ikp.jsp”.
The following IPs are attributed to this cluster:
38.60.214[.]92
65.20.67[.]134
104.233.156[.]1
194.233.100[.]40
Figure 4. Godzilla webshell deployed in Cluster #4.
Cluster 5
Talos observed the deployment, beginning March 13, 2026, of a malware agent compiled off the publicly available AdaptixC2 red team framework. The filename was “systemd-resolved” and the agent’s command and control (C2) is “194[.]163[.]175[.]135:4445”.
The authors have changed the default TCP banner for the sample from “AdapticC2 server” to “shadowcore”. Hosted on Contabo GmbH, this is likely a VPS. As of March 28, 2026, this C2 IP, “194[.]163[.]175[.]135” hosted:
A Mythic C2 server on port 7443, along with a Mythic C2 server certificate with serial number: fece5b954e69b2c6a8d0a1029631a0d7
Another AdaptixC2 server on port 31337
An open SSH service on port 22, likely for administration of server
Cluster 6
In another cluster of activity, since at least March 5, 2026, Sliver, an open-source adversarial emulation framework (aka red-teaming implant), was deployed with the filename “CWan”. The Sliver sample’s C2 is “mtls://23.27.143[.]170:443”.
Cluster 7
In this cluster of activity, since at least March 25, 2026, an XMRig sample and its accompanying configuration file were downloaded and deployed via a shell script from the remote location “83.229.126[.]195”.
Activity observed in Cluster 8 began as early as March 10, 2026. This cluster consisted of a few key malicious tools. The first tool is KScan, an asset mapping tool, that can port scan, TCP fingerprint, capture banners for specified assets, and obtain as much port information as possible without sending more packets. It can perform automatic brute-force cracking and brute-force RDP. The tool’s filename and Go packages have been renamed to “QScan” by the authors, but it is essentially the same implementation as the open-source GitHub version.
The second tool, named “agent1”, is a Nim-based implant. It is most likely based on the open-source tools, Nimplant, but is further modified to include:
Additional commands/capabilities, such as cd to directories; cat files; download and upload files; execute files using bash; and collect system information such as username, hostname, hwid, process listings, etc.
C2 endpoints for communication, registration/check-ins, obtain tasks, provide results, and more:
/api/v1/handshake
/api/v1/results
/api/v1/payloads
/api/v1/exfiltrate
/api/v1/tasks
/api/v1/init
An RSA public key to be used by the agent to communicate with the C2 hosted on “hxxp://13[.]62[.]52[.]206:5004”.
This tool was downloaded and executed post-compromise from the remote location “replit[.]dev”:
Figure 6. Download and startup script for the Nim-based implant.
The attackers executed this command on the compromised system while connected from the source IP “79[.]135[.]105[.]208”. This is likely a ProtonVPN node.
Replit is an AI platform that facilitates building applications using AI. It is therefore likely that the backdoor was created with the help of AI to resemble Nimplant’s functionality with the additional capabilities and deviations listed above.
Cluster 9
In this cluster, since at least March 17, 2026, Talos observed the deployment of an XMRig miner and a peer-based proxying and tunneling tool.
This tool, gsocket, is a peer-based proxying and tunneling tool that allows peers to connect to each other within the Global Socket Relay Network (GSRN). GSRN allows peers to connect to each other using node IDs, which are unique 16-byte identifiers for nodes with the network.
This sample obtains the peer or C2 node to connect to by reading and Base58 decoding the accompanying “defunct[.]dat” file. The C2 peer ID is:
78 c4 a2 37 56 27 7b b7 de 20 06 76 34 d2 63 c9
The tool is activated by placing a malicious command in the .profile file:
This decodes to:
XMRig Miner
Accompanying gsocket was a Monero miner and its scripts and configuration files. The miner is also activated via the user profile (.profile):
The “miner.sh” will find all processes named XMRig, kill them, and then start its own copy of XMRig:
Cluster 10
This cluster of activity, since at least Mar 13, 2026, consisted of a credential stealer deployed along with accompanying scripts. The main script, named “loot_run.sh”, attempted to obtain:
The admin user’s hashdump
JSON Web Tokens (JWT) key chunks that are used for REST API authentication
AWS credentials for vManage: AccesKeyId, SecretAccessKey and Token
Two other helper scripts were also deployed in this cluster to check if the current user could escalate to root. The scripts contained a hardcoded password and used it to execute the command su root –c id. The output is checked for the string “uid=0(root)” to verify successful escalation.
Recommendations and detection guidance
Customers are strongly advised to follow the guidance and recommendations published in Cisco’s Security Advisory on CVE-2026-20182. Customer support is also available by initiating a TAC request. Talos strongly recommends that customers and partners using Cisco Catalyst SD-WAN technology follow the steps outlined in this advisory to help protect their environments. We also recommend referring to Rapid7’s disclosure on CVE-2026-20182 for additional details.
Credential theft malware rarely announces itself with ransomware-level noise. Instead, it operates like a silent siphon hidden inside everyday business workflows: invoices, payroll files, purchase orders, procurement requests. Agent Tesla campaigns are especially dangerous because they target the operational arteries of organizations, harvesting credentials that enable deeper compromise, business email compromise (BEC), financial fraud, cloud account takeover, and long-term espionage.
Key Takeaways
Agent Tesla remains highly effective in LATAM due to cheap licensing and easy configuration combined with region-specific social engineering.
Multi-stage loaders using .NET Reactor 6.x and Process Hollowing evade most static detection tools.
Financial and procurement departments are high-priority targets through purchase order and payroll-themed lures.
Compromised legitimate infrastructure (e.g., Romanian FTP servers) complicates blocking and attribution.
Fileless execution and cleartext FTP exfiltration make dynamic sandbox analysis essential.
The campaign has maintained the same C2 infrastructure for at least 18 months, indicating sustained, professional operations.
Organizations can significantly improve defenses through interactive sandboxing, targeted awareness training, and outbound FTP monitoring.
This investigation reveals an active Agent Tesla campaign specifically targeting Chilean and broader LATAM enterprises through procurement-themed phishing lures. The malware chain combines social engineering, obfuscated loaders, process hollowing, fileless execution, and FTP-based credential exfiltration to evade traditional defenses.
For organizations, the business impact extends far beyond a single infected endpoint: stolen browser, VPN, email, and FTP credentials can become the entry point for supply chain compromise, lateral movement, and unauthorized access to sensitive corporate systems.
Threat Overview: Agent Tesla in the LATAM Context
Latin America has become an increasingly attractive target for commodity malware operators. The combination of rapid digitalization, growing SME supply chains, and historically lower security maturity makes the region fertile ground for credential stealers. Among these, Agent Tesla consistently ranks as one of the most deployed families — cheap to license, easy to configure, and devastatingly effective against organizations with limited email security controls.
In March 2026, during routine threat hunting, we identified a malware sample delivered inside a RAR archive named Orden de compra_pdf.uu — Spanish for ‘purchase order’ — a social engineering lure specifically crafted for the Chilean and broader LATAM business environment. What followed was a multi-day investigation that uncovered not just a single sample, but a persistent infrastructure that has been quietly exfiltrating credentials from LATAM enterprises since at least mid-2024.
Agent Tesla is a .NET-based keylogger and credential stealer, commercially sold as a ‘Remote Administration Tool’ since 2014. Despite its age, it remains highly active because operators can purchase access cheaply and configure it through a GUI without programming knowledge. Its primary capabilities include:
Clipboard monitoring — intercepts copied passwords and crypto wallet addresses;
Exfiltration channels — SMTP, FTP, HTTP, or Telegram bot API.
In the LATAM context, Agent Tesla operators typically use spear-phishing lures themed around business documents: purchase orders, payment receipts, payroll files, and invoices. This campaign follows that pattern precisely, targeting the financial and procurement workflows of Chilean companies.
Business Impact: Why Agent Tesla Is a Serious Enterprise Threat
While Agent Tesla is often categorized as a “commodity stealer,” the operational impact on organizations can be severe. In many environments, credential theft creates the conditions for larger and more expensive incidents.
Financial Fraud and Business Email Compromise
The campaign specifically impersonates procurement and finance-related documents, indicating deliberate targeting of employees who routinely handle invoices, payment approvals, supplier communications, and payroll operations. Once email credentials are stolen, attackers can hijack ongoing financial conversations, redirect payments, or conduct BEC attacks that appear fully legitimate.
Supply Chain Exposure
Compromised FTP, VPN, and email accounts may provide indirect access to suppliers, logistics providers, distributors, and partner organizations. This creates a multiplier effect where a single infection can propagate trust-based compromise across the wider business ecosystem.
Cloud and SaaS Account Takeover
Modern browsers store credentials for cloud platforms, CRMs, collaboration tools, and internal portals. Theft of browser credential databases can therefore expose Microsoft 365, Google Workspace, Salesforce, SAP, and other critical business systems without the attacker needing to deploy ransomware or exploit vulnerabilities.
Long-Term Persistence and Espionage
Agent Tesla’s keylogging, clipboard interception, and screenshot functionality enable prolonged surveillance of employee activity. This allows operators to collect sensitive information gradually over time, including contracts, credentials, API keys, internal communications, and financial data.
Risk Summary: A single employee opening a convincing purchase order email can result in complete credential compromise across your organization’s digital tools. This campaign has operated undetected against LATAM businesses for over 18 months. The financial and operational cost of remediation significantly exceeds the cost of proactive prevention.
Close detection gaps with ANY.RUN.
Reduce security risk and breach impact.
This article walks through the full investigation methodology, from initial triage to infrastructure correlation, and demonstrates how ANY.RUN’s interactive sandbox and threat intelligence capabilities accelerated key phases of the analysis.
The file extension .uu is a deliberate obfuscation tactic. While the file is actually a RAR archive, the unusual extension is intended to confuse automated scanners and reduce detection rates on email gateways that rely on extension-based filtering.
.zip archive with fake extension
The Social Engineering Angle
The filename Orden de compra_pdf.uu translates to ‘Purchase order PDF’ in Spanish. This is a high-value lure for B2B environments: purchase orders are expected, frequently shared by email, and often opened without scrutiny by accounts payable and procurement personnel. The ‘_pdf’ substring creates a false sense of legitimacy, suggesting the recipient will open a PDF document.
This social engineering pattern is consistent across the 80+ samples we identified communicating with the campaign’s infrastructure – all impersonating financial or procurement documents in Spanish:
Orden de Compra.xlam — purchase order (macro-enabled spreadsheet);
OC 20240814.xlam / OC 20240813.xlam — dated order confirmations.
2. Kill Chain Analysis
Stage 1 — JScript Encoded Dropper
WinRAR extracts the archive to reveal Orden de compra_pdf.jse — a JScript Encoded Script (Microsoft Script Encoder format). This encoding is not true encryption, but is highly effective at bypassing signature-based AV detection and preventing casual inspection. The file is executed via Windows Script Host (wscript.exe).
Turn suspicious attachments into actionable intelligence.
Investigate phishing safely with ANY.RUN Sandbox.
The .jse dropper performs several actions in sequence:
Downloads a decoy PDF from a remote server and opens it to distract the victim while infection proceeds silently in the background.
Drops multiple PowerShell stager scripts to C:Temp with randomized names (AYRMWWFH.ps1, Z2KBLYG5.ps1, ELHYLTLT.ps1).
Invokes PowerShell with execution policy bypass — -ExecutionPolicy Bypass- to run the stagers without triggering security warnings.
Modifies registry keys for persistence.
All PowerShell stager scripts dropped during the campaign share the same SHA256 hash (96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7), confirming use of a standardized stager template across the campaign.
Stage 1 processes visible in the sandbox
Stage 2 — PowerShell Stager
The PowerShell stager loads ALTERNATE.dll — the Agent Tesla loader — and injects it into a legitimate Microsoft binary. The choice of injection target is deliberate: aspnet_compiler.exe is a trusted .NET Framework component, and its network activity is rarely flagged by endpoint security tools.
The stager implements a Process Hollowing injection sequence:
1. Locate aspnet_compiler.exe on disk
2. Spawn a suspended process instance
3. VirtualAllocEx() → allocate memory in target process
4. WriteProcessMemory() → write ALTERNATE.dll payload
5. GetProcAddress() → resolve entry point dynamically
6. Resume execution → Agent Tesla runs inside trusted process
Stage 3 — ALTERNATE.dll: The Protected Loader
The DLL is named ALTERNATE.dll internally (with a matching ALTERNATE.pdb debug path left in the binary). Static analysis with Detect-It-Easy reveals a sophisticated protection stack:
Value
Property
Details
PE32 .NET Assembly (x86)
Format
CLR v4.0.30319 / .NET 4.5.1
.NET Reactor 6.x
Protection
Commercial .NET protection framework
Control Flow Obfuscation
Protection
Scrambles IL execution graph with fake branches
Calls Encryption
Protection
Replaces method calls with encrypted delegates
Virtualization
Protection
Converts methods to custom VM bytecode
Anti-ILDASM
Protection
Breaks dnSpy/ILSpy decompilation
Math Mutations
Protection
Replaces constants with equivalent expressions
Fake .cctor names
Protection
Poisons metadata to confuse decompilers
2066 (forged)
PE Timestamp
Anti-forensic timestamp manipulation
The use of .NET Reactor 6.x explains why standard tools like de4dot fail without additional flags. The correct tool for this protection version is NETReactorSlayer:
# Recommended approach:
NETReactorSlayer.CLI.exe --no-pause ALTERNATE.dll
# Alternative with de4dot (force detector):
de4dot.exe ALTERNATE.dll --det reactor
Partial deobfuscation via NETReactorSlayer reduced the binary from 79,872 → 42,496 bytes (a 46.8% reduction), confirming that nearly half the original file consisted purely of protection scaffolding. Post-deobfuscation entropy dropped from 6.0 → 5.86, and previously hidden IL structures became accessible for analysis.
Internal Architecture (Post-Deobfuscation)
Analysis of the partially deobfuscated binary (alternate_Slayed.dll) reveals the loader’s true internal architecture. Method names remain obfuscated (smethod_10, Delegate10, Struct10) — a pattern consistent with automated obfuscation frameworks — but the functional structure is now recoverable.
The loader implements a Read → Decrypt → Decompress → Execute pipeline:
The loader uses RijndaelManaged (the .NET implementation of AES) with CryptoStream and explicit set_IV calls, confirming AES-CBC mode with a hardcoded key and a prepended IV. Four 256-bit (32-byte) key candidates were identified in the deobfuscated binary:
The encrypted payload blob is located at offset 0x4600 in the deobfuscated binary (relocated from 0x12000 in the original), measures 2,560 bytes, and retains maximum entropy of 7.93 / 8.0, confirming the AES encryption survived deobfuscation intact.
Dynamic Execution via Reflection
The loader avoids static linking of the final payload by using .NET Reflection to load and invoke Agent Tesla entirely from a byte array in memory. The relevant APIs observed post-deobfuscation:
API
Category
Role
DynamicMethod / CreateDelegate
Reflection API
Runtime method generation and invocation
ResolveMethod / GetMethod
Reflection API
Dynamic method resolution without static references
CreateInstance
Reflection API
Object instantiation from decrypted assembly
Assembly.Load (byte[])
Reflection API
Loads Agent Tesla PE from memory – no disk write
Process Hollowing — Full Win32 API Map
The deobfuscated binary exposes the complete Process Hollowing implementation as UTF-16 P/Invoke strings. The API sequence is a textbook 32-bit hollowing with Wow64 support for 32→64-bit environments:
API + Offset
Library
Function
CreateProcessA @ 0x8EC4
Win32 / kernel32
Spawns aspnet_compiler.exe in suspended state
ZwUnmapViewOfSection @ 0x8E9A
ntdll
Unmaps original executable from target memory
VirtualAllocEx @ 0x8E26
Win32 / kernel32
Allocates RWX memory in target process
WriteProcessMemory @ 0x8E44
Win32 / kernel32
Writes Agent Tesla PE headers and sections
ReadProcessMemory @ 0x8E6A
Win32 / kernel32
Verifies write integrity
GetThreadContext @ 0x8DE2
Win32 / kernel32
Reads EIP/EBX from suspended thread
SetThreadContext @ 0x8D94
Win32 / kernel32
Redirects EIP to Agent Tesla entry point
Wow64GetThreadContext @ 0x8DD8
Win32 / kernel32
32→64-bit context read
Wow64SetThreadContext @ 0x8D8A
Win32 / kernel32
32→64-bit context write
ResumeThread @ 0x8D70
Win32 / kernel32
Resumes thread – Agent Tesla begins executing
The hollower contains hardcoded error strings —“Failed to allocate memory”, “Failed to unmap section”, “Failed to update PEB”— suggesting it was built from a reusable hollowing template with debug output preserved, a common trait in commodity malware kits.
Execution Control Flags
Three internal execution control strings were recovered post-deobfuscation: ALTERNATE, EXECUTE, and LAUNCH. These likely govern different execution paths within the loader — for example, switching between in-process shellcode execution and remote process hollowing depending on runtime conditions such as privilege level or AV detection.
Stage 4 — Agent Tesla Deployed In-Memory
The Agent Tesla payload is stored as a 2,560-byte AES-encrypted and deflate-compressed blob embedded in the loader’s .text section. The double-layering — compressed and then encrypted — ensures the payload has no recognizable structure at rest and defeats both signature and entropy-based detection.
Value
Field
Notes
0x4600 – 0x5000 (deobfuscated)
Location
Relocated from 0x12000 in original binary
2,560 bytes
Size
Encrypted + compressed payload
7.93 / 8.0
Entropy
Maximum – AES encryption confirmed
256 / 256
Unique bytes
Fully uniform distribution
RijndaelManaged (AES-256 CBC)
Cipher
Confirmed via CryptoStream + set_IV calls
f87d105625dbc96f63d5b4b81dce4c39
IV candidate
First 16 bytes of blob
DeflateStream
Compression
Applied before encryption
At runtime, the loader decrypts the blob using the hardcoded key and embedded IV, decompresses the result with DeflateStream, then uses Assembly.Load() to instantiate Agent Tesla directly from the resulting byte array in memory. No file is written to disk at any stage from this point forward — the execution is entirely fileless.
3. Payload Analysis: Agent Tesla Unpacked
Memory dumps captured during sandbox execution allowed recovery of the fully decrypted Agent Tesla payload — the binary that runs inside the hollowed aspnet_compiler.exe process. Static analysis of this dump (270,336 bytes, SHA256: 43d09743a69c9afa7156bf4e2bf7423b3d5f5ad7d54c4c3fb8a698d526778057) reveals the complete capability set and hardcoded configuration of this Agent Tesla instance.
With the payload decrypted, the complete operator configuration is visible in plaintext — the same values that were hidden behind AES-256 in the loader stage:
Value
Field
Notes
ftp://ftp.horeca-bucuresti.ro
FTP URL
C2 exfiltration endpoint – hardcoded
americas2@horeca-bucuresti.ro
FTP Username
Operator drop account – hardcoded
H*TE9iL;x61m
FTP Password
[REDACTED in publication] – plaintext in payload
http://ip-api.com/line/?fields=hosting
Fingerprint URL
Pre-exfil hosting check – hardcoded
roSkM / roSkM.exe
Mutex / EXE name
Campaign instance identifier
hdfzpysvpzimorhk
Secondary mutex
Anti-re-infection mutex
HnJnO
Campaign tag
Instance/build identifier
7bcd610d-7af6-4dc2-875b-dc4fec91463c.exe
Persistence name
GUID filename used for autorun copy
The FTP password recovered from the memory dump matches exactly the credentials captured in cleartext by ANY.RUN during the dynamic analysis phase, providing cross-validation between static payload analysis and live network capture.
Exfiltrated password in the sandbox analysisExfiltrated data in payload analysis
Credential Theft Capabilities
The unpacked payload targets over 80 applications across six categories, representing one of the broadest credential theft surface areas among commodity stealers:
Outlook (2003–19), Thunderbird, Foxmail, Mailbird, The Bat!, Postbox, IncrediMail, Eudora, Becky!, ClawsMail, PocoMail, SeaMonkey Mail, Opera Mail, Falkon, Flock, K-Meleon, IceCat, PaleMoon, eM Client, Windows Mail App, Trillian
The payload implements a full system-wide keylogger via Windows hook APIs. 26 special keys are mapped to labeled tokens for inclusion in keylog reports:
Clipboard Monitoring Agent Tesla registers a SetClipboardViewer / ChangeClipboardChain hook to intercept clipboard content in real time. Captured data is tagged with <br><hr>Copied Text: <br>and appended to the exfiltration report. This is particularly effective for capturing copied passwords, API keys, and cryptocurrency wallet addresses.
Screenshot Capture A configurable screenshot module captures periodic desktop images. The interval is controlled by the KeyloggerInterval setting. Screenshots are base64-encoded and included in the HTML exfiltration report alongside stolen credentials.
Persistence Mechanisms
The payload supports multiple persistence methods, selectable at build time:
Registry Run key — HKCUSoftwareMicrosoftWindowsCurrentVersionRun[StartupRegName];
Startup folder — copies itself to %APPDATA%MicrosoftWindowsStart MenuProgramsStartup ;
Task Scheduler — creates a scheduled task for persistence without registry artifacts;
GUID-named copy — drops as 7bcd610d-7af6-4dc2-875b-dc4fec91463c.exe to blend with system files.
Other evasion methods
Anti-Analysis / Anti-VM
The payload performs environment checks before proceeding, scanning for indicators of analysis environments:
Indicator
Method
Target
VMware / vmware
Process/file check
VMware guest detection
VirtualBox
Registry/file check
VirtualBox guest detection
SbieDll.dll
DLL presence check
Sandboxie sandbox detection
cmdvrt32.dll
DLL presence check
Comodo sandbox detection
SxIn.dll / Sf2.dll / snxhk.dll
DLL presence check
Avast/Sophos sandbox detection
Malware detects sandbox environments
Exfiltration Report Format
The HTML report generated by Agent Tesla and uploaded to the FTP drop server follows a fixed template, reconstructed from the payload strings. The format observed in the ANY.RUN network capture matches exactly:
Time: [MM/dd/yyyy HH:mm:ss]
User Name: [Windows username]
Computer Name: [hostname]
OSFullName: [Windows edition]
CPU: [processor model from WMI Win32_Processor]
RAM: [available RAM in MB]
<hr>
Host: [URL where credentials were stolen from]
Username: [stolen username]
Password: [stolen password]
Application: [browser/client name]
<hr>
[...additional credential blocks...]
<hr>Copied Text: [clipboard contents]
This template is hardcoded in the payload and has remained consistent across multiple Agent Tesla v3 builds observed in LATAM campaigns. The ‘Time:’ field uses MM/dd/yyyy format, which combined with the Spanish-language lures, suggests the operator targets both English and Spanish-speaking environments.
Exfiltration report in the sandbox
4. Dynamic Analysis: Behavioral Confirmation
Detonating the full infection chain in ANY.RUN’s Interactive Sandbox provided behavioral confirmation of the attack and captured artifacts that static analysis alone could not reveal.
Process tree
Agent Tesla process chain
The full process execution chain observed in the sandbox:
aspnet_compiler.exe (PID 7720) → hollowed process – executes Agent Tesla payload.
Pre-Exfiltration: Victim Fingerprinting
Before exfiltrating stolen data, Agent Tesla performs a geolocation and hosting provider check via ip-api[.]com. This common stealer pattern verifies the victim is not running inside a sandbox or corporate proxy before proceeding with exfiltration:
GET http://ip-api.com/line/?fields=hosting HTTP/1.1
Host: ip-api.com
→ Response: false (victim is not a hosting provider)
→ Agent Tesla proceeds with exfiltration
ANY.RUN flagged this request with the Suricata rule: “ET MALWARE Common Stealer Behavior — Source IP Associated with Hosting Provider Check via ip-api.com”, confirming the pre-exfiltration fingerprinting behavior.
Suricata rule triggered by possible fingerprinting
Credential Theft
The sandbox confirmed active credential theft from web browsers. The behavioral indicators observed:
Accesses Chrome and Firefox browser profile directories and credential store databases;
Reads saved password and autofill data;
Formats captured credentials as HTML report for exfiltration;
Collects system fingerprint: hostname, username, OS version, CPU model, RAM.
FTP Exfiltration
The most critical finding from dynamic analysis was the capture of cleartext FTP credentials and exfiltration traffic. FTP operates without transport encryption by default, making the full authentication handshake and data transfer visible in the network capture:
220 Welcome to Pure-FTPd [privsep] [TLS]
331 User americas2@horeca-bucuresti.ro OK. Password required
USER americas2@horeca-bucuresti.ro
PASS [REDACTED]
230 OK. Current restricted directory is /
STOR PW_admin-DESKTOP-JGLLJLD_2026_03_27_17_19_15.html
226 File successfully transferred (3.79 KB/s)
The exfiltrated file follows a consistent naming convention: PW_[username]-[hostname]_[timestamp].html. This structured naming allows the operator to efficiently process stolen credentials from multiple victims in the drop directory.
Agent Tesla exfiltrating data
The following Suricata rules fired during the exfiltration phase:
SUSPICIOUS [ANY.RUN] Possible admin username observed in outbound connection
HUNTING [ANY.RUN] Windows PC hostname observed in outbound connection
HUNTING [ANY.RUN] Host CPU Enumeration observed in outbound connection
5. Threat Infrastructure Analysis
The C2 Server: 89.39.83.184
The exfiltration target — ftp.horeca-bucuresti[.]ro resolving to 89[.]39[.]83[.]184 — is a legitimate Romanian hospitality business website that has been compromised and repurposed as a drop zone. This operational security tactic makes network blocking harder and attribution more difficult, since blocking the IP may affect a legitimate business.
Querying the IP on VirusTotal reveals 80 malicious files that have communicated with this server, with the earliest samples dating to September 2024 — confirming the infrastructure has been actively maintained for at least 18 months.
Files communicating with the C2 server
Campaign Scope: A LATAM-Focused Operation
Analysis of the 80 samples communicating with this infrastructure reveals a clear targeting pattern focused on Spanish-speaking Latin American enterprises. Pivoting on the campaign in ANY.RUN Threat Intelligence Lookup with the query submissionCountry:”cl” AND threatLevel:”malicious” confirms Chile as the primary submission country, and surfaces correlated behavioral artifacts including the mutex localsm0:6816:304:wilstaging_02, the Firebase Storage decoy PDF download URL, and all 10 Suricata network threats – all tied to aspnet_compiler.exe as the injected process.
Malicious file search in TI Lookup
The filenames observed in the communicating files paint a consistent picture:
Filename
Type
Targeting Context
Orden de compra.xlam / Orden de Compra.xlam
Office macro lure
Chile / Peru / Generic LATAM
OC 20240814.xlam / OC 20240813.xlam
Office macro lure
Dated purchase orders
Nómina de sueldos.pdf_008.exe
EXE disguised as PDF
Payroll – HR department targeting
Comprobante de pago.pdf.exe
EXE disguised as PDF
Payment receipt – finance targeting
Nomina_Sept2025_Confidencial.xlam
Office macro lure
Confidential payroll – HR targeting
Orden – N652120.008.xlam
Office macro lure
Numbered order – supplier targeting
givingbestthingsalwaysfor.hta
HTA dropper
English – possible wider targeting
The Passive DNS history further reveals that the same IP hosted subdomains used as email relay infrastructure: email.v.todotramitesperu.com.elgartizocon[.]ro and email.elrif[.]com — patterns consistent with mail relay abuse to increase phishing email deliverability.
6. MITRE ATT&CK Mapping
Technique
ID
Evidence
Phishing: Spearphishing Attachment
T1566.001
RAR archive with financial lure delivered via email
Obfuscated Files or Information
T1027
JScript Encoded .jse dropper evades AV
Command and Scripting: JavaScript
T1059.007
wscript.exe executes .jse dropper
Command and Scripting: PowerShell
T1059.001
Stager with -ExecutionPolicy Bypass
Process Injection: Process Hollowing
T1055.012
ALTERNATE.dll injected into aspnet_compiler.exe
Software Packing / Virtualization
T1027.002
.NET Reactor 6.x with VM + control flow obfuscation
Credentials from Web Browsers
T1555.003
Chrome, Firefox credential store access confirmed
Exfiltration Over Alternative Protocol: FTP
T1048.003
Cleartext FTP to ftp.horeca-bucuresti.ro:21
System Information Discovery
T1082
CPU, RAM, OS version enumeration pre-exfil
System Network Configuration Discovery
T1016
External IP lookup via ip-api.com
Early Detection: Using ANY.RUN Against Agent Tesla Campaigns
ANY.RUN’s Interactive Sandbox is particularly effective for early detection of sophisticated multi-stage loaders like this Agent Tesla campaign. Security teams should integrate the following practices:
Proactive Sample Submission: Upload suspicious attachments (especially RAR archives with non-standard extensions like .uu, .jse, or macro-enabled Office files) immediately upon receipt for interactive analysis.
Behavioral Monitoring: Use ANY.RUN’s real-time process tree visualization and Suricata rule matching to identify Process Hollowing into aspnet_compiler.exe, PowerShell stagers, and FTP exfiltration patterns.
Threat Intelligence Pivoting: After identifying a C2 indicator (e.g., ftp.horeca-bucuresti[.]ro or IP 89.39.83[.]184), pivot within ANY.RUN Threat Intelligence to uncover related samples and campaign scope.
Team Training: Conduct regular red-team exercises in the interactive environment to train analysts on recognizing .NET Reactor-protected loaders and fileless execution techniques.
Automated Workflows: Integrate ANY.RUN via API for high-volume email gateway triage, enabling rapid quarantine of matching threats before they reach end users.
This investigation yields several actionable findings for security teams in Chile and the broader LATAM region:
The campaign is persistent, not opportunistic
The threat actor has operated continuously since at least mid-2024 using the same FTP infrastructure (89.39.83[.]184) while iterating on lure documents. This is a sustained operation with deliberate LATAM focus.
Dynamic analysis is non-negotiable for this family
.NET Reactor 6.x with virtualization and control flow obfuscation significantly raises the cost of static analysis. Organizations relying solely on static AV will miss this family. Dynamic analysis in sandboxes like ANY.RUN provides the detection coverage that static tools cannot.
Despite being a decades-old protocol, FTP exfiltration continues to succeed because most organizations focus monitoring on HTTP/S. Since FTP operates in cleartext, when it is captured, full credentials and data content are visible — but only if outbound FTP traffic is logged and inspected.
Financial and procurement roles are high-value targets
The consistent use of purchase order and payment receipt lures indicates deliberate targeting of accounts payable and procurement departments. Targeted security awareness training for these roles represents a high-ROI defensive investment.
How ANY.RUN Accelerated This Investigation
Several phases of this investigation would have been significantly slower or impossible without ANY.RUN. Here is where the platform made a direct impact:
Interactive Detonation
Unlike fully automated sandboxes, ANY.RUN’s interactive environment allowed real-time observation of the infection chain. This was critical for the .jse stage, which checks for user interaction before proceeding — a common evasion technique that automated systems fail to bypass.
Agent Tesla detonated in ANY.RUN Sandbox
Automatic Network Threat Detection
ANY.RUN matched 6 Suricata rules against the network traffic automatically, immediately confirming the Agent Tesla family and the FTP exfiltration behavior. In a traditional lab setup, this would require manual PCAP capture, Wireshark analysis, and custom rule development.
Cleartext FTP Capture
The cleartext FTP session — including the authentication handshake, the C2 hostname (ftp.horeca-bucuresti[.]ro), and the exfiltrated filename pattern — was captured in full by ANY.RUN’s network interception layer and presented directly in the Network tab, reducing analysis time from hours to minutes.
Threat Intelligence Pivoting
Using the C2 IP as a pivot point in ANY.RUN Threat Intelligence (combined with VirusTotal), we surfaced 80 related malicious samples, identified the 18-month campaign timeline, and mapped the full scope of LATAM targeting — transforming a single sample investigation into a comprehensive campaign report.
ANY.RUN delivers cybersecurity solutions designed to support real-world SOC operations. They help security teams understand threats faster, make informed decisions, and operationalize threat intelligence across detection, investigation, and response workflows.
Used by over 15,000 organizations and 600,000 security professionals worldwide, ANY.RUN is SOC 2 Type II certified, ensuring strong security controls and protection of customer data.
Q1: What makes this Agent Tesla campaign different from others?
It uses a sophisticated .NET Reactor-protected loader with Process Hollowing and has operated persistently against LATAM targets for over 18 months using the same infrastructure.
Why are Chilean companies specifically targeted?
Rapid digitalization, prevalent use of email for business documents, and relatively lower security maturity in SME supply chains.
Can standard antivirus stop this attack?
Often not. The heavy obfuscation, fileless execution, and legitimate process injection frequently bypass static AV. Dynamic analysis is critical.
What should employees do when receiving a suspicious purchase order?
Verify the sender through a separate channel and avoid opening attachments from unexpected sources.
How can we detect the FTP exfiltration?
Monitor outbound FTP traffic (port 21) and look for filenames starting with “PW_” followed by username and hostname.
How can ANY.RUN help my security team?
It provides interactive detonation, automatic threat detection, and intelligence pivoting that accelerate both analysis and proactive defense.
In the latest Humans of Talos, Amy sits down with Senior Vulnerability Researcher Philippe Laulheret to demystify the world of ethical hacking. Philippe shares his unique journey from French engineering school to the front lines of cybersecurity, explaining how his lifelong love for solving puzzles helps him uncover critical security flaws before they can be exploited.
From his memorable experiment using a green onion to bypass a biometric fingerprint reader to his perspective on the reality of cybersecurity versus what we see in the movies, Philippe provides a fascinating look at the work that keeps our digital world safe.
Amy Ciminnisi: So, can you talk to me a little bit about what you do in vulnerability research?
Philippe Laulheret: I work in vulnerability research. Basically, my job is to find vulnerabilities in software, hardware, or things physically. It’s an interesting position because I usually get to choose which target I want to look at, which confuses people usually, because usually it’s a consulting role, or someone asks you to do that. But for us, we find vulnerabilities in things that we think are important. And then this way, people in different teams can write detection rules, and our customers are protected.
AC: I love that you get to kind of pick a niche and explore. How did you get into this?
PL: My deepest interest was more in reverse engineering, which is understanding how things work, software in particular. Throughout my whole life, I was really curious and really wanted to understand stuff. I guess research is an extension of that where you need to understand how the system works, and then it’s a puzzle where you need to find a way to break it. In my teenage years, I was really interested in that. I started playing Capture The Flag, which are challenges where people design exercises where there is a bug to find and exploit. It was really fun. I was doing that to stay sharp with my skills, and eventually, I was able to transition from regular development work to actual research. All those years of playing CTF really helped, even if it wasn’t professional.
AC: Did you go to school initially for development work? What kind of career path led you here?
PL: Originally, as you can hear, I have a French accent. In France, we have engineering schools, which are fancy grad schools. The process is first you study very hard in math and physics, and then you go to grad school. At that time, I was convinced I wanted to do security, and I joined an electrical and computer engineering school. Somehow, in that school, I discovered an interest for different aspects of software development. I was getting interested in computer vision and other things. When I moved to the U.S. for development work instead of security work, I worked in a design studio for four years, which was really fun. I was making interactive installations. But as I said, I was playing CTF on the side to keep security pretty high in my head. Eventually, I moved to New York and joined a cybersecurity startup, and finally, I moved back to the Pacific Northwest, where I’m currently living, and I was finally able to do vulnerability research the way I wanted to.
Want to see more? Watch the full interview, and don’t forget to subscribe to our YouTube channel for future episodes of Humans of Talos.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-05-13 11:06:392026-05-13 11:06:39Breaking things to keep them safe with Philippe Laulheret
Successful SOC operations require more than accurate detections. Instant access to context, clear conclusions, and operationally relevant insights allow incidents to move across workflows without delays:
During alert triage, analysts need a quick threat overview to decide on the next steps.
Efficient incident response decisions demand clear, actionable context to rely on.
Swift incident reporting requires cross-tier visibility without the need for manual processing of raw technical data.
Making ANY.RUN’s Interactive Sandbox a part of your standard SOC workflow helps eliminate bottlenecks that occur along the incident lifecycle by contributing to the optimization of each process, decision, and report.
SOC-ready Tier 1 reports turn complex sandboxing analysis into structured, decision-ready intelligence for faster, efficient triage, escalation, response, and reporting.
Executive Summary
Whether operating as an internal SOC or delivering MDR and MSSP services, organizations need investigation workflows that scale efficiently under growing alert volumes.
ANY.RUN’s Interactive Sandbox with Tier 1 Reports helps standardize triage, escalation, and incident reporting by becoming a decision-support layer for your security operations.
Enterprise Suite teams can optimize sandbox investigations and reporting across the SOC at scale with unlimited Tier 1 report generation.
The result is faster investigations, consistent escalations with less context lost, and optimized incident documentation for confident decisions and risk prioritization.
Challenges SOC Teams Face Today
With SOC teams continuously investigating suspicious files, URLs, phishing pages, and malware samples, turning the resulting massive volume of technical findings into actionable operational context fast enough to support efficient response becomes the key challenge.
The lack of standardized reporting leads to:
Slow triage due to excessive manual work for Tier 1
Higher pressure on Tier 2/3 and incident response team due to lack on ready-to-apply context
Context loss during escalations and critical delays occur
Additional burden falling on SOC managers without clear visibility into incident severity and business impact
ANY.RUN’s Interactive Sandbox already simplifies malware and phishing analysis through interactive, real-time investigation. Now, with Tier 1 Reports and AI Summary, it supports decision-making and reporting acrossSOC operations.
Phishing sample analysis in ANY.RUN Sandbox
SOC-Ready Reporting Built Into the Analysis Workflow
New Tier 1 reports are integrated into SOC workflows through and offer complete, structured documents with operationally useful insights.
Tier 1 report includes:
A clear verdict on the analyzed sample
AI Summary featuring threat classification and executive summary
They can be generated directly within the Interactive Sandbox in a single click, making sandbox analysis immediately usable across operational workflows.
Clarity for analysts. Visibility for decision-makers. Faster response across the SOC.
Use Case #1: Fast Threat Understanding for Tier 1 During Triage
Via Tier 1 reports featuring AI Summaries, ANY.RUN’s Interactive Sandbox provides immediate answers to the most critical questions that occur during alert triage:
Is the sample malicious?
What behavior indicates that?
What type of threat is involved?
What MITRE ATT&CK TTPs and IOCs are present?
Does the incident require escalation?
Threat verdict and tags at the top of Tier 1 reports already provide key info on the analyzed object
Instead of manually reviewing raw technical data to answer these questions with confidence, the sandbox provides this context automatically in the form of a ready-to-use report that covers all findings into a clear operational document for fast and substantiated decision-making.
Use Case #2: Easy Access to Context for Tier 2, Tier 3, IR teams
In case of an escalation, Tier 2 analysts and incident responders frequently need to reconstruct investigation context manually before proceeding with containment.
Raw sandbox outputs take time to process and interpret, stretching investigation time and creating friction, as higher tiers essentially have to go back to triage stage for verification.
With Tier 1 reports, analysts get a structured information to pass on at the early stage, making ANY.RUN’s Interactive Sandbox more smoothly embedded into the entire investigation cycle, from triage to response.
Use Case #3: Immediate Clarity for Decision-Makers
SOC managers, Heads of SOC, and CISOs don’t have time to review every technical artifact associated with an incident. Traditional reports may contain too many low-level details, whereas security leaders must assess the general business impact and urgency of a threat.
ANY.RUN’s Interactive Sandbox optimizes the hand-off workflow with a concise overview of the analysis in operational language suitable for leadership.
With AI Summary as part of the structure, the report explains what happened, why the object is malicious, which assets or systems may be at risk.
As a result, analysis outputs become standardized and practical, making them immediately usable for decision-making and internal communication.
ANY.RUN’s Interactive Sandbox & Tier 1 Reports
Operational Impact
Business Impact
Faster incident understanding
Better executive visibility
Easier communication between teams
Faster prioritization through clarity
Consistent incident documentation
Stronger operational governance
Hands-On Case: Generating a Response-Ready Report on a Phishing Attack
In this phishing investigation, the Tier 1 report provides a clear, operational overview of the entire attack chain, helping both analysts and leadership quickly understand the threat severity and required response actions.
AI Summary further structures the findings into operationally relevant context suitable for triage, escalation, and internal communication:
AI Summary providing a clear, structured overview of the threat
The AI summary highlights the detection of a ClickFix phishing technique, followed by PowerShell execution with Execution Policy bypass attempts used to launch malicious activity on the host. It also outlines payload delivery behavior, subsequent system modifications, and persistence attempts through Windows Registry changes.
Instead of manually reconstructing the attack flow from raw sandbox telemetry, analysts receive a ready-to-use interpretation of the incident that can immediately support escalation and response workflows.
The complete attack chain, behavioral indicators, and resulting conclusions are already structured for operational use and are ready for further processing: escalation, IR hand-off, and containment.
Turn sandbox analysis into confident SOC decisions
with interactive investigations and refined reporting
From Analysis to Action: Faster Escalations, Response, and Reporting
The new Tier 1 reports featuring AI Summary deliver direct operational value across the SOC:
Faster Triage: Tier 1 analysts can quickly understand the nature of the threat and make confident decisions on whether to close or escalate alerts.
Streamlined Escalation Process: Tier 2 and IR teams receive well-structured context instead of raw data, reducing handoff time and miscommunication.
Accelerated Incident Response: Teams gain rapid visibility into attack behavior, helping reduce Mean Time to Respond (MTTR).
Improved Internal Reporting: SOC managers and CISOs get consistent, professional summaries that are easy to read and share with stakeholders.
More Consistent Performance: Standardized reports reduce quality variation between analysts and lower the risk of human error.
Unlimited access is available for Enterprise Suite and Hunter plans. Free plan users have a shared limit of 5 generations for both the Tier 1 report and AI Summary.
Conclusion
ANY.RUN’s new Tier 1 reports and AI Summary convert sandbox analysis outputs into structured, operationally ready documents that support every stage of the incident lifecycle, from initial triage to executive visibility.
Embedding Interactive Sandbox directly into a SOC workflow strengthens overall security operations maturity by allowing for faster and more confident decision-making across processes.
About ANY.RUN
ANY.RUN delivers cybersecurity solutions designed to support real-world SOC operations. They help security teams understand threats faster, make informed decisions, and operationalize threat intelligence across detection, investigation, and response workflows.
Used by over 15,000 organizations and 600,000 security professionals worldwide, ANY.RUN is SOC 2 Type II certified, ensuring strong security controls and protection of customer data.
SOC-ready reports are sandbox analysis summaries that provide operational context for faster triage, escalation, incident response, and internal reporting.
Are Tier 1 reports designed only for Tier 1 analysts?
No. While Tier 1 reports are designed to accelerate initial triage, they also support Tier 2, Tier 3, incident response teams, SOC managers, and CISOs by providing structured operational context, standardized reporting, and fast visibility into threat severity and business impact.
What is included in ANY.RUN Tier 1 reports?
Tier 1 reports include a threat verdict, AI Summary, MITRE ATT&CK mapping, behavioral indicators, and IOCs generated directly from Interactive Sandbox analysis.
How does AI Summary improve incident response?
AI Summary converts technical sandbox findings into concise operational explanations that help analysts and decision-makers quickly assess threat severity, business impact, and required response actions.
Can ANY.RUN reports support SOC and MDR workflows?
Yes. ANY.RUN’s SOC-ready reporting helps standardize triage, escalation, and investigation workflows across internal SOC, MDR, and MSSP teams.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-05-13 09:06:422026-05-13 09:06:42New SOC-Ready Reporting for Faster Triage, Escalation, and Incident Response with ANY.RUN