Skip to main content

NordDragonScan: Quiet Data-Harvester on Windows

Medium
Published: Mon Jul 14 2025 (07/14/2025, 13:44:54 UTC)
Source: AlienVault OTX General

Description

A sophisticated infostealer dubbed NordDragonScan has been discovered, targeting Windows systems through weaponized HTA scripts. The malware is distributed via shortened links leading to RAR archives containing malicious LNK shortcuts. Once installed, NordDragonScan performs extensive reconnaissance, collecting system information, network details, browser data, and sensitive documents. It utilizes custom obfuscation techniques and establishes persistence through registry modifications. The stolen data is exfiltrated to a command-and-control server using TLS encryption. The attack employs various decoy documents to evade detection and maximize infection opportunities. NordDragonScan's capabilities include screenshot capture, Chrome and Firefox profile harvesting, and local network scanning.

AI-Powered Analysis

AILast updated: 07/14/2025, 14:16:27 UTC

Technical Analysis

NordDragonScan is a sophisticated information-stealing malware targeting Windows operating systems. It is distributed primarily through weaponized HTA (HTML Application) scripts, which are delivered via shortened URLs that lead victims to RAR archives containing malicious LNK shortcut files. When executed, these shortcuts trigger the malware installation. NordDragonScan performs extensive reconnaissance on infected systems, harvesting a wide range of sensitive data including system configuration details, network information, browser data (notably from Chrome and Firefox profiles), and sensitive documents stored locally. The malware also captures screenshots and conducts local network scanning to identify additional targets or valuable information within the victim's environment. To evade detection, NordDragonScan employs custom obfuscation techniques and uses decoy documents to distract users and security tools. Persistence is achieved through registry modifications, allowing the malware to maintain foothold across system reboots. Data exfiltration is conducted securely over TLS-encrypted channels to a command-and-control server, complicating network detection efforts. The malware leverages multiple MITRE ATT&CK techniques such as T1113 (screen capture), T1033 (system owner/user discovery), T1132.001 (data encoding), T1056.001 (input capture), T1074.001 (data staged), T1114.001 (email collection), T1204.002 (user execution via malicious link), T1082 (system information discovery), T1005 (data from local system), T1016 (system network configuration discovery), T1083 (file and directory discovery), T1059.001 (command and scripting interpreter), T1547.001 (registry run keys), and T1071.001 (application layer protocol for command and control). Although no known exploits in the wild have been reported, the malware's stealthy and multi-faceted capabilities make it a significant threat to Windows environments, especially those with users prone to opening suspicious links or files.

Potential Impact

For European organizations, NordDragonScan poses a substantial risk to confidentiality and operational security. The malware's ability to harvest browser profiles can lead to credential theft, enabling further lateral movement or unauthorized access to corporate resources. The capture of sensitive documents and system/network information can facilitate espionage, intellectual property theft, or preparation for more destructive attacks. The local network scanning capability increases the risk of broader compromise within enterprise networks. The use of encrypted exfiltration channels challenges traditional network monitoring and detection tools, potentially allowing prolonged undetected data leakage. Given Europe's stringent data protection regulations such as GDPR, any data breach involving personal or sensitive information could result in severe legal and financial penalties. Additionally, sectors with high-value intellectual property or critical infrastructure in Europe could face operational disruptions or reputational damage if targeted by this malware.

Mitigation Recommendations

To effectively mitigate NordDragonScan, European organizations should implement a layered defense strategy tailored to the malware's infection vectors and behaviors. Specifically: 1) Enhance email and web filtering to block shortened URLs and archives from untrusted sources, and implement sandboxing to analyze HTA and LNK files before delivery to end users. 2) Deploy endpoint detection and response (EDR) solutions capable of detecting obfuscated scripts, suspicious registry modifications, and unusual process behaviors associated with persistence and reconnaissance. 3) Restrict execution of HTA files and LNK shortcuts via application control policies or Windows Defender Application Control (WDAC). 4) Harden browser security by disabling or limiting access to stored credentials and profiles, and enforce multi-factor authentication to reduce impact of credential theft. 5) Monitor network traffic for anomalous TLS connections to unknown or suspicious domains such as those identified (e.g., secfileshare.com, kpuszkiev.com), using SSL/TLS inspection where privacy policies permit. 6) Conduct regular user awareness training focusing on risks of opening unsolicited links and attachments, emphasizing the danger of shortened URLs and archive files. 7) Maintain up-to-date backups and implement strict access controls to limit lateral movement opportunities. 8) Employ threat hunting exercises to proactively search for indicators of compromise (IOCs) including the provided hashes and domains. These targeted measures go beyond generic advice by focusing on the specific infection chain and capabilities of NordDragonScan.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.fortinet.com/blog/threat-research/norddragonscan-quiet-data-harvester-on-windows"]
Adversary
NordDragon
Pulse Id
687509d6eb8b150a23369e47
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainsecfileshare.com
domainkpuszkiev.com

Hash

ValueDescriptionCopy
hashd68801635d5892646a29fb1149757fb5
hash4acc0f1e246b6afcbd533a8406359bcfd76101fa
hash7b2b757e09fa36f817568787f9eae8ca732dd372853bf13ea50649dbb62f0c5b
hash3f41b99fe4dda40d0b207061572de023
hash4bb22cffc195be3474c1750bccdbd6d7
hashcd00b3c263fe03b00ea349635a746570
hashd1e1da4e3817f68f6e3b41b4acd6d480
hash302c3fdf4827b5ff63425a7c47fbf44c0e82c408
hash809d47078badd8bb8f8beab716c7ce4c3a3d29e2
hash97c352259808675dfea791a882e5f525b3f9c536
hashab6fd65c57cf09862582c945962d3fc03ce496e1
hash2102c2178000f8c63d01fd9199400885d1449501337c4f9f51b7e444aa6fbf50
hash39c68962a6b0963b56085a0f1a2af25c7974a167b650cf99eb1acd433ecb772b
hash3f3e367d673cac778f3f562d0792e4829a919766460ae948ab2594d922a0edae
hash9d1f587b1bd2cce1a14a1423a77eb746d126e1982a0a794f6b870a2d7178bd2c
hashe07b33b5560bbef2e4ae055a062fdf5b6a7e5b097283a77a0ec87edb7a354725
hashf4f6beea11f21a053d27d719dab711a482ba0e2e42d160cefdbdad7a958b93d0
hashf8403e30dd495561dc0674a3b1aedaea5d6839808428069d98e30e19bd6dc045
hashfbffe681c61f9bba4c7abcb6e8fe09ef4d28166a10bfeb73281f874d84f69b3d

Threat ID: 68750da0a83201eaacc72b31

Added to database: 7/14/2025, 2:01:04 PM

Last enriched: 7/14/2025, 2:16:27 PM

Last updated: 7/16/2025, 5:13:30 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats