Skip to main content
Mallory

Signed Malware Installers and Live C2 Infrastructure Fuel Multiple Loader Campaigns

loader-delivery-mechanismthreat-infrastructure-trackingcommand-and-control-methodcredential-stealer-activityremote-access-implant
Updated April 25, 2026 at 03:01 AM6 sources
Share:
Signed Malware Installers and Live C2 Infrastructure Fuel Multiple Loader Campaigns

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Breakglass Intelligence identified several active malware delivery operations using signed installers, compromised websites, and live command-and-control infrastructure to distribute loaders, stealers, and remote access tools. One campaign used the newly registered domain maybedontbanplease[.]com as CastleLoader C2 on 3NT Solutions LLP infrastructure, with a large NSIS installer embedding Python 3.14, AES-encrypted payloads, and in-memory shellcode execution via pythonw.exe; the installer was signed with an EV certificate issued to the likely fictitious entity SERPENTINE SOLAR LIMITED. The activity was attributed with medium-high confidence to GrayBravo and linked to delivery of LummaC2, StealC, RedLine, Rhadamanthys, DeerStealer, NetSupport RAT, and SectopRAT, with targeting that included U.S. government, critical infrastructure, IT, and logistics organizations.

A separate operation distributed a trojanized MSTeamsSetup.exe that installed a weaponized RustDesk client and communicated with mon.systemautoupdater[.]com on EvoXT infrastructure, while presenting a TLS certificate for calipology[.]com, tying the activity to the GeorgeGinx/Striker operator. In another live campaign, attackers used the compromised Syrian web development site allsydevs[.]com to host an obfuscated .NET loader masquerading as a WordPress image and connected victims to 172[.]93[.]167[.]12:4263 over HTTPS using a self-signed certificate with the fake common name Mesh Data; at least six related samples were linked to the same C2, with lure names suggesting targeting of Middle Eastern construction and export firms. Together, the investigations show financially motivated actors expanding malware distribution through fraudulent code-signing, trojanized business software, and hijacked web infrastructure.

Timeline

  1. Apr 10, 2026

    Breakglass exposes live AllSyDevs multi-campaign malware operation

    Breakglass reported that a compromised Syrian web development server, allsydevs[.]com, was hosting a .NET malware loader disguised as a WordPress image file, with a separate live C2 at 172[.]93[.]167[.]12:4263. The analysis tied at least six samples to the operation and described AES decryption, process injection, and targeting of Middle Eastern construction and export businesses.

  2. Apr 9, 2026

    Breakglass identifies signed MSTeams installer delivering RustDesk malware

    Breakglass reported that mon.systemautoupdater[.]com on 23.27.141[.]44 was active infrastructure for a trojanized Microsoft Teams installer that deployed a weaponized RustDesk client. The infrastructure and TLS artifacts linked the activity to the previously identified GeorgeGinx/Striker operator using the "calipology" handle.

  3. Apr 9, 2026

    Breakglass documents live CastleLoader C2 and GrayBravo attribution

    Breakglass reported that maybedontbanplease[.]com was being used as live CastleLoader C2 infrastructure resolving to 38[.]180[.]136[.]139, though the backend was down and only an nginx reverse proxy remained reachable. The report linked CastleLoader with medium-high confidence to GrayBravo and described delivery of multiple secondary payloads across U.S. government, critical infrastructure, IT, and logistics targets.

  4. Apr 8, 2026

    Trojanized MSTeams installer sample appears on MalwareBazaar

    A malicious MSTeamsSetup.exe sample delivering a weaponized RustDesk client was first observed on MalwareBazaar. The installer was signed with a suspicious certificate issued to "Zlatin Stamatov."

  5. Apr 2, 2026

    AllSyDevs-linked stealer and RAT infrastructure is established

    Infrastructure for the AllSyDevs operation was assessed as newly established in early April 2026, using compromised allsydevs[.]com hosting and a live C2 at 172[.]93[.]167[.]12:4263. The campaign supported multiple malware samples targeting mainly Middle Eastern commercial entities.

  6. Apr 2, 2026

    CastleLoader C2 domain maybedontbanplease.com is registered

    The domain maybedontbanplease[.]com, later identified as CastleLoader command-and-control infrastructure, was newly registered. Breakglass later tied it to GrayBravo-linked malware activity.

  7. Mar 18, 2026

    ThreatFox flags 172.93.167.12:4263 as botnet C2

    ThreatFox identified 172.93.167.12:4263 as botnet command-and-control infrastructure. This indicator was later linked to the AllSyDevs multi-campaign stealer and RAT operation.

  8. Mar 14, 2026

    Breakglass reports signed IcedID MSI delivering Latrodectus

    Breakglass analyzed a malicious signed MSI file, info_IR-99661418.msi, used as an IcedID Stage-1 dropper via the WiX custom action framework to execute an embedded .NET assembly and launch an IcedID DLL with rundll32.exe. The report said the malware beaconed to statifaronta.com and retrieved a Latrodectus Stage-2 payload tied to active infrastructure on 45.61.136.30, assessing the activity as a live ransomware-precursor campaign linked with medium-high confidence to TA577 or TA551-aligned operations.

  9. Mar 12, 2026

    Breakglass identifies Pulsar RAT v2.4.5 MSI campaign

    Breakglass reported an active campaign using a Windows Installer named haunt.msi, first seen on 2026-03-12, to deliver Pulsar RAT v2.4.5 through a multi-stage loader that disables AMSI, ETW, and WLDP. The report said command-and-control traffic was proxied through host.fedmenigga.workers.dev on Cloudflare Workers to a backend at 31.57.147.207 and assessed the actor as operating a sustained multi-tool campaign since at least February 2026.

  10. Mar 5, 2026

    Breakglass identifies CryptoVista trojanized installer signed with stolen EV certificate

    Breakglass reported a trojanized installer impersonating CryptoVista that was signed with a freshly issued SSL.com EV code-signing certificate belonging to TRUST & SIGN POLAND, a Docaposte subsidiary. The sample appeared by March 5, 2026 and used an Inno Setup-based loader with ChaCha20 encryption, XOR obfuscation, geofencing, and process injection, while achieving 0/36 AV detections as of March 10.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Malware Campaigns Using Fake Installers and Multi-Stage Loaders to Steal Credentials and Enable Remote Control

Malware Campaigns Using Fake Installers and Multi-Stage Loaders to Steal Credentials and Enable Remote Control

Multiple active malware campaigns are using **trojanized installers** and social engineering—rather than software vulnerabilities—to gain initial access and then deploy credential theft or remote-control capabilities. Intel 471 reported a new Android banking trojan dubbed **FvncBot** targeting Polish mobile banking users by impersonating an *mBank* “security” app; the dropper prompts installation of an additional “Play” component and then abuses **Android Accessibility Services** for persistence and control, enabling **keylogging**, **screen capture**, and hidden **VNC-style remote interaction** to facilitate fraudulent transactions. Separately, Cyderes described an ongoing, large-scale piracy-channel campaign where cracked game installers hide behind a legitimate-looking **Ren’Py** launcher tracked as **RenEngine**, which decrypts and launches subsequent stages and introduces **HijackLoader** via techniques including **DLL side-loading** and module stomping; observed final payloads include **ACR Stealer** (and in some cases **Vidar**) to exfiltrate browser credentials, cookies, and crypto wallet data. Cybereason detailed a different installer-themed operation in Chinese-speaking communities delivering **ValleyRat/Winos 4.0** attributed to **Silver Fox APT**, notable for using the rare **“PoolParty Variant 7”** process injection (abusing Windows I/O completion ports and `ZwSetIoCompletion()` after duplicating a handle from `Explorer.exe`) plus a strengthened watchdog mechanism via injection into `Explorer.exe` and `UserAccountBroker.exe` to maintain persistence.

1 months ago
ResolverRAT, LummaStealer, and Amadey Linked in Multi-Tool Cybercrime Campaign

ResolverRAT, LummaStealer, and Amadey Linked in Multi-Tool Cybercrime Campaign

Researchers tied **ResolverRAT**, **LummaStealer**, and an **Amadey** botnet cluster to an active financially motivated campaign that has operated since at least late 2025 and uses fake browser update lures, staged loaders, and legitimate remote management tools for persistence. One analyzed chain used a Donut-decrypted, triple-protected `.NET` loader to deliver both ResolverRAT and LummaStealer at once, combining persistent remote access with credential and cryptocurrency wallet theft. The malware used layered obfuscation including .NET Reactor, custom transformations, AES-256-CBC, GZip, process hollowing, fragmented WinAPI reconstruction, forged compile timestamps, encrypted resource blobs, and certificate pinning, while operators rotated infrastructure across dozens of IPs, multiple domains, and hosting providers in Russia, the Netherlands, Germany, Poland, and elsewhere. Investigators also identified a fake Microsoft-themed domain, **pat[.]microsoft-telemetry[.]at**, and newly activated infrastructure such as **kampf[.]huehnchenfarm[.]ru** tied to the same ecosystem. A parallel March 2026 investigation linked the **fbf543** Amadey campaign to more than 50 payloads spanning at least 13 malware families, including Vidar, QuasarRAT, XWorm, AsyncRAT, Smoke Loader, and LummaStealer, with delivery through fake installers and hosting on infrastructure centered on **Omegatech LTD (AS202412)** and related abusive networks. Analysts found that the operators also abused nine legitimate, signed RMM tools from **ConnectWise, DattoRMM, Atera, GoToResolve, and N-able**, configuring them to beacon to attacker-controlled relays rather than compromising the vendors themselves. A separate Go-based loader unpacked LummaStealer with AES, RC4, and QuickLZ before hollowing **AppLaunch.exe**, reinforcing a playbook built around stealthy loaders, infostealer deployment, redundant access channels, and monetization consistent with an initial access broker or ransomware affiliate operation.

1 weeks ago
Malware Delivery via Deceptive Distribution and Evasion Techniques

Malware Delivery via Deceptive Distribution and Evasion Techniques

Threat researchers reported multiple active campaigns focused on **stealthy malware delivery** by abusing trusted execution paths and deceptive distribution. Trellix described attackers using **DLL side-loading** against a legitimate, signed `ahost.exe` binary associated with the *c-ares* ecosystem (commonly seen with GitKraken Desktop) by placing a malicious `libcares-2.dll` alongside the executable to trigger search-order hijacking and execute attacker code. The activity was linked to delivery of commodity malware families including **Agent Tesla, Formbook, Remcos RAT, Quasar RAT, DCRat, XWorm, Vidar Stealer, Lumma Stealer, CryptBot**, and others, with targeting observed across business functions (finance, procurement, supply chain, administration) and lures in multiple languages, suggesting regionally focused operations. Separately, Malwarebytes documented a **fake RustDesk download site** (`rustdesk[.]work`) that installs legitimate RustDesk while silently deploying a persistent backdoor framework (**Winos4.0**) via a trojanized installer (e.g., `rustdesk-1.4.4-x86_64.exe`), relying on user deception rather than exploiting a software vulnerability. Sucuri detailed a WordPress compromise where attackers modified `index.php` to perform **selective content injection/SEO cloaking**, using IP-verified logic with hardcoded **Google ASN CIDR ranges** to serve malicious content to Googlebot while showing normal content to human visitors and site owners—an evasion technique that can facilitate downstream malware distribution while reducing the chance of detection.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.