Based on both Microsoft Threat Intelligence’s findings and those reported by governments and other security vendors, we assess that the Russian nation-state actor tracked as Secret Blizzard has used the tools and infrastructure of at least six other threat actors during the past seven years. They also have actively targeted infrastructure where other threat actors have staged exfiltrated data from victims with the intention of collecting this data for their own espionage program. We assess that Secret Blizzard’s use of other actors’ infrastructure and tools, both state-sponsored and cybercriminal, is exclusively for facilitating espionage operations.In this first of a two-part blog series, we discuss how Secret Blizzard has used the infrastructure of the Pakistan-based threat activity cluster we call Storm-0156 — which overlaps with the threat actor known as [SideCopy](https://attack.mitre.org/groups/G1008/), [Transparent Tribe](https://attack.mitre.org/groups/G0134/), and APT36 — to install backdoors and collect intelligence on targets of interest in South Asia. Microsoft Threat Intelligence partnered with [Black Lotus Labs](https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/), the threat intelligence arm of Lumen Technologies, to confirm that Secret Blizzard command-and-control (C2) traffic emanated from Storm-0156 infrastructure, including infrastructure used by Storm-0156 to collate exfiltrated data from campaigns in Afghanistan and India. We thank the Black Lotus Team for recognizing the impact of this threat and collaborating on investigative efforts. In the second blog, Microsoft Threat Intelligence will be detailing how Secret Blizzard has used Amadey bots and the PowerShell backdoor of two other threat actors to deploy the [Tavdig](https://securelist.com/the-epic-turla-operation/65545/) backdoor and then use that foothold to install their [KazuarV2](https://www.darkreading.com/endpoint-security/upgraded-kazuar-backdoor-offers-stealthy-power) backdoor on target devices in Ukraine.Microsoft Threat Intelligence tracks Secret Blizzard campaigns and, when we are able, directly notifies customers who have been targeted or compromised, providing them with the necessary information to help secure their environments. As part of our continuous monitoring, analysis, and reporting on the threat landscape, we are sharing our research on Secret Blizzard’s activity to raise awareness of this threat actor’s tradecraft and to educate organizations on how to harden their attack surfaces against this and similar activity. In addition, we highlight that, while Secret Blizzard’s use of infrastructure and access by other threat actors is unusual, it is not unique. Therefore, organizations compromised by one threat actor may also find themselves compromised by another through the initial intrusion.Who is Secret Blizzard?———————–The United States Cybersecurity and Infrastructure Security Agency (CISA) has [attributed](https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a) Secret Blizzard to Center 16 of Russia’s Federal Security Service (FSB), which is [one of Russia’s Signals Intelligence and Computer Network Operations (CNO) services](https://www.gov.uk/government/publications/russias-fsb-malign-cyber-activity-factsheet/russias-fsb-malign-activity-factsheet) responsible for intercepting and decrypting electronic data as well as the technical penetration of foreign intelligence targets. Secret Blizzard overlaps with the threat actor tracked by other security vendors as [Turla](https://attack.mitre.org/groups/G0010/), Waterbug, Venomous Bear, Snake, Turla Team, and Turla APT Group.Secret Blizzard is known for targeting a wide array of verticals, but most prominently ministries of foreign affairs, embassies, government offices, defense departments, and defense-related companies worldwide. Secret Blizzard focuses on gaining long-term access to systems for intelligence collection using extensive resources such as multiple backdoors, including some with peer-to-peer functionality and C2 communication channels. During intrusions, the threat actor collects and exfiltrates documents, PDFs, and email content. In general, Secret Blizzard seeks out information of political importance with a particular interest in advanced research that might impact international political issues. Campaigns where Secret Blizzard has used the tools or compromised infrastructure of other threat adversaries that have been publicly reported by other security vendors include:* Accessing tools and infrastructure of Iranian state-sponsored threat actor Hazel Sandstorm (also called OilRig, APT-34 and Crambus) in 2017, as reported by [Symantec](https://symantec-enterprise-blogs.security.com/threat-intelligence/waterbug-espionage-governments) and [the US and UK intelligence services](https://media.defense.gov/2019/Oct/18/2002197242/-1/-1/0/NSA_CSA_Turla_20191021%20ver%204%20-%20nsa.gov.pdf)* Reusing [Andromeda malware](https://attack.mitre.org/software/S1074/) to deploy the[KopiLuwak](https://attack.mitre.org/software/S1075/) and [QuietCanary](https://attack.mitre.org/software/S1076/) backdoors in 2022, as reported by [Mandiant](https://cloud.google.com/blog/topics/threat-intelligence/turla-galaxy-opportunity/).* Using the backdoor of the Kazakhstan-based threat actor tracked by Microsoft Threat Intelligence as Storm-0473, also called Tomiris, in an attempt to deploy QuietCanary in 2022, as reported by [Kaspersky](https://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552/).While not unique, leveraging the access of other adversaries is a somewhat unusual attack vector for threat actors in general. Secret Blizzard’s use of this technique highlights their approach to diversifying attack vectors, including using strategic web compromises ([watering holes](https://www.welivesecurity.com/2020/03/12/tracking-turla-new-backdoor-armenian-watering-holes/)) and [adversary-in-the-middle (AiTM) campaigns](https://www.welivesecurity.com/2018/05/22/turla-mosquito-shift-towards-generic-tools/) likely facilitated via legally mandated intercept systems in Russia [such as the ‘System for Operative Investigative Activities’ (SORM](https://www.welivesecurity.com/2018/01/09/turlas-backdoor-laced-flash-player-installer/)). More commonly, Secret Blizzard uses server-side and edge device compromises as initial attack-vectors to facilitate further lateral movement within a network of interest.Compromise and post-compromise activities—————————————–Since November 2022, Microsoft Threat Intelligence has observed Secret Blizzard compromising the C2 infrastructure of a Pakistan-based espionage cluster that we track as Storm-0156. Secret Blizzard has used Storm-0156’s backdoors to deploy their own backdoors to compromised devices. In addition, Secret Blizzard tools have been deployed to virtual private servers (VPS) staging Storm-0156’s exfiltrated data.The initial access mechanism used by Secret Blizzard to compromise Storm-0156 infrastructure is currently not known. In some instances, observed by Microsoft Threat Intelligence, Storm-0156 appeared to have used the C2 server for a considerable amount of time, while in other observed incidents Storm-0156 began accessing the VPS when Secret Blizzard deployed tools.On the VPS used for C2, Storm-0156 operators consistently deploy a tool with the filename *ArsenalV2%.exe*. This is a server-side C2 tool that Microsoft Threat Intelligence refers to as Arsenal. Arsenal is an executable built on top of the cross-platform application development framework QtFramework, indicating it may also be deployed on operating systems other than Windows. Upon execution, Arsenal listens over a hardcoded port for incoming requests from controlled devices. Once connected, the tool enables threat actors to upload or download files to or from the device on which it is deployed.When Arsenal is deployed, at least two SQLite3 databases, named *ConnectionInfo.db* and *DownloadPriority.db*, are set up. Arsenal uses these databases to store and look up information in different tables, such as:* Uploaded files and a distinct username of the uploader* Affected device information, including IP address, location, operating system version, and installed antivirus software* Network connection events, duration of the session, and timestamps like the disconnect and connect timeInitially, Secret Blizzard deployed a fork of the [TinyTurla backdoor](https://blog.talosintelligence.com/tinyturla/) to Storm-0156 C2 servers. However, since October 2023, Secret Blizzard predominantly has been using a .NET backdoor that Microsoft Threat Intelligence refers to as TwoDash alongside a clipboard monitoring tool referred to as Statuezy. Shortly after we observed the deployment of these capabilities, our partner Black Lotus Labs observed C2 communication from the Storm-0156 C2 infrastructure to dedicated Secret Blizzard C2s. This privileged position on Storm-0156 C2s has allowed Secret Blizzard to commandeer Storm-0156 backdoors such as CrimsonRAT, which was previously observed in Storm-0156 campaigns in [2023](https://www.sentinelone.com/labs/transparent-tribe-apt36-pakistan-aligned-threat-actor-expands-interest-in-indian-education-sector/) and [earlier](https://www.trendmicro.com/en_dk/research/22/a/investigating-apt36-or-earth-karkaddans-attack-chain-and-malware.html), and a Storm-0156 Golang backdoor we refer to as Wainscot.Storm-0156 extensively uses a renamed version (*cridviz.exe, crezly.exe* ) of the Credential Backup and Restore Wizard, *credwiz.exe* which is vulnerable to DLL-sideloading, to load malicious payloads using a file name *DUser.dll* . Secret Blizzard often drops their own malicious payloads into a directory separate from that used by Storm-0156, but also uses *credwiz.exe* to load their malicious payload in a file called *duser.dll* . This DLL may contain a simple Meterpreter-like backdoor referred to as MiniPocket or the previously referenced TwoDash .NET backdoor. Secret Blizzard’s use of DLL-sideloading using the same legitimate executable and malicious payloads having similar names to those used by Storm-0156 may indicate Secret Blizzard attempts to masquerade as Storm-0156. Another Search-Order-Hijack used by Secret Blizzard is the deployment of TwoDash into the directory *c:–windows–system32* with the filename *oci.dll* and then using the default Windows installation Distributed Transaction Coordinator, *msdtc.exe* , to DLL-sideload the malicious payload in *oci.dll* as described by a [Penetration Testing Lab blog published in 2020](https://pentestlab.blog/2020/03/04/persistence-dll-hijacking/).![Diagram depicting Secret Blizzard first compromising Storm-0156 C2 infrastructure to deploy either TinyTurla or TwoDash, alongside Statuezy to the server. Second, Secret Blizzard implants are deployed to Storm-0156 C2 servers, and beacon to known Secret Blizzard C2 servers. Secret Blizzard then commandeers Storm-0156 backdoors to deploy TwoDash or Minipocket into existing victim networks, which have been observed within the Afghanistan government and other victim networks. Finally, Secret Blizzard implants and establishes a C2 channel with Secret Blizzard infrastructure, completing deployment.](https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/12/Figure-1.-Secret-Blizzard-and-Storm-0156-chain-of-compromise-1-1024×361.webp) *Figure 1. Secret Blizzard and Storm-0156 chain of compromise*In August 2024, Microsoft observed Secret Blizzard using a CrimsonRAT compromise that Storm-0156 had established in March 2024. Secret Blizzard is assessed to have commandeered the CrimsonRAT backdoor to download and execute Secret Blizzard’s TwoDash backdoor. Additionally, Microsoft observed instances of Secret Blizzard accessing Storm-0156’s CrimsonRAT on target devices in India. One of these CrimsonRAT deployments was configured with a C2 server at Contabo (*ur253.duckdns-[.-]org* : 45.14.194-[.-]253), where Secret Blizzard had deployed the clipboard monitor tool in January, February, and September 2024. Between May and August 2024, [Black Lotus Labs](https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/) confirmed network activity indicating backdoor communication from this same CrimsonRAT C2 to known Secret Blizzard infrastructure.Secret Blizzard backdoors deployed on Storm-0156 infrastructure—————————————————————### TinyTurla variantSimilar to the [TinyTurla](https://attack.mitre.org/software/S0668/) backdoor reported by [Cisco Talos in 2021](https://blog.talosintelligence.com/tinyturla/#:~:text=Cisco%20Secure%20Malware%20Analytics%20(Threat%20Grid)), the TinyTurla variant is installed using a batch file and disguises itself as a Windows-based service. The batch file also configures a variety of registry keys used by the malware including *Delay* (sleep time), *Key* (public key), and *Hosts* (C2 addresses).![Screenshot of code depicting the mp.bat file containing configuring parameters for the TinyTurla variant](https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/12/Figure-2.-mp.bat-file-containing-configuring-parameters-for-the-TinyTurla-variant-1024×198.webp) *Figure 2. mp.bat file containing configuring parameters for the TinyTurla variant*While there is not complete feature parity between the TinyTurla variant sample and the sample analyzed by Cisco Talos, there are significant functional and code overlaps.### TwoDashTwoDash is a custom downloader comprised of two main components: a native Win32/64 PE file and a .NET application. The native binary acts as a loader for the .NET application which it decrypts and executes. The .NET application conducts a basic device survey and sends this information to the configured C2 servers. Finally, it waits for follow-on tasks, which are compiled as additional .NET assemblies/modules.### StatuezyStatuezy is a custom trojan that monitors and logs data saved to the Windows clipboard. Each time the clipboard is updated with new data, the trojan saves the current timestamp, associated clipboard format (such as CF_TEXT), and the clipboard data itself to a temporary file which we assess is exfiltrated by a separate malware family.### MiniPocketMiniPocket is a small custom downloader that connects to a hardcoded IP address/port using TCP to retrieve and execute a second-stage binary.Storm-0156 backdoors used in this campaign——————————————### WainscotWainscot is a Golang-based backdoor seen in the wild since at least October 2023. This backdoor can handle various commands from C2, including launching arbitrary commands, uploading and downloading files, and taking screenshots on the target host. Though Microsoft Threat Intelligence has primarily observed this backdoor targeting Windows users, we also have identified public reports of a possible Wainscot variant targeting Linux-based platforms. Interestingly, this Linux variant has far more features than the Windows variant.### CrimsonRATCrimsonRAT is a .NET-based backdoor with varied capabilities that has gone through multiple iterations over the years. The most recent variant of CrimsonRAT analyzed by Microsoft Threat Intelligence can gather system information, list running processes, file information, download or upload files, and execute arbitrary commands on target. We also have observed CrimsonRAT dropping additional modules to act as a keylogger on the target host.Who has been affected by Secret Blizzard’s compromises using Storm-0156 infrastructure?—————————————————————————————In Afghanistan, Secret Blizzard generally has used their positions on Storm-0156 C2 servers to deploy backdoors to devices within the extended Afghan government—including the Ministry of Foreign Affairs, the General Directorate of Intelligence (GDI), and foreign consulates of the government of Afghanistan. In each of these cases, we observed the deployment of Storm-0156 backdoors which were subsequently used to download the Secret Blizzard tools to target devices in Afghanistan.In India, Secret Blizzard generally appears to have avoided direct deployment via Storm-0156 backdoors, instead deploying Secret Blizzard backdoors to C2 servers or Storm-0156 servers hosting data exfiltrated from Indian military and defense-related institutions. We observed only one instance of Secret Blizzard using a Storm-0156 backdoor to deploy the TwoDash backdoor to a target desktop in India. The difference in Secret Blizzard’s approach in Afghanistan and India could reflect political considerations within the Russian leadership, differing geographical areas of responsibility within the FSB, or a collection gap on Microsoft Threat Intelligence’s part.Conclusion———-The frequency of Secret Blizzard’s operations to co-opt or commandeer the infrastructure or tools of other threat actors suggests that this is an intentional component of Secret Blizzard’s tactics and techniques. Leveraging this type of resource has both advantages and drawbacks. Taking advantage of the campaigns of others allows Secret Blizzard to establish footholds on networks of interest with relatively minimal effort. However, because these initial footholds are established on another threat actor’s targets of interest, the information obtained through this technique may not align entirely with Secret Blizzard’s collection priorities. In addition, if the threat actor that established the initial foothold has poor operational security, this technique might trigger endpoint or network security alerts on the tools deployed by the actor conducting the initial compromise, resulting in unintended exposure of Secret Blizzard activity.Mitigation and protection guidance———————————-To harden networks against the Secret Blizzard activity listed above, defenders can implement the following:### Strengthen Microsoft Defender for Endpoint configuration* Microsoft Defender XDR customers can implement [attack surface reduction rules](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-deployment-implement) to harden an environment against techniques used by threat actors * [Block execution of potentially obfuscated scripts](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-execution-of-potentially-obfuscated-scripts) * [Block process creations originating from PSExec and WMI commands](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-process-creations-originating-from-psexec-and-wmi-commands) * [Block executable files from running](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) unless they meet a prevalence, age, or trusted list criterion * [Block abuse of exploited vulnerable signed drivers](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-abuse-of-exploited-vulnerable-signed-drivers) * [Block Webshell creation for Servers](https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-webshell-creation-for-servers)* [Enable network protection](https://learn.microsoft.com/defender-endpoint/enable-network-protection) in Microsoft Defender for Endpoint* Ensure [tamper protection](https://learn.microsoft.com/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#how-do-i-configure-or-manage-tamper-protection) is enabled in Microsoft Dender for Endpoint* Run endpoint detection and response in [block mode](https://learn.microsoft.com/defender-endpoint/edr-in-block-mode) so that Microsoft Defender for Endpoint can block malicious artifacts even when your non-Microsoft antivirus does not detect the threat or when Microsoft Defender Antivirus is running in passive mode* Configure [investigation and remediation](https://learn.microsoft.com/microsoft-365/security/defender-endpoint/automated-investigations) in full automated mode to let Microsoft Defender for Endpoint take immediate action on alerts to resolve breaches, significantly reducing alert volume### Strengthen Microsoft Defender Antivirus configuration* [Turn on PUA protection in block mode](https://learn.microsoft.com/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus) in Microsoft Defender Antivirus* Turn on [cloud-delivered protection](https://learn.microsoft.com/defender-endpoint/cloud-protection-microsoft-defender-antivirus) in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving threat actor tools and techniques* Turn on Microsoft Defender Antivirus [real-time protection](https://learn.microsoft.com/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)### Strengthen operating environment configuration* Encourage users to use Microsoft Edge and other web browsers that support [SmartScreen](https://learn.microsoft.com/defender-endpoint/web-protection-overview) which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that host malware. Implement [PowerShell execution policies](https://learn.microsoft.com/powershell/scripting/security/security-features?view=powershell-7.4#execution-policy) to control conditions under which PowerShell can load configuration files and run scripts* Turn on and monitor PowerShell [module and script block logging](https://learn.microsoft.com/powershell/scripting/security/security-features?view=powershell-7.4#module-and-script-block-logging)* Implement [PowerShell execution policies](https://learn.microsoft.com/powershell/scripting/security/security-features?view=powershell-7.4#execution-policy) to control conditions under which PowerShell can load configuration files and run scripts.* Turn on and monitor PowerShell [module and script block logging](https://learn.microsoft.com/powershell/scripting/security/security-features?view=powershell-7.4#module-and-script-block-logging).Microsoft Defender XDR detections———————————**Microsoft Defender Antivirus**Microsoft Defender Antivirus detects this threat as the following malware:* [Backdoor:Win64/Wainscot](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Backdoor:Win64/Wainscot.A!dha)* [Backdoor:MSIL/CrimsonRat.A](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Backdoor:MSIL/CrimsonRat.A)* [Backdoor:MSIL/CrimsonRat.B](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Backdoor:MSIL/CrimsonRat.B!MTB)* TrojanSpy:MSIL/CrimsonRat.A* [TrojanDownloader:Win64/TwoDash](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=TrojanDownloader%3AWin64/TwoDash!dha&threatId=-2147125841)* [Trojan:MSIL/ReverseRAT](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Trojan:MSIL/ReverseRat.CCBH!MTB)* Trojan:Win32/TinStrut.A* Trojan:Win64/TinyTurla.A* Trojan:Win64/TinyTurla.B* Trojan:Win32/MiniPocket.A* TrojanDownloader:Win64/TwoDash.A* Trojan:Win64/TwoDash.B* Trojan:Win64/PostGallery.A* Trojan:Win32/Statuezy.B* Trojan:Win32/TinyTurla**Microsoft Defender for Endpoint**The following Microsoft Defender for Endpoint alerts can indicate associated threat activity:* Secret Blizzard Actor activity detectedThe following alerts might also indicate threat activity related to this threat. Note, however, these alerts also can be triggered by unrelated threat activity.* An executable file loaded an unexpected DLL file* Process loaded suspicious .NET assembly### Threat intelligence reportsMicrosoft customers can use the following reports in Microsoft products to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide the intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments. Microsoft Security Copilot customers can also use the [Microsoft Security Copilot integration](https://learn.microsoft.com/defender/threat-intelligence/security-copilot-and-defender-threat-intelligence?bc=%2Fsecurity-copilot%2Fbreadcrumb%2Ftoc.json&toc=%2Fsecurity-copilot%2Ftoc.json#turn-on-the-security-copilot-integration-in-defender-ti) in Microsoft Defender Threat Intelligence to get more information about this threat actor.**Microsoft Defender Threat Intelligence*** [Secret Blizzard co-opts SideCopy’s infrastructure to target Afghanistan government](https://security.microsoft.com/intel-explorer/articles/f6c85901)### Hunting queries**Microsoft Defender XDR**The following sample queries let you search for a week’s worth of events. To explore up to 30 days’ worth of raw data to inspect events in your network and locate potential PowerShell-related indicators for more than a week, go to the Advanced hunting page -> Query tab, select the calendar dropdown menu to update your query to hunt for the Last 30 days.**Storm-0156 compromise-associated malware**Surface events that may have involved Storm-0156 compromise-associated malware. “`let fileHashes = dynamic([‘e298b83891b192b8a2782e638e7f5601acf13bab2f619215ac68a0b61230a273’, ‘08803510089c8832df3f6db57aded7bfd2d91745e7dd44985d4c9cb9bd5fd1d2’, ‘aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c’, ‘7c4ef30bd1b5cb690d2603e33264768e3b42752660c79979a5db80816dfb2ad2’, ‘dbbf8108fd14478ae05d3a3a6aabc242bff6af6eb1e93cbead4f5a23c3587ced’, ‘7c7fad6b9ecb1e770693a6c62e0cc4183f602b892823f4a451799376be915912’, ‘e2d033b324450e1cb7575fedfc784e66488e342631f059988a9a2fd6e006d381’, ‘C039ec6622393f9324cacbf8cfaba3b7a41fe6929812ce3bd5d79b0fdedc884a’, ’59d7ec6ec97c6b958e00a3352d38dd13876fecdb2bb13a8541ab93248edde317′]);union( DeviceFileEvents | where SHA256 in (fileHashes) | project Timestamp, FileHash = SHA256, SourceTable = ‘DeviceFileEvents’),( DeviceEvents | where SHA256 in (fileHashes) | project Timestamp, FileHash = SHA256, SourceTable = ‘DeviceEvents’),( DeviceImageLoadEvents | where SHA256 in (fileHashes) | project Timestamp, FileHash = SHA256, SourceTable = ‘DeviceImageLoadEvents’),( DeviceProcessEvents | where SHA256 in (fileHashes) | project Timestamp, FileHash = SHA256, SourceTable = ‘DeviceProcessEvents’)| order by Timestamp desc“`**Microsoft Sentinel**Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI map’) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the [Microsoft Sentinel Content Hub](https://learn.microsoft.com/azure/sentinel/sentinel-solutions-deploy) to have the analytics rule deployed in their Sentinel workspace.Search for file-based IOCs: “`let selectedTimestamp = datetime(2024-10-17T00:00:00.0000000Z); let fileName = dynamic([‘hubstck.exe’,’auddrv.exe’,’lustsorelfar.exe’,’duser.dll’,’mfmpef.exe’,’MpSvcS.dll’,’WinHttpSvc.dll’,’regsvr.exe’]); let FileSHA256 = dynamic([‘e298b83891b192b8a2782e638e7f5601acf13bab2f619215ac68a0b61230a273′,’08803510089c8832df3f6db57aded7bfd2d91745e7dd44985d4c9cb9bd5fd1d2′,’aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c’,’7c4ef30bd1b5cb690d2603e33264768e3b42752660c79979a5db80816dfb2ad2′,’dbbf8108fd14478ae05d3a3a6aabc242bff6af6eb1e93cbead4f5a23c3587ced’,’7c7fad6b9ecb1e770693a6c62e0cc4183f602b892823f4a451799376be915912′,’e2d033b324450e1cb7575fedfc784e66488e342631f059988a9a2fd6e006d381′,’C039ec6622393f9324cacbf8cfaba3b7a41fe6929812ce3bd5d79b0fdedc884a’,’59d7ec6ec97c6b958e00a3352d38dd13876fecdb2bb13a8541ab93248edde317′]); search in (AlertEvidence,BehaviorEntities,CommonSecurityLog,DeviceBaselineComplianceProfiles,DeviceEvents,DeviceFileEvents,DeviceImageLoadEvents, DeviceLogonEvents,DeviceNetworkEvents,DeviceProcessEvents,DeviceRegistryEvents,DeviceFileCertificateInfo,DynamicEventCollection,EmailAttachmentInfo,OfficeActivity,SecurityEvent,ThreatIntelligenceIndicator) TimeGenerated between ((selectedTimestamp – 1m) .. (selectedTimestamp + 90d)) // from October 17th runs the search for last 90 days, change the selectedTimestamp or 90d accordingly. and (FileName in (fileName) or OldFileName in (fileName) or ProfileName in (fileName) or InitiatingProcessFileName in (fileName) or InitiatingProcessParentFileName in (fileName) or InitiatingProcessVersionInfoInternalFileName in (fileName) or InitiatingProcessVersionInfoOriginalFileName in (fileName) or PreviousFileName in (fileName) or ProcessVersionInfoInternalFileName in (fileName) or ProcessVersionInfoOriginalFileName in (fileName) or DestinationFileName in (fileName) or SourceFileName in (fileName)or ServiceFileName in (fileName) or SHA256 in (FileSHA256) or InitiatingProcessSHA256 in (FileSHA256))“`Search for network IOCs: “`let selectedTimestamp = datetime(2024-10-17T00:00:00.0000000Z);let ip = dynamic([‘94.177.198.94′,’162.213.195.129′,’46.249.58.201′,’95.111.229.253′,’146.70.158.90′,’143.198.73.108′,’161.35.192.207′,’91.234.33.48′,’154.53.42.194′,’38.242.207.36′,’167.86.118.69′,’164.68.108.153′,’144.91.72.17’,’130.185.119.198 ‘,’176.57.184.97′,’173.212.252.2′,’209.126.11.251′,’45.14.194.253′,’37.60.236.186′,’5.189.183.63′,’109.123.244.46’]);let url = dynamic([‘connectotels.net’,’hostelhotels.net’,’ur253.duckdns.org’]);search in (AlertEvidence,BehaviorEntities,CommonSecurityLog,DeviceInfo,DeviceNetworkEvents,DeviceNetworkInfo,DnsEvents,SecurityEvent,VMConnection,WindowsFirewall)TimeGenerated between ((selectedTimestamp – 1m) .. (selectedTimestamp + 90d)) // from October 17th runs the search for last 90 days, change the above selectedTimestamp or 90d accordingly.and (RemoteIP in (ip) or DestinationIP in (ip) or DeviceCustomIPv6Address1 in (ip) or DeviceCustomIPv6Address2 in (ip) or DeviceCustomIPv6Address3 in (ip) or DeviceCustomIPv6Address4 in (ip) or MaliciousIP in (ip) or SourceIP in (ip) or PublicIP in (ip) or LocalIPType in (ip) or RemoteIPType in (ip) or IPAddresses in (ip) or IPv4Dhcp in (ip) or IPv6Dhcp in (ip) or IpAddress in (ip) or NASIPv4Address in (ip) or NASIPv6Address in (ip) or RemoteIpAddress in (ip) or RemoteUrl in (url))“`### Indicators of compromise**Storm-0156 compromise-associated malware****Indicator** **Type** **Association** **Last seen** e298b83891b192b8a2782e638e7f5601acf13bab2f619215ac68a0b61230a273 Wainscot SHA-256 (*hubstck.exe* ) Storm-0156 08803510089c8832df3f6db57aded7bfd2d91745e7dd44985d4c9cb9bd5fd1d2 Wainscot SHA-256 (*auddrv.exe* ) Storm-0156 aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c CrimsonRAT SHA-256 (*lustsorelfar.exe* ) Storm-0156 7c4ef30bd1b5cb690d2603e33264768e3b42752660c79979a5db80816dfb2ad2 Minipocket SHA-256 (*duser.dll* ) Secret Blizzard dbbf8108fd14478ae05d3a3a6aabc242bff6af6eb1e93cbead4f5a23c3587ced TwoDash backdoor SHA-256 (*mfmpef.exe* ) Secret Blizzard 7c7fad6b9ecb1e770693a6c62e0cc4183f602b892823f4a451799376be915912 TwoDash backdoor SHA-256 (*duser.dll* ) Secret Blizzard e2d033b324450e1cb7575fedfc784e66488e342631f059988a9a2fd6e006d381 TinyTurla variant SHA-256 (*MpSvcS.dl* ) Secret Blizzard C039ec6622393f9324cacbf8cfaba3b7a41fe6929812ce3bd5d79b0fdedc884a TinyTurla variant SHA-256 (*WinHttpSvc.dll* ) Secret Blizzard 59d7ec6ec97c6b958e00a3352d38dd13876fecdb2bb13a8541ab93248edde317 Clipboard monitor SHA-256 (*regsvr.exe* ) Secret Blizzard connectotels-[.-]net TinyTurla C2 domain Secret Blizzard April 2022 hostelhotels-[.-]net TinyTurla C2 domain Secret Blizzard February 2023 94.177.198-[.-]94 TinyTurla C2 IP address Secret Blizzard September2022 162.213.195-[.-]129 TinyTurla C2 IP address Secret Blizzard February 2023 46.249.58-[.-]201 TinyTurla C2 IP address Secret Blizzard February 2023 95.111.229-[.-]253 TinyTurla C2 IP address Secret Blizzard September 2022 146.70.158-[.-]90 MiniPocket and TwoDash C2 IP address Secret Blizzard May 2024 143.198.73-[.-]108 TwoDash C2 IP address Secret Blizzard September2023 161.35.192-[.-]207 TwoDash C2 IP address Secret Blizzard April 2024 91.234.33-[.-]48 TwoDash C2 IP address Secret Blizzard April 2024 154.53.42-[.-]194 ReverseRAT C2 IP address Compromised Storm-0156 infrastructure July 2024 38.242.207-[.-]36 ReverseRAT C2 IP address Compromised Storm-0156 infrastructure May 2023 167.86.118-[.-]69 ReverseRAT C2 IP address Compromised Storm-0156 infrastructure May 2023 164.68.108-[.-]153 ReverseRAT C2 IP address Compromised Storm-0156 infrastructure August 2024 144.91.72-[.-]17 Action RAT C2 IP address Compromised Storm-0156 infrastructure February 2023 130.185.119-[.-]198 Wainscot C2 IP address Compromised Storm-0156 infrastructure August 2024 176.57.184-[.-]97 Wainscot C2 IP address Compromised Storm-0156 infrastructure September 2024 173.212.252-[.-]2 Wainscot C2 IP address Compromised Storm-0156 infrastructure August 2024 209.126.11-[.-]251 Wainscot C2 IP address Compromised Storm-0156 infrastructure June 2024 45.14.194-[.-]253 CrimsonRAT C2 IP address Compromised Storm-0156 infrastructure September 2024 37.60.236-[.-]186 CrimsonRAT C2 IP address Compromised Storm-0156 infrastructure August 2024 5.189.183-[.-]63 CrimsonRAT C2 IP address Compromised Storm-0156 infrastructure August 2024 109.123.244-[.-]46 C2 Server hosting exfiltrated target data Compromised Storm-0156 infrastructure August 2024References———-* * * * * * * * * * [https://media.defense.gov/2019/Oct/18/2002197242/-1/-1/0/NSA_CSA_Turla_20191021 ver 4 — nsa.gov.pdf](https://media.defense.gov/2019/Oct/18/2002197242/-1/-1/0/NSA_CSA_Turla_20191021 ver 4 – nsa.gov.pdf)* * * * * * * * * * * * * * [https://blog.talosintelligence.com/tinyturla/#:-~:text=Cisco%20Secure%20Malware%20Analytics%20(Threat%20Grid)](https://blog.talosintelligence.com/tinyturla/#:~:text=Cisco%20Secure%20Malware%20Analytics%20(Threat%20Grid))* * Learn more———-For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog: .To get notified about new publications and to join discussions on social media, follow us on LinkedIn at , and on X (formerly Twitter) at .To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast: .The post [Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage](https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/) appeared first on [Microsoft Security Blog](https://www.microsoft.com/en-us/security/blog).
Related Tags:
ITG13
ANDROMEDA
Secret Blizzard
EUROPIUM
Hazel Sandstorm
NAICS: 923 – Administration Of Human Resource Programs
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
Associated Indicators:
https://thecyberwire.com/podcasts/microsoft-threat-intelligence.
https://aka.ms/threatintelblog.
blog.lumen.com
pentestlab.blog
thecyberwire.com
144.91.72.17
https://pentestlab.blog/2020/03/04/persistence-dll-hijacking/
https://www.sentinelone.com/labs/transparent-tribe-apt36-pakistan-aligned-threat-actor-expands-interest-in-indian-education-sector/
209.126.11.251