Harvester: APT Group Expands Toolset With New GoGra Linux Backdoor
The Harvester APT group has developed a new Linux variant of its GoGra backdoor malware. This backdoor uses legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel, polling a mailbox folder every two seconds using hardcoded Azure AD credentials. It employs social engineering with tailored decoy documents to disguise malicious ELF files as normal documents. Initial detections originated from India and Afghanistan, indicating these regions as primary targets. The Linux version shares nearly identical code with a previously known Windows variant, showing the group's multi-platform capabilities and focus on South Asian espionage. No official patch or remediation guidance is currently available. There are no known exploits in the wild reported at this time.
AI Analysis
Technical Summary
Harvester, an APT group, has expanded its toolset with a new Linux version of the GoGra backdoor. This malware leverages the Microsoft Graph API and Outlook mailboxes for covert command-and-control communication, using hardcoded Azure AD credentials to poll a mailbox folder at two-second intervals. Commands are received via encrypted emails, and results are exfiltrated through reply messages. The malware uses social engineering lures with decoy documents to mask malicious ELF files. The Linux variant's code closely matches a previously known Windows version, including identical spelling errors, indicating a shared development lineage. Initial VirusTotal submissions came from India and Afghanistan, suggesting these as primary target regions. There is no indication of known exploits in the wild or official patches.
Potential Impact
This malware enables persistent covert command-and-control communication on infected Linux systems via legitimate Microsoft cloud services, potentially allowing the attacker to execute arbitrary commands and exfiltrate data stealthily. The use of hardcoded Azure AD credentials and polling of mailbox folders every two seconds facilitates continuous control and data theft. The social engineering aspect increases the likelihood of initial infection. The targeting of South Asian regions indicates a focused espionage campaign. No known exploits in the wild have been reported yet.
Mitigation Recommendations
No official patch or remediation guidance is currently available for this threat. Organizations should monitor for indicators of compromise such as the provided file hashes and unusual use of Microsoft Graph API or mailbox polling behaviors. Since this malware uses hardcoded credentials and mailbox polling, restricting and monitoring Azure AD credentials and mailbox access may help detect or limit impact. Follow vendor advisories and threat intelligence updates for any future remediation or detection tools. No cloud service patching applies as this is not a cloud-hosted service.
Indicators of Compromise
- hash: b14ca5898a4e4133bbce2ea2315a1916
- hash: 8f1af2175403195726957dc58fe64821
- hash: c78c6f9b78e9503ab1a079010cf12a6182ec4d43
- hash: 2d0177a00bed31f72b48965bee34cec04cb5be8eeea66ae0bb144f77e4d439b1
- hash: 57cd5721bae65c29e58121b5a9b00487a83b6c37dded56052cab2a67f90ea943
- hash: 74ac41406ce7a7aa992f68b4b3042f980027526f33ec6c8d84cb26f20495c9dc
- hash: 9c23c65a8a392a3fd885496a5ff2004252f1ad4388814b20e5459695280b0b82
- hash: d8d84eaba9b902045ae4fe044e9761ad0ce9051b85feea3f1cf9c80b59b2b123
- hash: 1e8a11249ac38ca948a10308cc333a47
- hash: 7bf2191620c2cca5f8238834149ba470
- hash: abfe90bd06b0781a075ed23757822816
- hash: d69cc848443b63eb0ae8d05a6ecfba5e
- hash: 4d9ae84166f2083a1ee7f3e7a0b3581e4b41bc4b
- hash: 7f58210fa9fb9a154a8c9b4d595f10c3ef7f79ec
- hash: a225c68ddfaa81bc3f13bbfc65a85b4e047e8aa5
- hash: afce743ccdd089a4132aad647ed47ba13b3f83b0
Harvester: APT Group Expands Toolset With New GoGra Linux Backdoor
Description
The Harvester APT group has developed a new Linux variant of its GoGra backdoor malware. This backdoor uses legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel, polling a mailbox folder every two seconds using hardcoded Azure AD credentials. It employs social engineering with tailored decoy documents to disguise malicious ELF files as normal documents. Initial detections originated from India and Afghanistan, indicating these regions as primary targets. The Linux version shares nearly identical code with a previously known Windows variant, showing the group's multi-platform capabilities and focus on South Asian espionage. No official patch or remediation guidance is currently available. There are no known exploits in the wild reported at this time.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Harvester, an APT group, has expanded its toolset with a new Linux version of the GoGra backdoor. This malware leverages the Microsoft Graph API and Outlook mailboxes for covert command-and-control communication, using hardcoded Azure AD credentials to poll a mailbox folder at two-second intervals. Commands are received via encrypted emails, and results are exfiltrated through reply messages. The malware uses social engineering lures with decoy documents to mask malicious ELF files. The Linux variant's code closely matches a previously known Windows version, including identical spelling errors, indicating a shared development lineage. Initial VirusTotal submissions came from India and Afghanistan, suggesting these as primary target regions. There is no indication of known exploits in the wild or official patches.
Potential Impact
This malware enables persistent covert command-and-control communication on infected Linux systems via legitimate Microsoft cloud services, potentially allowing the attacker to execute arbitrary commands and exfiltrate data stealthily. The use of hardcoded Azure AD credentials and polling of mailbox folders every two seconds facilitates continuous control and data theft. The social engineering aspect increases the likelihood of initial infection. The targeting of South Asian regions indicates a focused espionage campaign. No known exploits in the wild have been reported yet.
Mitigation Recommendations
No official patch or remediation guidance is currently available for this threat. Organizations should monitor for indicators of compromise such as the provided file hashes and unusual use of Microsoft Graph API or mailbox polling behaviors. Since this malware uses hardcoded credentials and mailbox polling, restricting and monitoring Azure AD credentials and mailbox access may help detect or limit impact. Follow vendor advisories and threat intelligence updates for any future remediation or detection tools. No cloud service patching applies as this is not a cloud-hosted service.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.security.com/threat-intelligence/harvester-new-linux-backdoor-gogra"]
- Adversary
- Harvester
- Pulse Id
- 69f4e882199e1fa40cbece45
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashb14ca5898a4e4133bbce2ea2315a1916 | — | |
hash8f1af2175403195726957dc58fe64821 | — | |
hashc78c6f9b78e9503ab1a079010cf12a6182ec4d43 | — | |
hash2d0177a00bed31f72b48965bee34cec04cb5be8eeea66ae0bb144f77e4d439b1 | — | |
hash57cd5721bae65c29e58121b5a9b00487a83b6c37dded56052cab2a67f90ea943 | — | |
hash74ac41406ce7a7aa992f68b4b3042f980027526f33ec6c8d84cb26f20495c9dc | — | |
hash9c23c65a8a392a3fd885496a5ff2004252f1ad4388814b20e5459695280b0b82 | — | |
hashd8d84eaba9b902045ae4fe044e9761ad0ce9051b85feea3f1cf9c80b59b2b123 | — | |
hash1e8a11249ac38ca948a10308cc333a47 | — | |
hash7bf2191620c2cca5f8238834149ba470 | — | |
hashabfe90bd06b0781a075ed23757822816 | — | |
hashd69cc848443b63eb0ae8d05a6ecfba5e | — | |
hash4d9ae84166f2083a1ee7f3e7a0b3581e4b41bc4b | — | |
hash7f58210fa9fb9a154a8c9b4d595f10c3ef7f79ec | — | |
hasha225c68ddfaa81bc3f13bbfc65a85b4e047e8aa5 | — | |
hashafce743ccdd089a4132aad647ed47ba13b3f83b0 | — |
Threat ID: 69f8af02cbff5d86102ac3c9
Added to database: 5/4/2026, 2:36:50 PM
Last enriched: 5/4/2026, 2:51:23 PM
Last updated: 5/4/2026, 5:03:18 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.