Actor associated with Russia known as Homoredon .
The group is aimed at the Western country’s military mission, in accordance with the hunting team for threatening Symantec, with the first signs of malicious activity revealed on February 26, 2025.
“The original vector of the infection used by the attackers – Note In a report that shared with Hacker News.
The attack began with the creation of the Windows registry under the Key Usersist, then launched “Mshta.exe” using “Explorer.exe” to initiate a multi -stage infection chain and run two files.
The first file, named “Ntuser.dat.tmcontonTainer0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Другі файл, пра які ідзе гаворка, “ntuser.dat.tmcontainer000000000000000002.regtrans-ms”, прызначаны для заражэння здымных дыскаў і сеткавых дыскаў, стварыўшы файлы хуткага доступу для кожнай тэчкі для выканання шкоднаснай каманды “mshta.exe” і схаваць яго.
After March 1, 2025, the script was executed to contact the C2 server, exfiltrate system metadata and receive, in return, a useful load of the Base64, which is then used to launch the PowerShell command, designed to download the siblit new version of the same scenario.
The scenario, for its part, connects to the C2 tough server to get two more PowerShell scenarios, the first of which is a reconnaissance utility capable of fixing screenshots, running the Systeminfo command, to get detailed information about the security program, lists the files and stakes on the desktop.
Second PowerShell scenario – this is an advanced version RangeA well -known information theft that can highlight the victim’s files based on desktop enlargement and documentaries.
“This attack really means something increased for the Shuckworm that appears Tireless attention is paid to targets in Ukraine“Symantec said.
“While the group does not seem to have access to the same skill set as some other Russian groups, Shuckworm does now seem to try to compensate for this, constantly making minor changes in the code that he uses, adding exacerbation and using legitimate web services to try to reduce the risk of detection.”