Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

A security alert regarding APT-C-28 (ScarCruft) using MiradorShell to launch a cyberattack.

0
Medium
Published: Mon Feb 09 2026 (02/09/2026, 10:18:26 UTC)
Source: AlienVault OTX General

Description

A recent investigation reveals that the APT-C-28 (ScarCruft) group has expanded its targets to include the cryptocurrency industry. The group employs sophisticated phishing tactics, using LNK files disguised as PDFs to lure victims with investment proposals ranging from $1-3 million. Upon execution, a multi-stage payload deployment occurs, ultimately installing MiradorShell v2.0 to gain system control. The attack chain involves file downloads, decryption, and the creation of scheduled tasks for persistence. MiradorShell, an AutoIt-based backdoor, connects to a command and control server, offering reverse shell capabilities, file management, remote program execution, and victim fingerprinting. The malware employs various evasion techniques, including inline library files and direct API calls.

AI-Powered Analysis

AILast updated: 02/09/2026, 11:00:50 UTC

Technical Analysis

The APT-C-28 group, also known as ScarCruft, has expanded its cyberattack operations to include the cryptocurrency industry, leveraging advanced phishing tactics to compromise victims. The attack vector involves sending LNK shortcut files masquerading as PDF documents, enticing victims with investment proposals ranging from $1 million to $3 million. When executed, these LNK files initiate a multi-stage payload deployment process that downloads and decrypts additional components, culminating in the installation of MiradorShell version 2.0. MiradorShell is an AutoIt-based backdoor that establishes a connection to a command and control (C2) server, enabling attackers to execute reverse shell commands, manage files, run remote programs, and perform victim fingerprinting to gather system information. Persistence is achieved through the creation of scheduled tasks, ensuring the malware remains active across reboots. The malware incorporates evasion techniques such as embedding inline library files and making direct API calls to avoid detection by traditional security tools. Indicators of compromise include specific file hashes, IP addresses, and URLs linked to the C2 infrastructure. Although no CVSS score is assigned, the threat is rated medium severity due to its potential impact and attack complexity. The campaign targets organizations involved in cryptocurrency, a sector of strategic interest to APT-C-28, indicating a focused and financially motivated espionage and intrusion effort.

Potential Impact

For European organizations, particularly those in the cryptocurrency and financial sectors, this threat can lead to significant confidentiality breaches, including theft of sensitive financial data and credentials. The integrity of systems may be compromised through unauthorized remote code execution and file manipulation, potentially resulting in fraudulent transactions or data tampering. Availability could also be affected if attackers disrupt operations or deploy ransomware as a secondary payload. The use of sophisticated phishing and evasion techniques increases the likelihood of successful compromise, especially in organizations with less mature security awareness or endpoint defenses. The financial losses and reputational damage could be substantial, given the high-value nature of targeted investment proposals and cryptocurrency assets. Additionally, the persistence mechanisms and stealthy communication with C2 servers complicate detection and remediation efforts, increasing dwell time and potential damage. European regulatory frameworks such as GDPR and NIS Directive impose strict requirements on incident response and data protection, raising the stakes for affected entities.

Mitigation Recommendations

1. Implement advanced phishing detection and user awareness training focused on identifying LNK files disguised as PDFs and suspicious investment proposals. 2. Enforce application whitelisting and restrict execution of LNK files from email attachments or untrusted sources. 3. Deploy endpoint detection and response (EDR) solutions capable of detecting AutoIt-based malware behaviors, including unusual API calls and inline library usage. 4. Monitor network traffic for connections to known C2 IP addresses and URLs associated with MiradorShell, using threat intelligence feeds to update detection rules. 5. Regularly audit and restrict scheduled tasks creation permissions to prevent unauthorized persistence mechanisms. 6. Employ multi-factor authentication and credential hygiene to limit attacker lateral movement and privilege escalation. 7. Conduct regular threat hunting exercises focusing on indicators of compromise such as the provided hashes and IP addresses. 8. Maintain up-to-date backups and incident response plans tailored to ransomware and backdoor infections. 9. Collaborate with industry information sharing groups to stay informed about evolving tactics of APT-C-28 and similar threat actors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA==&mid=2247507801&idx=1&sn=e169339f921fd11a2fef8dfe068e616c&chksm=f9c1ec50ceb66546d829de5d705bad2606ff83a30f6ced192c904506ceec666b8cef37822fab"]
Adversary
APT-C-28 (ScarCruft)
Pulse Id
6989b4731b7121e79a9ff3ef
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash4692034cd157c417c3868b5033d0e0d7
hashca1237bd33f61f77990d76a3df130ef5
hashe4e7351cf3fc80e6f65c2226d1cafdb2
hashf9945ddbfcb05ee49ba21d49e8087a18
hash037b234a805df96a7e0e60f110f55f715a3f5da1
hash47cc83176cd36abf0b5624f33bcf044b8f880cf521689981f891e52fbb3dbfa3

Ip

ValueDescriptionCopy
ip65.21.182.178

Url

ValueDescriptionCopy
urlhttp://techcross-wne.com/include/plugin/snoopy/board/libs/mrd.dat
urlhttp://techcross-wne.com/include/plugin/snoopy/board/register.php

Threat ID: 6989baf74b57a58fa144434a

Added to database: 2/9/2026, 10:46:15 AM

Last enriched: 2/9/2026, 11:00:50 AM

Last updated: 2/12/2026, 1:18:27 AM

Views: 181

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats