Command & Evade: Turla's Kazuar v3 Loader
Turla's Kazuar v3 loader employs sophisticated techniques to evade detection. It uses a VBScript to drop files and execute a native loader, which bypasses security measures and leverages COM for stealth. The loader utilizes control flow redirection, patchless ETW and AMSI bypasses, and COM integration to decrypt and execute three Kazuar v3 payloads (KERNEL, WORKER, BRIDGE) in memory. The attack chain is designed to be resilient and stealthy, exploiting trusted system processes to avoid detection. The malware uses modular architecture and COM subsystem integration to maintain a low profile while carrying out its malicious activities.
AI Analysis
Technical Summary
Turla's Kazuar v3 loader represents an evolution in malware loader design, employing multiple sophisticated techniques to evade detection and maintain persistence. The attack begins with a VBScript that drops files and executes a native loader, leveraging the Component Object Model (COM) for stealthy operations. This loader uses control flow redirection to complicate analysis and detection. It implements patchless bypasses of Event Tracing for Windows (ETW) and Antimalware Scan Interface (AMSI), allowing it to evade common Windows security monitoring and scanning tools without modifying system binaries. The loader decrypts and executes three distinct Kazuar v3 payloads—KERNEL, WORKER, and BRIDGE—entirely in memory, avoiding disk writes that would trigger traditional antivirus detection. The modular architecture allows flexible, multi-stage payload deployment, while COM subsystem integration exploits trusted system processes to blend malicious activity with legitimate operations. This design enhances resilience and stealth, complicating detection and forensic analysis. Indicators include multiple file hashes, IP addresses, URLs, and domains linked to the malware infrastructure. Although no active exploits are currently reported in the wild, the threat actor Turla is known for targeted espionage campaigns, suggesting potential use against high-value targets. The malware’s techniques align with MITRE ATT&CK tactics such as T1218.011 (Signed Binary Proxy Execution: Regsvr32), T1056.001 (Input Capture: Keylogging), T1140 (Deobfuscate/Decode Files or Information), and others related to evasion and persistence.
Potential Impact
For European organizations, the Kazuar v3 loader poses a significant risk primarily to entities involved in government, defense, critical infrastructure, and high-tech industries, which are typical targets of Turla. The malware’s stealth and in-memory execution reduce the likelihood of detection by conventional endpoint security solutions, increasing the risk of prolonged undetected presence and data exfiltration. The use of trusted system processes and COM integration complicates incident response and forensic investigations. Potential impacts include compromise of confidential information, disruption of operations through persistent backdoors, and facilitation of further lateral movement within networks. The modular payloads enable flexible attack scenarios, including kernel-level operations, worker processes for task execution, and bridge components for command and control communications. This could lead to espionage, intellectual property theft, or sabotage. The absence of known widespread exploitation currently limits immediate impact, but the threat remains relevant due to Turla’s history and the malware’s advanced capabilities.
Mitigation Recommendations
Mitigation should focus on advanced detection and prevention strategies tailored to the loader’s evasion techniques. Organizations should implement behavioral monitoring to detect anomalous COM object usage and unusual control flow patterns indicative of loader activity. Deploy endpoint detection and response (EDR) solutions capable of identifying in-memory execution and patchless ETW/AMSI bypass attempts. Restrict or monitor the use of scripting engines such as VBScript, especially in user and service contexts where such scripts are uncommon. Harden systems by disabling or limiting regsvr32 and other signed binary proxy execution methods unless explicitly required. Employ network monitoring to detect communications with known malicious domains and IPs associated with Kazuar infrastructure. Regularly update threat intelligence feeds with the provided indicators of compromise (IOCs) including hashes, domains, and URLs. Conduct threat hunting exercises focusing on the modular payload components and their behaviors. Finally, implement strict application whitelisting and least privilege principles to reduce the attack surface for initial execution vectors.
Affected Countries
Ukraine, Germany, France, United Kingdom, Poland, Belgium
Indicators of Compromise
- hash: be9fa93e088eb1c3daa9715d8b841cf0
- hash: 166783244f50dc3a484ae46e204ae5e05621c651
- hash: 34b7df7919dbbe031b5d802accb566ce6e91df4155b1858c3c81e4c003f1168c
- hash: 3db10e71dab8710fb69b5c65c48382f43be3e4c79456d7a7abd5a7059873f581
- hash: 436cfce71290c2fc2f2c362541db68ced6847c66a73b55487e5e5c73b0636c85
- hash: 458ca514e058fccc55ee3142687146101e723450ebd66575c990ca55f323c769
- hash: 69908f05b436bd97baae56296bf9b9e734486516f9bb9938c2b8752e152315d4
- hash: 6eb31006ca318a21eb619d008226f08e287f753aec9042269203290462eaa00d
- hash: 866824f2474ad603576b12b83831b2acc12d378f0ef4d0b20df10639b04c44da
- hash: b755e4369f1ac733da8f3e236c746eda94751082a3031e591b6643a596a86acb
- hash: befa1695fcee9142738ad34cb0bfb453906a7ed52a73e2d665cf378775433aa8
- hash: c1f278f88275e07cc03bd390fe1cbeedd55933110c6fd16de4187f4c4aaf42b9
- ip: 185.126.255.132
- url: https://185.126.255.132/requestor.php
- url: https://arianeconseil.online/wp-includes/sitemaps/html/
- url: https://download.originalapk.com/wp-content/plugins/loginizer/styles/
- url: https://portal.northernfruit.com/wp-content/plugins/file-away/core/
- domain: arianeconseil.online
- domain: esetcloud.com
- domain: hostiko.com.ua
- domain: download.originalapk.com
- domain: portal.northernfruit.com
Command & Evade: Turla's Kazuar v3 Loader
Description
Turla's Kazuar v3 loader employs sophisticated techniques to evade detection. It uses a VBScript to drop files and execute a native loader, which bypasses security measures and leverages COM for stealth. The loader utilizes control flow redirection, patchless ETW and AMSI bypasses, and COM integration to decrypt and execute three Kazuar v3 payloads (KERNEL, WORKER, BRIDGE) in memory. The attack chain is designed to be resilient and stealthy, exploiting trusted system processes to avoid detection. The malware uses modular architecture and COM subsystem integration to maintain a low profile while carrying out its malicious activities.
AI-Powered Analysis
Technical Analysis
Turla's Kazuar v3 loader represents an evolution in malware loader design, employing multiple sophisticated techniques to evade detection and maintain persistence. The attack begins with a VBScript that drops files and executes a native loader, leveraging the Component Object Model (COM) for stealthy operations. This loader uses control flow redirection to complicate analysis and detection. It implements patchless bypasses of Event Tracing for Windows (ETW) and Antimalware Scan Interface (AMSI), allowing it to evade common Windows security monitoring and scanning tools without modifying system binaries. The loader decrypts and executes three distinct Kazuar v3 payloads—KERNEL, WORKER, and BRIDGE—entirely in memory, avoiding disk writes that would trigger traditional antivirus detection. The modular architecture allows flexible, multi-stage payload deployment, while COM subsystem integration exploits trusted system processes to blend malicious activity with legitimate operations. This design enhances resilience and stealth, complicating detection and forensic analysis. Indicators include multiple file hashes, IP addresses, URLs, and domains linked to the malware infrastructure. Although no active exploits are currently reported in the wild, the threat actor Turla is known for targeted espionage campaigns, suggesting potential use against high-value targets. The malware’s techniques align with MITRE ATT&CK tactics such as T1218.011 (Signed Binary Proxy Execution: Regsvr32), T1056.001 (Input Capture: Keylogging), T1140 (Deobfuscate/Decode Files or Information), and others related to evasion and persistence.
Potential Impact
For European organizations, the Kazuar v3 loader poses a significant risk primarily to entities involved in government, defense, critical infrastructure, and high-tech industries, which are typical targets of Turla. The malware’s stealth and in-memory execution reduce the likelihood of detection by conventional endpoint security solutions, increasing the risk of prolonged undetected presence and data exfiltration. The use of trusted system processes and COM integration complicates incident response and forensic investigations. Potential impacts include compromise of confidential information, disruption of operations through persistent backdoors, and facilitation of further lateral movement within networks. The modular payloads enable flexible attack scenarios, including kernel-level operations, worker processes for task execution, and bridge components for command and control communications. This could lead to espionage, intellectual property theft, or sabotage. The absence of known widespread exploitation currently limits immediate impact, but the threat remains relevant due to Turla’s history and the malware’s advanced capabilities.
Mitigation Recommendations
Mitigation should focus on advanced detection and prevention strategies tailored to the loader’s evasion techniques. Organizations should implement behavioral monitoring to detect anomalous COM object usage and unusual control flow patterns indicative of loader activity. Deploy endpoint detection and response (EDR) solutions capable of identifying in-memory execution and patchless ETW/AMSI bypass attempts. Restrict or monitor the use of scripting engines such as VBScript, especially in user and service contexts where such scripts are uncommon. Harden systems by disabling or limiting regsvr32 and other signed binary proxy execution methods unless explicitly required. Employ network monitoring to detect communications with known malicious domains and IPs associated with Kazuar infrastructure. Regularly update threat intelligence feeds with the provided indicators of compromise (IOCs) including hashes, domains, and URLs. Conduct threat hunting exercises focusing on the modular payload components and their behaviors. Finally, implement strict application whitelisting and least privilege principles to reduce the attack surface for initial execution vectors.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://r136a1.dev/2026/01/14/command-and-evade-turlas-kazuar-v3-loader/"]
- Adversary
- Turla
- Pulse Id
- 696905e2a033eb16b7a661e0
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashbe9fa93e088eb1c3daa9715d8b841cf0 | — | |
hash166783244f50dc3a484ae46e204ae5e05621c651 | — | |
hash34b7df7919dbbe031b5d802accb566ce6e91df4155b1858c3c81e4c003f1168c | — | |
hash3db10e71dab8710fb69b5c65c48382f43be3e4c79456d7a7abd5a7059873f581 | — | |
hash436cfce71290c2fc2f2c362541db68ced6847c66a73b55487e5e5c73b0636c85 | — | |
hash458ca514e058fccc55ee3142687146101e723450ebd66575c990ca55f323c769 | — | |
hash69908f05b436bd97baae56296bf9b9e734486516f9bb9938c2b8752e152315d4 | — | |
hash6eb31006ca318a21eb619d008226f08e287f753aec9042269203290462eaa00d | — | |
hash866824f2474ad603576b12b83831b2acc12d378f0ef4d0b20df10639b04c44da | — | |
hashb755e4369f1ac733da8f3e236c746eda94751082a3031e591b6643a596a86acb | — | |
hashbefa1695fcee9142738ad34cb0bfb453906a7ed52a73e2d665cf378775433aa8 | — | |
hashc1f278f88275e07cc03bd390fe1cbeedd55933110c6fd16de4187f4c4aaf42b9 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip185.126.255.132 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://185.126.255.132/requestor.php | — | |
urlhttps://arianeconseil.online/wp-includes/sitemaps/html/ | — | |
urlhttps://download.originalapk.com/wp-content/plugins/loginizer/styles/ | — | |
urlhttps://portal.northernfruit.com/wp-content/plugins/file-away/core/ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainarianeconseil.online | — | |
domainesetcloud.com | — | |
domainhostiko.com.ua | — | |
domaindownload.originalapk.com | — | |
domainportal.northernfruit.com | — |
Threat ID: 696908b84c611209ad2ef0ec
Added to database: 1/15/2026, 3:33:12 PM
Last enriched: 1/15/2026, 3:49:24 PM
Last updated: 1/15/2026, 7:28:42 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
MediumCastleLoader Malware Analysis: Full Execution Breakdown
MediumVoidLink Linux Malware Framework Targets Cloud Environments
MediumThreatFox IOCs for 2026-01-14
MediumPLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.