Skip to main content

Is Hagga Threat Actor (ab)using FSociety framework ?

Medium
Published: Mon Nov 21 2022 (11/21/2022, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: white

Description

Is Hagga Threat Actor (ab)using FSociety framework ?

AI-Powered Analysis

AILast updated: 07/05/2025, 22:55:28 UTC

Technical Analysis

The provided information concerns a potential security threat involving the Hagga threat actor possibly abusing the FSociety framework. FSociety is known as an open-source penetration testing and red teaming framework that can be used for various offensive security operations, including payload delivery. The mention of Hagga, a threat actor, suggests that this group might be leveraging FSociety tools or components to facilitate their malicious activities. However, the details are sparse, with no specific vulnerabilities, exploits, or attack vectors described. The source is an OSINT feed with a medium severity rating and a 50% certainty level, indicating that this is an intelligence observation rather than a confirmed or fully analyzed threat. No affected product versions, patches, or known exploits in the wild are reported. The threat is categorized under OSINT and payload delivery, implying that the concern is about the potential use of FSociety by Hagga to deliver malicious payloads, possibly malware or ransomware. The lack of technical details, indicators of compromise, or specific attack methodologies limits the ability to fully characterize the threat. Nonetheless, the possibility of a threat actor abusing a legitimate offensive security framework to conduct attacks is notable, as it can complicate detection and attribution efforts.

Potential Impact

For European organizations, the potential impact of this threat depends largely on the extent to which the Hagga threat actor is active in the region and the prevalence of FSociety framework abuse. If Hagga successfully uses FSociety to deliver payloads, it could lead to unauthorized access, data exfiltration, ransomware infections, or disruption of services. Given that FSociety is a known penetration testing tool, its abuse might enable sophisticated attacks that evade traditional security controls by mimicking legitimate red team activities. This could increase the risk of targeted attacks against critical infrastructure, financial institutions, or government entities within Europe. The medium severity and uncertain nature of the threat suggest that while the immediate risk might not be high, organizations should remain vigilant, especially those with high-value assets or those in sectors frequently targeted by advanced persistent threats (APTs).

Mitigation Recommendations

To mitigate this potential threat, European organizations should implement enhanced monitoring for unusual use of penetration testing frameworks like FSociety within their networks, especially if such tools are not authorized. Endpoint detection and response (EDR) solutions should be tuned to detect anomalous behaviors consistent with payload delivery and exploitation attempts. Network segmentation and strict access controls can limit the lateral movement of attackers using such frameworks. Organizations should also enforce strict application whitelisting and regularly audit installed software to detect unauthorized tools. Threat intelligence sharing within industry sectors and with national cybersecurity centers can help identify emerging abuse patterns related to FSociety and Hagga. Finally, user training to recognize phishing or social engineering attempts that might be used to initiate payload delivery is essential.

Need more detailed analysis?Get Pro

Technical Details

Uuid
f07207d5-e6f7-4369-9a9d-a1390b83aaeb
Original Timestamp
1683878227

Indicators of Compromise

Ip

ValueDescriptionCopy
ip4.204.233.44
ip69.174.99.181
ip103.151.123.121
ip103.151.123.121

Hash

ValueDescriptionCopy
hash9ea4eebd9cf2a5d4e6343cb559d8c996fae6bf0f3bd7ffada0567053c08acc31
hashab5b1989ddf6113fcb50d06234dbef65d871e41ce8d76d5fb5cc72055c1b28ba
hash20a53f17071f377d50ad9de30fdddd320d54d00b597bf96565a2b41c15649f76
hash5d910ee5697116faa3f4efe230a9d06f6e3f80a7ad2cf8e122546b10e34a0088

File

ValueDescriptionCopy
fileupdate.js
fileDll.ppam
fileRump.xls
fileRump.xls.inverted.charsReplaced.decoded

X509 fingerprint-sha1

ValueDescriptionCopy
x509-fingerprint-sha1970f993ad1a289620b5f5033ff5e0b5c4491bb2b
x509-fingerprint-sha1b0238c547a905bfa119c4e8baccaeacf36491ff6

Text

ValueDescriptionCopy
textservidor
text136234453590953102797263558291395548452
textlocalhost
text13098529066745705731
text/Rump/Rump.xls
text4.204.233.44
text/Dll/Dll.ppam
text4.204.233.44
textIs Hagga Threat Actor (ab)using FSociety framework ? apt cybersecurity malwareNovember 21, 2022 Introduction Today I’d like to share a quick analysis initiated during a threat hunting process. The first observable was found during hunting process over OSINT sources, the entire infrastructure was still up and running during the analyses as well as malicious payload were downloadable.
textBlog

Boolean

ValueDescriptionCopy
boolean0
boolean0

Port

ValueDescriptionCopy
port8895

Url

ValueDescriptionCopy
urlhttp://4.204.233.44/Rump/Rump.xls
urlhttp://4.204.233.44/Dll/Dll.ppam

Domain

ValueDescriptionCopy
domain4.204.233.44
domain4.204.233.44
domain4.204.233.44
domain4.204.233.44

Link

ValueDescriptionCopy
linkhttps://marcoramilli.com/2022/11/21/is-hagga-threat-actor-abusing-fsociety-framework/

Threat ID: 68359ca05d5f0974d01fc7fb

Added to database: 5/27/2025, 11:06:08 AM

Last enriched: 7/5/2025, 10:55:28 PM

Last updated: 8/14/2025, 12:52:51 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats