Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Command & Evade: Turla's Kazuar v3 Loader

0
Medium
Published: Thu Jan 15 2026 (01/15/2026, 15:21:06 UTC)
Source: AlienVault OTX General

Description

Turla's Kazuar v3 loader employs sophisticated techniques to evade detection. It uses a VBScript to drop files and execute a native loader, which bypasses security measures and leverages COM for stealth. The loader utilizes control flow redirection, patchless ETW and AMSI bypasses, and COM integration to decrypt and execute three Kazuar v3 payloads (KERNEL, WORKER, BRIDGE) in memory. The attack chain is designed to be resilient and stealthy, exploiting trusted system processes to avoid detection. The malware uses modular architecture and COM subsystem integration to maintain a low profile while carrying out its malicious activities.

AI-Powered Analysis

AILast updated: 01/15/2026, 15:49:24 UTC

Technical Analysis

Turla's Kazuar v3 loader represents an evolution in malware loader design, employing multiple sophisticated techniques to evade detection and maintain persistence. The attack begins with a VBScript that drops files and executes a native loader, leveraging the Component Object Model (COM) for stealthy operations. This loader uses control flow redirection to complicate analysis and detection. It implements patchless bypasses of Event Tracing for Windows (ETW) and Antimalware Scan Interface (AMSI), allowing it to evade common Windows security monitoring and scanning tools without modifying system binaries. The loader decrypts and executes three distinct Kazuar v3 payloads—KERNEL, WORKER, and BRIDGE—entirely in memory, avoiding disk writes that would trigger traditional antivirus detection. The modular architecture allows flexible, multi-stage payload deployment, while COM subsystem integration exploits trusted system processes to blend malicious activity with legitimate operations. This design enhances resilience and stealth, complicating detection and forensic analysis. Indicators include multiple file hashes, IP addresses, URLs, and domains linked to the malware infrastructure. Although no active exploits are currently reported in the wild, the threat actor Turla is known for targeted espionage campaigns, suggesting potential use against high-value targets. The malware’s techniques align with MITRE ATT&CK tactics such as T1218.011 (Signed Binary Proxy Execution: Regsvr32), T1056.001 (Input Capture: Keylogging), T1140 (Deobfuscate/Decode Files or Information), and others related to evasion and persistence.

Potential Impact

For European organizations, the Kazuar v3 loader poses a significant risk primarily to entities involved in government, defense, critical infrastructure, and high-tech industries, which are typical targets of Turla. The malware’s stealth and in-memory execution reduce the likelihood of detection by conventional endpoint security solutions, increasing the risk of prolonged undetected presence and data exfiltration. The use of trusted system processes and COM integration complicates incident response and forensic investigations. Potential impacts include compromise of confidential information, disruption of operations through persistent backdoors, and facilitation of further lateral movement within networks. The modular payloads enable flexible attack scenarios, including kernel-level operations, worker processes for task execution, and bridge components for command and control communications. This could lead to espionage, intellectual property theft, or sabotage. The absence of known widespread exploitation currently limits immediate impact, but the threat remains relevant due to Turla’s history and the malware’s advanced capabilities.

Mitigation Recommendations

Mitigation should focus on advanced detection and prevention strategies tailored to the loader’s evasion techniques. Organizations should implement behavioral monitoring to detect anomalous COM object usage and unusual control flow patterns indicative of loader activity. Deploy endpoint detection and response (EDR) solutions capable of identifying in-memory execution and patchless ETW/AMSI bypass attempts. Restrict or monitor the use of scripting engines such as VBScript, especially in user and service contexts where such scripts are uncommon. Harden systems by disabling or limiting regsvr32 and other signed binary proxy execution methods unless explicitly required. Employ network monitoring to detect communications with known malicious domains and IPs associated with Kazuar infrastructure. Regularly update threat intelligence feeds with the provided indicators of compromise (IOCs) including hashes, domains, and URLs. Conduct threat hunting exercises focusing on the modular payload components and their behaviors. Finally, implement strict application whitelisting and least privilege principles to reduce the attack surface for initial execution vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://r136a1.dev/2026/01/14/command-and-evade-turlas-kazuar-v3-loader/"]
Adversary
Turla
Pulse Id
696905e2a033eb16b7a661e0
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashbe9fa93e088eb1c3daa9715d8b841cf0
hash166783244f50dc3a484ae46e204ae5e05621c651
hash34b7df7919dbbe031b5d802accb566ce6e91df4155b1858c3c81e4c003f1168c
hash3db10e71dab8710fb69b5c65c48382f43be3e4c79456d7a7abd5a7059873f581
hash436cfce71290c2fc2f2c362541db68ced6847c66a73b55487e5e5c73b0636c85
hash458ca514e058fccc55ee3142687146101e723450ebd66575c990ca55f323c769
hash69908f05b436bd97baae56296bf9b9e734486516f9bb9938c2b8752e152315d4
hash6eb31006ca318a21eb619d008226f08e287f753aec9042269203290462eaa00d
hash866824f2474ad603576b12b83831b2acc12d378f0ef4d0b20df10639b04c44da
hashb755e4369f1ac733da8f3e236c746eda94751082a3031e591b6643a596a86acb
hashbefa1695fcee9142738ad34cb0bfb453906a7ed52a73e2d665cf378775433aa8
hashc1f278f88275e07cc03bd390fe1cbeedd55933110c6fd16de4187f4c4aaf42b9

Ip

ValueDescriptionCopy
ip185.126.255.132

Url

ValueDescriptionCopy
urlhttps://185.126.255.132/requestor.php
urlhttps://arianeconseil.online/wp-includes/sitemaps/html/
urlhttps://download.originalapk.com/wp-content/plugins/loginizer/styles/
urlhttps://portal.northernfruit.com/wp-content/plugins/file-away/core/

Domain

ValueDescriptionCopy
domainarianeconseil.online
domainesetcloud.com
domainhostiko.com.ua
domaindownload.originalapk.com
domainportal.northernfruit.com

Threat ID: 696908b84c611209ad2ef0ec

Added to database: 1/15/2026, 3:33:12 PM

Last enriched: 1/15/2026, 3:49:24 PM

Last updated: 1/15/2026, 7:28:42 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats