Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CAPI Backdoor: .NET Stealer Targeting Russian Auto-Commerce

0
Medium
Published: Fri Oct 17 2025 (10/17/2025, 15:59:18 UTC)
Source: AlienVault OTX General

Description

The CAPI Backdoor is a malicious . NET-based stealer malware deployed via spear-phishing campaigns targeting the Russian automobile-commerce sector. It leverages living-off-the-land binaries (LOLBins) and various TTPs such as credential access, persistence, and command-and-control communication to exfiltrate sensitive data. Although primarily focused on Russian targets, the malware's use of common . NET frameworks and phishing vectors poses a potential risk to organizations with similar profiles in Europe. The campaign is under FBI investigation, highlighting its operational significance. No known exploits or CVEs are associated, and the threat is currently rated medium severity. Indicators include specific file hashes, an IP address linked to a Russian ASN, and a suspicious domain. European organizations with business ties or subsidiaries in Russia or those in the automotive commerce sector should be vigilant. Mitigation requires targeted phishing defenses, monitoring for the identified indicators, and restricting execution of unauthorized .

AI-Powered Analysis

AILast updated: 10/17/2025, 16:17:46 UTC

Technical Analysis

The CAPI Backdoor is a .NET implant malware identified by Seqrite Labs targeting the Russian automobile-commerce industry through spear-phishing campaigns. The malware functions as a stealer and backdoor, designed to infiltrate victim systems by exploiting user trust via phishing emails. Once executed, it uses living-off-the-land binaries (LOLBins) to evade detection and perform actions such as credential harvesting (T1555), persistence (T1547), command and control communications (T1071, T1041), and data exfiltration. The malware employs various MITRE ATT&CK techniques including process injection, file and directory discovery, and disabling security tools. Indicators of compromise include specific file hashes and a command and control IP address (91.223.75.96) associated with a Russian ASN, as well as a suspicious domain (carprlce.ru). The campaign is under FBI investigation, indicating its seriousness. Although no CVEs or known exploits are linked, the malware's use of .NET technology and phishing vectors makes it adaptable and potentially impactful. The campaign's focus on Russian automobile-commerce suggests a targeted espionage or financial theft motive. The medium severity rating reflects the malware's moderate impact and exploitation complexity, requiring user interaction via phishing. The threat is documented with references including a detailed Seqrite blog post.

Potential Impact

For European organizations, the direct impact may be limited given the campaign's focus on Russian automobile-commerce. However, European companies with subsidiaries, partners, or supply chain links to Russian automotive commerce could be at risk of collateral compromise. The malware's data-stealing capabilities threaten confidentiality by exfiltrating sensitive business and credential information. Integrity and availability impacts are less pronounced but possible if the backdoor is used for further lateral movement or disruption. The use of phishing as an infection vector means that organizations with less mature email security and user awareness programs are more vulnerable. Additionally, the malware's use of LOLBins complicates detection, increasing dwell time and potential damage. The geopolitical tensions involving Russia may also increase the likelihood of targeting European companies with indirect ties to the region. Overall, the threat could lead to intellectual property theft, financial loss, and reputational damage for affected European entities.

Mitigation Recommendations

1. Implement advanced email filtering and anti-phishing solutions to detect and block spear-phishing attempts, especially those targeting automotive commerce sectors. 2. Conduct targeted user awareness training focusing on phishing risks and suspicious .NET executable behavior. 3. Monitor and restrict execution of unauthorized .NET binaries and living-off-the-land binaries (LOLBins) commonly abused by this malware. 4. Deploy endpoint detection and response (EDR) tools capable of detecting suspicious process injection, credential dumping, and command and control communications. 5. Use threat intelligence feeds to block known indicators such as the identified file hashes, IP address 91.223.75.96, and domain carprlce.ru at network perimeter devices. 6. Enforce least privilege principles to limit credential access and lateral movement opportunities. 7. Regularly audit and harden persistence mechanisms to detect and remove unauthorized startup entries or scheduled tasks. 8. Establish network segmentation to isolate critical systems and monitor for unusual outbound traffic patterns. 9. Collaborate with law enforcement and share threat intelligence to stay updated on campaign developments. 10. Conduct regular incident response drills simulating phishing and malware infection scenarios relevant to this threat.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/seqrite-capi-backdoor-dotnet-stealer-russian-auto-commerce-oct-2025/"]
Adversary
null
Pulse Id
68f267d7f3f461fba8d4f189
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash957b34952d92510e95df02e3600b8b21
hashc0adfd84dfae8880ff6fd30748150d32
hashc6a6fcec59e1eaf1ea3f4d046ee72ffe

Ip

ValueDescriptionCopy
ip91.223.75.96
CC=RU ASN=AS39087 p.a.k.t llc

Url

ValueDescriptionCopy
urlhttps://carprlce.ru

Domain

ValueDescriptionCopy
domaincarprlce.ru

Threat ID: 68f268639c34d0947f2fb2e4

Added to database: 10/17/2025, 4:01:39 PM

Last enriched: 10/17/2025, 4:17:46 PM

Last updated: 10/19/2025, 2:17:30 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats