Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New Malware Targets Users of Cobra DocGuard Software

0
Medium
Published: Thu Mar 19 2026 (03/19/2026, 11:00:49 UTC)
Source: AlienVault OTX General

Description

A novel and stealthy threat called Infostealer.Speagle has been discovered, hijacking the functionality of Cobra DocGuard, a legitimate security software. This malware collects sensitive information from infected computers and transmits it to a compromised Cobra DocGuard server, masking the data exfiltration as legitimate communications. Speagle specifically targets computers with Cobra DocGuard installed and has shown capabilities to search for documents related to Chinese ballistic missiles. The infection vector remains unknown, but there are indications of a possible supply chain attack. The malware collects system information, file listings, and browser data in multiple phases, using sophisticated techniques to evade detection and self-delete after completing its tasks.

AI-Powered Analysis

AILast updated: 03/19/2026, 13:53:58 UTC

Technical Analysis

Infostealer.Speagle is a sophisticated malware strain discovered by AlienVault that compromises the Cobra DocGuard security software to conduct covert data exfiltration. By hijacking Cobra DocGuard's legitimate functionality, Speagle masks its malicious communications as normal software traffic, making detection challenging. The malware operates in multiple phases: initially collecting system information and enumerating files, then harvesting browser data and searching specifically for documents related to Chinese ballistic missile programs, indicating a targeted espionage motive. The infection vector remains unclear, but evidence points to a possible supply chain compromise of Cobra DocGuard, a legitimate security product, which would allow the malware to infiltrate trusted environments. Speagle uses advanced evasion techniques such as self-deletion after task completion and disguising network traffic to evade endpoint detection and network monitoring. The malware communicates with compromised Cobra DocGuard servers hosted at IPs 60.30.147.18 and 222.222.254.165 over HTTP on non-standard ports, further blending in with legitimate traffic. The threat actor attributed to this campaign is Runningcrab, known for targeted espionage operations. Despite the lack of a CVE or public exploit, the malware's use of legitimate software channels and focus on sensitive military-related documents makes it a significant threat to organizations using Cobra DocGuard, especially those involved in defense or related sectors. The malware incorporates multiple MITRE ATT&CK techniques including data from local system discovery, credential access, data staging, and command and control communications, highlighting its complexity and stealth.

Potential Impact

The primary impact of Infostealer.Speagle is the covert theft of sensitive information from targeted systems running Cobra DocGuard. Organizations in defense, government, and critical infrastructure sectors using this software risk exposure of confidential data, including documents related to Chinese ballistic missile programs, which could lead to significant intelligence compromise. The malware’s ability to mask exfiltration as legitimate software traffic complicates detection and response, increasing dwell time and potential data loss. The suspected supply chain attack vector undermines trust in a security product, potentially affecting all users of Cobra DocGuard globally. While the infection scope is limited to Cobra DocGuard users, the targeted nature and espionage focus elevate the risk for affected entities. The self-deleting behavior reduces forensic evidence, hindering incident investigation and attribution. The medium severity rating reflects a balance between targeted impact and limited widespread exploitation, but the strategic nature of stolen data could have geopolitical consequences. Organizations may face operational disruption, reputational damage, and regulatory consequences if sensitive data is leaked or misused.

Mitigation Recommendations

Organizations should immediately audit their use of Cobra DocGuard software and verify the integrity of installed versions against trusted sources. Implement strict supply chain security measures including code signing verification and vendor communication to detect compromised updates. Network monitoring should be enhanced to detect anomalous HTTP traffic to known malicious IPs and URLs associated with Speagle, especially on non-standard ports. Endpoint detection and response (EDR) tools should be tuned to identify behaviors consistent with multi-phase data collection, file enumeration, and self-deletion. Employ threat hunting focused on the provided file hashes and IP indicators to identify potential infections. Restrict unnecessary outbound HTTP traffic and apply application whitelisting to prevent unauthorized execution of malware components. Regularly back up critical data and maintain incident response plans tailored to supply chain and stealthy malware scenarios. Engage with Cobra DocGuard vendor for patches or advisories and consider alternative security solutions if supply chain compromise is confirmed. User awareness training should emphasize risks of supply chain attacks and encourage reporting of unusual system behavior. Finally, collaborate with threat intelligence providers to stay updated on Runningcrab activities and emerging indicators.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.security.com/blog-post/speagle-cobradocguard-infostealer"]
Adversary
Runningcrab
Pulse Id
69bbd7618524d177761d1941
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash03298f85eaf8880222cf8a83b8ed75d90712c34a8a5299a60f47927ad044b43b
hashd7f167cbf1676c14fd487219447e30fadf26885eb25ec4cafdeabe333bddf877
hashdcd3f06093bf34d81837d837c5a5935beb859ba6258e5a80c3a5f95638a13d4d
hashfad8d0307db5328c8b9f283a2cc6f7e4f4333001623fef5bd5c32a1c094bf890

Ip

ValueDescriptionCopy
ip60.30.147.18

Url

ValueDescriptionCopy
urlhttp://222.222.254.165:8090/CDGServer3/CDGClientDiagnostics?flag=syn_user_policy
urlhttp://60.30.147.18:8091/CDGServer3/CDGClientDiagnostics?flag=syn_user_policy

Threat ID: 69bbfc73e32a4fbe5fc45100

Added to database: 3/19/2026, 1:38:59 PM

Last enriched: 3/19/2026, 1:53:58 PM

Last updated: 3/20/2026, 5:12:26 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses