From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations
Tangerine Turkey is a cryptomining campaign that propagates via VBScript worms spread through USB drives, leveraging legitimate system binaries for execution and persistence. The malware employs advanced defense evasion techniques such as registry modification and masquerading malicious files as legitimate system components. It establishes persistence through malicious services and scheduled tasks while attempting to disable Windows Defender. Although its primary objective is unauthorized cryptocurrency mining, its capabilities for persistence and lateral movement pose broader security risks. The campaign uses living-off-the-land binaries and creates mock directories to conceal its activities. No known CVEs or exploits are currently associated with this threat. The medium severity rating reflects the financial motivation and potential for system compromise without immediate destructive impact. European organizations using Windows systems with USB access are at risk, especially those with lax endpoint security controls and high-value targets. Mitigation requires targeted controls beyond generic advice, including USB device management, monitoring for living-off-the-land abuse, and registry integrity checks.
AI Analysis
Technical Summary
The Tangerine Turkey campaign is a cryptomining operation that utilizes VBScript worms to propagate primarily via USB removable drives. This worm-based propagation method allows the malware to spread autonomously across systems without requiring network exploits. Once executed, the malware leverages living-off-the-land binaries—legitimate Windows system tools—to execute its payload and maintain persistence, complicating detection by traditional antivirus solutions. The campaign employs defense evasion techniques such as modifying registry keys to hide its presence and masquerading malicious binaries as legitimate system files to avoid suspicion. Persistence is achieved through the creation of malicious Windows services and scheduled tasks, ensuring the malware remains active after reboots. Additionally, the malware attempts to disable Windows Defender, reducing the effectiveness of built-in endpoint protection. The campaign hides its cryptomining activity by creating mock directories, masking its resource-intensive operations. While the primary goal is financial gain through unauthorized cryptocurrency mining (notably using the XMRig miner), the malware’s ability to persist and move laterally within networks presents a risk of broader compromise or future escalation to more damaging activities. Indicators of compromise include multiple file hashes associated with the malware components. No known CVEs or public exploits are linked to this campaign, and it is currently rated as medium severity due to its impact and ease of spread via USB drives. The campaign’s use of living-off-the-land techniques and worm-like behavior makes it particularly challenging to detect and eradicate.
Potential Impact
For European organizations, the Tangerine Turkey campaign poses several risks. Unauthorized cryptomining can degrade system performance, increase power consumption, and reduce hardware lifespan, leading to increased operational costs. The worm’s USB-based propagation method can facilitate rapid spread across isolated or segmented networks where USB devices are shared, bypassing network perimeter defenses. The malware’s defense evasion and persistence mechanisms complicate detection and removal, potentially allowing long-term unauthorized access. Although currently focused on cryptomining, the ability to move laterally and maintain persistence could enable attackers to pivot to more damaging activities such as data exfiltration or ransomware deployment. Industries with high-value intellectual property or critical infrastructure in Europe could face indirect risks if infected systems are leveraged for further attacks. The campaign’s attempts to disable Windows Defender reduce endpoint security effectiveness, increasing the likelihood of successful infection and persistence. Organizations with lax USB usage policies or insufficient endpoint monitoring are particularly vulnerable. The financial impact, combined with potential operational disruptions and reputational damage, underscores the importance of proactive defenses.
Mitigation Recommendations
1. Implement strict USB device control policies to restrict or monitor the use of removable media, including disabling autorun features and enforcing device whitelisting. 2. Deploy endpoint detection and response (EDR) solutions capable of identifying living-off-the-land techniques and suspicious use of system binaries. 3. Monitor and audit registry changes, especially those related to persistence mechanisms such as services and scheduled tasks, to detect unauthorized modifications. 4. Harden Windows Defender and other endpoint protections by ensuring tamper protection is enabled and regularly updated to prevent malware from disabling security tools. 5. Conduct regular system integrity checks to identify masqueraded binaries and unexpected mock directories that may conceal malicious activity. 6. Educate users on the risks of using unknown USB devices and enforce strict policies on removable media usage. 7. Employ network segmentation to limit lateral movement opportunities if an infection occurs. 8. Maintain up-to-date backups and incident response plans to quickly recover from infections. 9. Use threat intelligence feeds to update detection signatures with known indicators of compromise such as the provided file hashes. 10. Regularly review scheduled tasks and services for unauthorized entries and remove suspicious ones promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: 9de430ab142b87e55e31a628c0225c96
- hash: ceaa7758a1e46f44c980285d86f4f747
- hash: f36e4ebb6471f6b6803f381ca8512022
- hash: 0acee5fcc1722b754a0cb31c031a12f5ace98f91
- hash: a614bda08eb586d8cd457ab8a503ac762c14de1c
- hash: f914b2dcc9e874e1807ff804579c7c02026049b1
- hash: 4617cfd1e66aab547770f049abd937b46c4722ee33bbf97042aab77331aa6525
- hash: 4ffb3c0c7b38105183fb06d1084ab943c6e87f9644f783014684c5cb8db32e32
- hash: 93d74ed188756507c6480717330365cede4884e98aeb43b38d707ed0b98da7cc
From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations
Description
Tangerine Turkey is a cryptomining campaign that propagates via VBScript worms spread through USB drives, leveraging legitimate system binaries for execution and persistence. The malware employs advanced defense evasion techniques such as registry modification and masquerading malicious files as legitimate system components. It establishes persistence through malicious services and scheduled tasks while attempting to disable Windows Defender. Although its primary objective is unauthorized cryptocurrency mining, its capabilities for persistence and lateral movement pose broader security risks. The campaign uses living-off-the-land binaries and creates mock directories to conceal its activities. No known CVEs or exploits are currently associated with this threat. The medium severity rating reflects the financial motivation and potential for system compromise without immediate destructive impact. European organizations using Windows systems with USB access are at risk, especially those with lax endpoint security controls and high-value targets. Mitigation requires targeted controls beyond generic advice, including USB device management, monitoring for living-off-the-land abuse, and registry integrity checks.
AI-Powered Analysis
Technical Analysis
The Tangerine Turkey campaign is a cryptomining operation that utilizes VBScript worms to propagate primarily via USB removable drives. This worm-based propagation method allows the malware to spread autonomously across systems without requiring network exploits. Once executed, the malware leverages living-off-the-land binaries—legitimate Windows system tools—to execute its payload and maintain persistence, complicating detection by traditional antivirus solutions. The campaign employs defense evasion techniques such as modifying registry keys to hide its presence and masquerading malicious binaries as legitimate system files to avoid suspicion. Persistence is achieved through the creation of malicious Windows services and scheduled tasks, ensuring the malware remains active after reboots. Additionally, the malware attempts to disable Windows Defender, reducing the effectiveness of built-in endpoint protection. The campaign hides its cryptomining activity by creating mock directories, masking its resource-intensive operations. While the primary goal is financial gain through unauthorized cryptocurrency mining (notably using the XMRig miner), the malware’s ability to persist and move laterally within networks presents a risk of broader compromise or future escalation to more damaging activities. Indicators of compromise include multiple file hashes associated with the malware components. No known CVEs or public exploits are linked to this campaign, and it is currently rated as medium severity due to its impact and ease of spread via USB drives. The campaign’s use of living-off-the-land techniques and worm-like behavior makes it particularly challenging to detect and eradicate.
Potential Impact
For European organizations, the Tangerine Turkey campaign poses several risks. Unauthorized cryptomining can degrade system performance, increase power consumption, and reduce hardware lifespan, leading to increased operational costs. The worm’s USB-based propagation method can facilitate rapid spread across isolated or segmented networks where USB devices are shared, bypassing network perimeter defenses. The malware’s defense evasion and persistence mechanisms complicate detection and removal, potentially allowing long-term unauthorized access. Although currently focused on cryptomining, the ability to move laterally and maintain persistence could enable attackers to pivot to more damaging activities such as data exfiltration or ransomware deployment. Industries with high-value intellectual property or critical infrastructure in Europe could face indirect risks if infected systems are leveraged for further attacks. The campaign’s attempts to disable Windows Defender reduce endpoint security effectiveness, increasing the likelihood of successful infection and persistence. Organizations with lax USB usage policies or insufficient endpoint monitoring are particularly vulnerable. The financial impact, combined with potential operational disruptions and reputational damage, underscores the importance of proactive defenses.
Mitigation Recommendations
1. Implement strict USB device control policies to restrict or monitor the use of removable media, including disabling autorun features and enforcing device whitelisting. 2. Deploy endpoint detection and response (EDR) solutions capable of identifying living-off-the-land techniques and suspicious use of system binaries. 3. Monitor and audit registry changes, especially those related to persistence mechanisms such as services and scheduled tasks, to detect unauthorized modifications. 4. Harden Windows Defender and other endpoint protections by ensuring tamper protection is enabled and regularly updated to prevent malware from disabling security tools. 5. Conduct regular system integrity checks to identify masqueraded binaries and unexpected mock directories that may conceal malicious activity. 6. Educate users on the risks of using unknown USB devices and enforce strict policies on removable media usage. 7. Employ network segmentation to limit lateral movement opportunities if an infection occurs. 8. Maintain up-to-date backups and incident response plans to quickly recover from infections. 9. Use threat intelligence feeds to update detection signatures with known indicators of compromise such as the provided file hashes. 10. Regularly review scheduled tasks and services for unauthorized entries and remove suspicious ones promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.cybereason.com/blog/tangerine-turkey?hs_amp=true"]
- Adversary
- Tangerine Turkey
- Pulse Id
- 69025ee928e599316086e029
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash9de430ab142b87e55e31a628c0225c96 | — | |
hashceaa7758a1e46f44c980285d86f4f747 | — | |
hashf36e4ebb6471f6b6803f381ca8512022 | — | |
hash0acee5fcc1722b754a0cb31c031a12f5ace98f91 | — | |
hasha614bda08eb586d8cd457ab8a503ac762c14de1c | — | |
hashf914b2dcc9e874e1807ff804579c7c02026049b1 | — | |
hash4617cfd1e66aab547770f049abd937b46c4722ee33bbf97042aab77331aa6525 | — | |
hash4ffb3c0c7b38105183fb06d1084ab943c6e87f9644f783014684c5cb8db32e32 | — | |
hash93d74ed188756507c6480717330365cede4884e98aeb43b38d707ed0b98da7cc | — |
Threat ID: 6902755fea3d051f2241b5de
Added to database: 10/29/2025, 8:13:19 PM
Last enriched: 10/29/2025, 8:18:01 PM
Last updated: 10/30/2025, 3:47:33 PM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Major October 2025 Cyber Attacks Your SOC Can't Ignore
MediumSuspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack
MediumGHOSTGRAB ANDROID MALWARE
MediumAnalysis of Trigona Threat Actor's Latest Attack Cases
MediumAttacker Target VSCode Extension Marketplace, IDE Plugins Face Higher Supply Chain Attack Risks
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.