Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite

0
Medium
Published: Thu Dec 11 2025 (12/11/2025, 12:06:23 UTC)
Source: AlienVault OTX General

Description

Ashen Lepus, a Hamas-affiliated threat group, has developed a new malware suite named AshTag targeting governmental and diplomatic entities primarily in the Middle East, with recent expansion to Oman and Morocco. The malware employs a sophisticated multi-stage infection chain using decoy PDFs and RAR archives to deliver payloads. AshTag features enhanced custom payload encryption, infrastructure obfuscation, and in-memory execution to evade detection. The group updated its command and control (C2) infrastructure to blend with legitimate traffic, complicating network defense efforts. This espionage campaign focuses on intelligence gathering from diplomatic and governmental targets. Although no known exploits are reported in the wild, the malware leverages multiple advanced techniques including process injection, persistence mechanisms, and credential harvesting. The threat poses a medium severity risk due to its targeted nature, complexity, and potential impact on confidentiality and integrity of sensitive information. European organizations with diplomatic ties or interests in the Middle East should be vigilant, especially in countries with strategic geopolitical connections to the region. Mitigation requires tailored detection of multi-stage infection vectors, enhanced network traffic analysis for C2 anomalies, and strict email attachment policies. Countries like France, Germany, and the UK are more likely to be affected due to their diplomatic presence and intelligence interests in the Middle East.

AI-Powered Analysis

AILast updated: 12/11/2025, 15:38:56 UTC

Technical Analysis

Ashen Lepus is a Hamas-affiliated espionage group that has developed a new malware suite called AshTag to target governmental and diplomatic entities primarily in the Middle East, with recent targeting expansion to Oman and Morocco. The AshTag suite employs a multi-stage infection chain beginning with decoy PDFs and RAR archives to deliver its payloads, which are protected by enhanced custom encryption to evade signature-based detection. The malware executes primarily in-memory, reducing forensic footprints and complicating detection. AshTag's command and control (C2) infrastructure has been updated to obfuscate traffic and blend with legitimate network communications, making network-based detection challenging. The malware incorporates multiple advanced techniques including process injection (T1055), credential harvesting (T1003), persistence via registry run keys or services (T1547.001), and use of obfuscated files or information (T1027). The infection chain leverages social engineering (T1204.002) through malicious email attachments. The campaign reflects a strategic espionage effort aimed at extracting sensitive diplomatic and governmental intelligence. Although no public exploits are reported, the sophistication of AshTag and its evasion techniques indicate a medium severity threat. The group’s expansion beyond traditional Middle Eastern targets to Oman and Morocco suggests evolving operational scope. The malware’s focus on in-memory execution and encrypted payloads requires defenders to employ advanced endpoint detection and response (EDR) capabilities and network anomaly detection. The threat is persistent and tailored, emphasizing confidentiality and integrity impacts over availability. The campaign aligns with geopolitical tensions involving Hamas and regional diplomatic interests.

Potential Impact

The AshTag malware suite poses a significant espionage threat to European organizations with diplomatic, governmental, or intelligence interests in the Middle East. Successful compromise could lead to unauthorized disclosure of sensitive diplomatic communications, strategic plans, and governmental data, undermining national security and foreign policy initiatives. The malware’s in-memory execution and encrypted payloads complicate detection, increasing the risk of prolonged undetected presence and data exfiltration. European diplomatic missions, intelligence agencies, and contractors operating in or with Middle Eastern countries could be targeted, potentially affecting confidentiality and integrity of critical information. The obfuscation of C2 traffic may also impact network monitoring capabilities, requiring enhanced detection strategies. Although availability impact is limited, the loss of sensitive information could have severe geopolitical and operational consequences. The expansion of targeting to countries like Morocco indicates a broader regional threat that could indirectly affect European interests through diplomatic channels. Overall, the campaign threatens the confidentiality and integrity of sensitive data, with medium severity given the targeted nature and complexity of the malware.

Mitigation Recommendations

1. Implement advanced endpoint detection and response (EDR) solutions capable of detecting in-memory execution and process injection techniques used by AshTag. 2. Deploy network traffic analysis tools with capabilities to identify anomalous C2 communications that blend with legitimate traffic, focusing on behavioral indicators rather than signatures. 3. Enforce strict email security policies including sandboxing and attachment scanning to detect and block decoy PDFs and RAR archives used in the infection chain. 4. Conduct regular threat hunting exercises focusing on indicators of compromise related to AshTag’s tactics, techniques, and procedures (TTPs), including persistence mechanisms and credential harvesting. 5. Harden user awareness training to recognize social engineering attempts, particularly spear-phishing campaigns delivering malicious attachments. 6. Apply least privilege principles and restrict execution of unauthorized scripts or binaries to limit malware execution paths. 7. Maintain up-to-date threat intelligence feeds to monitor Ashen Lepus activity and adapt defenses accordingly. 8. Segment networks to limit lateral movement and isolate sensitive diplomatic systems from general user environments. 9. Utilize multi-factor authentication (MFA) to reduce the risk of credential compromise. 10. Collaborate with national cybersecurity centers and diplomatic security teams to share intelligence and coordinate response efforts.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag"]
Adversary
Ashen Lepus
Pulse Id
693ab3bfc97a8cfb06853a5d
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash78d28442a81b88ca667943ba59c20638
hash9fd8e84ac17b7ec89d12fc35ec97bee7
hashb2a446b347e9f0ed28b8566e60f79590
hash2f24b698e3c47713263a97b3698f5c5f99927fd3
hash456e471ae21a135c0f4ddbf78bb6f6c500936c02
hashdfdef9558a52fadceea654405b45db8e75c43a38
hash1f3bd755de24e00af2dba61f938637d1cc0fbfd6166dba014e665033ad4445c0
hash2d71d7e6ffecab8eefa2d6a885bcefe639fca988bdcac99e9b057e61698a1fd6
hash30490ba95c42cefcca1d0328ea740e61c26eaf606a98f68d26c4a519ce918c99
hash3502c9e4896802f069ef9dcdba2a7476e1208ece3cd5ced9f1c4fd32d4d0d768
hash3d445c25752f86c65e03d4ebed6d563d48a22e424ba855001ad2db2290bf564c
hash4e1f7b48249dd5bf3a857d5d017f0b88c0372749fa156f5456056767c5548345
hash66ab29d2d62548faeaeadaad9dd62818163175872703fda328bb1b4894f5e69e
hash6bd3d05aef89cd03d6b49b20716775fe92f0cf8a3c2747094404ef98f96e9376
hash739a5199add1d970ba22d69cc10b4c3a13b72136be6d45212429e8f0969af3dc
hash7e5769cd8128033fc933fbf3346fe2eb9c8e9fc6aa683546e9573e7aa01a8b6b
hash8870bd358d605a5685a5f9f7785b5fee5aebdcb20e4e62153623f764d7366a3c
hash8c44fa9bf68341c61ccaca0a3723945543e2a04d9db712ae50861e3fa6d9cc98
hasha17858f40ff506d59b5ee1ba2579da1685345206f2c7d78cb2c9c578a0c4402b
hashb00491dc178a3d4f320951bccb17eb85bfef23e718b4b94eb597c90b5b6e0ba2
hashe71a292eafe0ca202f646af7027c17faaa969177818caf08569bd77838e93064
hashebe3b6977f66be30a22c2aff9b50fec8529dfa46415ea489bd7961552868f6b5
hashf380bd95156fbfb93537f35941278778819df1629cb4c5a4e09fe17f6293b7b7
hashf554c43707f5d87625a3834116a2d22f551b1d9a5aff1e446d24893975c431bc
hashf9816bc81de2e8639482c877a8defcaed9b15ffdce12beaef1cff3fea95999d4

Domain

ValueDescriptionCopy
domainaccount.techupinfo.com
domainapi.healthylifefeed.com
domainapi.medicinefinders.com
domainapi.softmatictech.com
domainapi.systemsync.info
domainapi.technology-system.com
domainapi.widetechno.info
domainapiv2.onlinefieldtech.com
domainauth.onlinefieldtech.com
domainforum.technoforts.com
domainforum.techtg.com
domainstatus.techupinfo.com

Threat ID: 693ae20b7d4c6f31f7b56950

Added to database: 12/11/2025, 3:23:55 PM

Last enriched: 12/11/2025, 3:38:56 PM

Last updated: 12/11/2025, 9:55:24 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats