New Malware Targets Users of Cobra DocGuard Software
A novel and stealthy threat called Infostealer.Speagle has been discovered, hijacking the functionality of Cobra DocGuard, a legitimate security software. This malware collects sensitive information from infected computers and transmits it to a compromised Cobra DocGuard server, masking the data exfiltration as legitimate communications. Speagle specifically targets computers with Cobra DocGuard installed and has shown capabilities to search for documents related to Chinese ballistic missiles. The infection vector remains unknown, but there are indications of a possible supply chain attack. The malware collects system information, file listings, and browser data in multiple phases, using sophisticated techniques to evade detection and self-delete after completing its tasks.
AI Analysis
Technical Summary
Infostealer.Speagle is a sophisticated malware strain discovered by AlienVault that compromises the Cobra DocGuard security software to conduct covert data exfiltration. By hijacking Cobra DocGuard's legitimate functionality, Speagle masks its malicious communications as normal software traffic, making detection challenging. The malware operates in multiple phases: initially collecting system information and enumerating files, then harvesting browser data and searching specifically for documents related to Chinese ballistic missile programs, indicating a targeted espionage motive. The infection vector remains unclear, but evidence points to a possible supply chain compromise of Cobra DocGuard, a legitimate security product, which would allow the malware to infiltrate trusted environments. Speagle uses advanced evasion techniques such as self-deletion after task completion and disguising network traffic to evade endpoint detection and network monitoring. The malware communicates with compromised Cobra DocGuard servers hosted at IPs 60.30.147.18 and 222.222.254.165 over HTTP on non-standard ports, further blending in with legitimate traffic. The threat actor attributed to this campaign is Runningcrab, known for targeted espionage operations. Despite the lack of a CVE or public exploit, the malware's use of legitimate software channels and focus on sensitive military-related documents makes it a significant threat to organizations using Cobra DocGuard, especially those involved in defense or related sectors. The malware incorporates multiple MITRE ATT&CK techniques including data from local system discovery, credential access, data staging, and command and control communications, highlighting its complexity and stealth.
Potential Impact
The primary impact of Infostealer.Speagle is the covert theft of sensitive information from targeted systems running Cobra DocGuard. Organizations in defense, government, and critical infrastructure sectors using this software risk exposure of confidential data, including documents related to Chinese ballistic missile programs, which could lead to significant intelligence compromise. The malware’s ability to mask exfiltration as legitimate software traffic complicates detection and response, increasing dwell time and potential data loss. The suspected supply chain attack vector undermines trust in a security product, potentially affecting all users of Cobra DocGuard globally. While the infection scope is limited to Cobra DocGuard users, the targeted nature and espionage focus elevate the risk for affected entities. The self-deleting behavior reduces forensic evidence, hindering incident investigation and attribution. The medium severity rating reflects a balance between targeted impact and limited widespread exploitation, but the strategic nature of stolen data could have geopolitical consequences. Organizations may face operational disruption, reputational damage, and regulatory consequences if sensitive data is leaked or misused.
Mitigation Recommendations
Organizations should immediately audit their use of Cobra DocGuard software and verify the integrity of installed versions against trusted sources. Implement strict supply chain security measures including code signing verification and vendor communication to detect compromised updates. Network monitoring should be enhanced to detect anomalous HTTP traffic to known malicious IPs and URLs associated with Speagle, especially on non-standard ports. Endpoint detection and response (EDR) tools should be tuned to identify behaviors consistent with multi-phase data collection, file enumeration, and self-deletion. Employ threat hunting focused on the provided file hashes and IP indicators to identify potential infections. Restrict unnecessary outbound HTTP traffic and apply application whitelisting to prevent unauthorized execution of malware components. Regularly back up critical data and maintain incident response plans tailored to supply chain and stealthy malware scenarios. Engage with Cobra DocGuard vendor for patches or advisories and consider alternative security solutions if supply chain compromise is confirmed. User awareness training should emphasize risks of supply chain attacks and encourage reporting of unusual system behavior. Finally, collaborate with threat intelligence providers to stay updated on Runningcrab activities and emerging indicators.
Affected Countries
China, United States, Taiwan, South Korea, Japan, India, Russia, United Kingdom, Germany, France
Indicators of Compromise
- hash: 03298f85eaf8880222cf8a83b8ed75d90712c34a8a5299a60f47927ad044b43b
- hash: d7f167cbf1676c14fd487219447e30fadf26885eb25ec4cafdeabe333bddf877
- hash: dcd3f06093bf34d81837d837c5a5935beb859ba6258e5a80c3a5f95638a13d4d
- hash: fad8d0307db5328c8b9f283a2cc6f7e4f4333001623fef5bd5c32a1c094bf890
- ip: 60.30.147.18
- url: http://222.222.254.165:8090/CDGServer3/CDGClientDiagnostics?flag=syn_user_policy
- url: http://60.30.147.18:8091/CDGServer3/CDGClientDiagnostics?flag=syn_user_policy
New Malware Targets Users of Cobra DocGuard Software
Description
A novel and stealthy threat called Infostealer.Speagle has been discovered, hijacking the functionality of Cobra DocGuard, a legitimate security software. This malware collects sensitive information from infected computers and transmits it to a compromised Cobra DocGuard server, masking the data exfiltration as legitimate communications. Speagle specifically targets computers with Cobra DocGuard installed and has shown capabilities to search for documents related to Chinese ballistic missiles. The infection vector remains unknown, but there are indications of a possible supply chain attack. The malware collects system information, file listings, and browser data in multiple phases, using sophisticated techniques to evade detection and self-delete after completing its tasks.
AI-Powered Analysis
Technical Analysis
Infostealer.Speagle is a sophisticated malware strain discovered by AlienVault that compromises the Cobra DocGuard security software to conduct covert data exfiltration. By hijacking Cobra DocGuard's legitimate functionality, Speagle masks its malicious communications as normal software traffic, making detection challenging. The malware operates in multiple phases: initially collecting system information and enumerating files, then harvesting browser data and searching specifically for documents related to Chinese ballistic missile programs, indicating a targeted espionage motive. The infection vector remains unclear, but evidence points to a possible supply chain compromise of Cobra DocGuard, a legitimate security product, which would allow the malware to infiltrate trusted environments. Speagle uses advanced evasion techniques such as self-deletion after task completion and disguising network traffic to evade endpoint detection and network monitoring. The malware communicates with compromised Cobra DocGuard servers hosted at IPs 60.30.147.18 and 222.222.254.165 over HTTP on non-standard ports, further blending in with legitimate traffic. The threat actor attributed to this campaign is Runningcrab, known for targeted espionage operations. Despite the lack of a CVE or public exploit, the malware's use of legitimate software channels and focus on sensitive military-related documents makes it a significant threat to organizations using Cobra DocGuard, especially those involved in defense or related sectors. The malware incorporates multiple MITRE ATT&CK techniques including data from local system discovery, credential access, data staging, and command and control communications, highlighting its complexity and stealth.
Potential Impact
The primary impact of Infostealer.Speagle is the covert theft of sensitive information from targeted systems running Cobra DocGuard. Organizations in defense, government, and critical infrastructure sectors using this software risk exposure of confidential data, including documents related to Chinese ballistic missile programs, which could lead to significant intelligence compromise. The malware’s ability to mask exfiltration as legitimate software traffic complicates detection and response, increasing dwell time and potential data loss. The suspected supply chain attack vector undermines trust in a security product, potentially affecting all users of Cobra DocGuard globally. While the infection scope is limited to Cobra DocGuard users, the targeted nature and espionage focus elevate the risk for affected entities. The self-deleting behavior reduces forensic evidence, hindering incident investigation and attribution. The medium severity rating reflects a balance between targeted impact and limited widespread exploitation, but the strategic nature of stolen data could have geopolitical consequences. Organizations may face operational disruption, reputational damage, and regulatory consequences if sensitive data is leaked or misused.
Mitigation Recommendations
Organizations should immediately audit their use of Cobra DocGuard software and verify the integrity of installed versions against trusted sources. Implement strict supply chain security measures including code signing verification and vendor communication to detect compromised updates. Network monitoring should be enhanced to detect anomalous HTTP traffic to known malicious IPs and URLs associated with Speagle, especially on non-standard ports. Endpoint detection and response (EDR) tools should be tuned to identify behaviors consistent with multi-phase data collection, file enumeration, and self-deletion. Employ threat hunting focused on the provided file hashes and IP indicators to identify potential infections. Restrict unnecessary outbound HTTP traffic and apply application whitelisting to prevent unauthorized execution of malware components. Regularly back up critical data and maintain incident response plans tailored to supply chain and stealthy malware scenarios. Engage with Cobra DocGuard vendor for patches or advisories and consider alternative security solutions if supply chain compromise is confirmed. User awareness training should emphasize risks of supply chain attacks and encourage reporting of unusual system behavior. Finally, collaborate with threat intelligence providers to stay updated on Runningcrab activities and emerging indicators.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.security.com/blog-post/speagle-cobradocguard-infostealer"]
- Adversary
- Runningcrab
- Pulse Id
- 69bbd7618524d177761d1941
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash03298f85eaf8880222cf8a83b8ed75d90712c34a8a5299a60f47927ad044b43b | — | |
hashd7f167cbf1676c14fd487219447e30fadf26885eb25ec4cafdeabe333bddf877 | — | |
hashdcd3f06093bf34d81837d837c5a5935beb859ba6258e5a80c3a5f95638a13d4d | — | |
hashfad8d0307db5328c8b9f283a2cc6f7e4f4333001623fef5bd5c32a1c094bf890 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip60.30.147.18 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://222.222.254.165:8090/CDGServer3/CDGClientDiagnostics?flag=syn_user_policy | — | |
urlhttp://60.30.147.18:8091/CDGServer3/CDGClientDiagnostics?flag=syn_user_policy | — |
Threat ID: 69bbfc73e32a4fbe5fc45100
Added to database: 3/19/2026, 1:38:59 PM
Last enriched: 3/19/2026, 1:53:58 PM
Last updated: 3/20/2026, 5:12:26 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.