NordDragonScan: Quiet Data-Harvester on Windows
A sophisticated infostealer dubbed NordDragonScan has been discovered, targeting Windows systems through weaponized HTA scripts. The malware is distributed via shortened links leading to RAR archives containing malicious LNK shortcuts. Once installed, NordDragonScan performs extensive reconnaissance, collecting system information, network details, browser data, and sensitive documents. It utilizes custom obfuscation techniques and establishes persistence through registry modifications. The stolen data is exfiltrated to a command-and-control server using TLS encryption. The attack employs various decoy documents to evade detection and maximize infection opportunities. NordDragonScan's capabilities include screenshot capture, Chrome and Firefox profile harvesting, and local network scanning.
AI Analysis
Technical Summary
NordDragonScan is a sophisticated information-stealing malware targeting Windows operating systems. It is distributed primarily through weaponized HTA (HTML Application) scripts, which are delivered via shortened URLs that lead victims to RAR archives containing malicious LNK shortcut files. When executed, these shortcuts trigger the malware installation. NordDragonScan performs extensive reconnaissance on infected systems, harvesting a wide range of sensitive data including system configuration details, network information, browser data (notably from Chrome and Firefox profiles), and sensitive documents stored locally. The malware also captures screenshots and conducts local network scanning to identify additional targets or valuable information within the victim's environment. To evade detection, NordDragonScan employs custom obfuscation techniques and uses decoy documents to distract users and security tools. Persistence is achieved through registry modifications, allowing the malware to maintain foothold across system reboots. Data exfiltration is conducted securely over TLS-encrypted channels to a command-and-control server, complicating network detection efforts. The malware leverages multiple MITRE ATT&CK techniques such as T1113 (screen capture), T1033 (system owner/user discovery), T1132.001 (data encoding), T1056.001 (input capture), T1074.001 (data staged), T1114.001 (email collection), T1204.002 (user execution via malicious link), T1082 (system information discovery), T1005 (data from local system), T1016 (system network configuration discovery), T1083 (file and directory discovery), T1059.001 (command and scripting interpreter), T1547.001 (registry run keys), and T1071.001 (application layer protocol for command and control). Although no known exploits in the wild have been reported, the malware's stealthy and multi-faceted capabilities make it a significant threat to Windows environments, especially those with users prone to opening suspicious links or files.
Potential Impact
For European organizations, NordDragonScan poses a substantial risk to confidentiality and operational security. The malware's ability to harvest browser profiles can lead to credential theft, enabling further lateral movement or unauthorized access to corporate resources. The capture of sensitive documents and system/network information can facilitate espionage, intellectual property theft, or preparation for more destructive attacks. The local network scanning capability increases the risk of broader compromise within enterprise networks. The use of encrypted exfiltration channels challenges traditional network monitoring and detection tools, potentially allowing prolonged undetected data leakage. Given Europe's stringent data protection regulations such as GDPR, any data breach involving personal or sensitive information could result in severe legal and financial penalties. Additionally, sectors with high-value intellectual property or critical infrastructure in Europe could face operational disruptions or reputational damage if targeted by this malware.
Mitigation Recommendations
To effectively mitigate NordDragonScan, European organizations should implement a layered defense strategy tailored to the malware's infection vectors and behaviors. Specifically: 1) Enhance email and web filtering to block shortened URLs and archives from untrusted sources, and implement sandboxing to analyze HTA and LNK files before delivery to end users. 2) Deploy endpoint detection and response (EDR) solutions capable of detecting obfuscated scripts, suspicious registry modifications, and unusual process behaviors associated with persistence and reconnaissance. 3) Restrict execution of HTA files and LNK shortcuts via application control policies or Windows Defender Application Control (WDAC). 4) Harden browser security by disabling or limiting access to stored credentials and profiles, and enforce multi-factor authentication to reduce impact of credential theft. 5) Monitor network traffic for anomalous TLS connections to unknown or suspicious domains such as those identified (e.g., secfileshare.com, kpuszkiev.com), using SSL/TLS inspection where privacy policies permit. 6) Conduct regular user awareness training focusing on risks of opening unsolicited links and attachments, emphasizing the danger of shortened URLs and archive files. 7) Maintain up-to-date backups and implement strict access controls to limit lateral movement opportunities. 8) Employ threat hunting exercises to proactively search for indicators of compromise (IOCs) including the provided hashes and domains. These targeted measures go beyond generic advice by focusing on the specific infection chain and capabilities of NordDragonScan.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: secfileshare.com
- hash: d68801635d5892646a29fb1149757fb5
- hash: 4acc0f1e246b6afcbd533a8406359bcfd76101fa
- hash: 7b2b757e09fa36f817568787f9eae8ca732dd372853bf13ea50649dbb62f0c5b
- hash: 3f41b99fe4dda40d0b207061572de023
- hash: 4bb22cffc195be3474c1750bccdbd6d7
- hash: cd00b3c263fe03b00ea349635a746570
- hash: d1e1da4e3817f68f6e3b41b4acd6d480
- hash: 302c3fdf4827b5ff63425a7c47fbf44c0e82c408
- hash: 809d47078badd8bb8f8beab716c7ce4c3a3d29e2
- hash: 97c352259808675dfea791a882e5f525b3f9c536
- hash: ab6fd65c57cf09862582c945962d3fc03ce496e1
- hash: 2102c2178000f8c63d01fd9199400885d1449501337c4f9f51b7e444aa6fbf50
- hash: 39c68962a6b0963b56085a0f1a2af25c7974a167b650cf99eb1acd433ecb772b
- hash: 3f3e367d673cac778f3f562d0792e4829a919766460ae948ab2594d922a0edae
- hash: 9d1f587b1bd2cce1a14a1423a77eb746d126e1982a0a794f6b870a2d7178bd2c
- hash: e07b33b5560bbef2e4ae055a062fdf5b6a7e5b097283a77a0ec87edb7a354725
- hash: f4f6beea11f21a053d27d719dab711a482ba0e2e42d160cefdbdad7a958b93d0
- hash: f8403e30dd495561dc0674a3b1aedaea5d6839808428069d98e30e19bd6dc045
- hash: fbffe681c61f9bba4c7abcb6e8fe09ef4d28166a10bfeb73281f874d84f69b3d
- domain: kpuszkiev.com
NordDragonScan: Quiet Data-Harvester on Windows
Description
A sophisticated infostealer dubbed NordDragonScan has been discovered, targeting Windows systems through weaponized HTA scripts. The malware is distributed via shortened links leading to RAR archives containing malicious LNK shortcuts. Once installed, NordDragonScan performs extensive reconnaissance, collecting system information, network details, browser data, and sensitive documents. It utilizes custom obfuscation techniques and establishes persistence through registry modifications. The stolen data is exfiltrated to a command-and-control server using TLS encryption. The attack employs various decoy documents to evade detection and maximize infection opportunities. NordDragonScan's capabilities include screenshot capture, Chrome and Firefox profile harvesting, and local network scanning.
AI-Powered Analysis
Technical Analysis
NordDragonScan is a sophisticated information-stealing malware targeting Windows operating systems. It is distributed primarily through weaponized HTA (HTML Application) scripts, which are delivered via shortened URLs that lead victims to RAR archives containing malicious LNK shortcut files. When executed, these shortcuts trigger the malware installation. NordDragonScan performs extensive reconnaissance on infected systems, harvesting a wide range of sensitive data including system configuration details, network information, browser data (notably from Chrome and Firefox profiles), and sensitive documents stored locally. The malware also captures screenshots and conducts local network scanning to identify additional targets or valuable information within the victim's environment. To evade detection, NordDragonScan employs custom obfuscation techniques and uses decoy documents to distract users and security tools. Persistence is achieved through registry modifications, allowing the malware to maintain foothold across system reboots. Data exfiltration is conducted securely over TLS-encrypted channels to a command-and-control server, complicating network detection efforts. The malware leverages multiple MITRE ATT&CK techniques such as T1113 (screen capture), T1033 (system owner/user discovery), T1132.001 (data encoding), T1056.001 (input capture), T1074.001 (data staged), T1114.001 (email collection), T1204.002 (user execution via malicious link), T1082 (system information discovery), T1005 (data from local system), T1016 (system network configuration discovery), T1083 (file and directory discovery), T1059.001 (command and scripting interpreter), T1547.001 (registry run keys), and T1071.001 (application layer protocol for command and control). Although no known exploits in the wild have been reported, the malware's stealthy and multi-faceted capabilities make it a significant threat to Windows environments, especially those with users prone to opening suspicious links or files.
Potential Impact
For European organizations, NordDragonScan poses a substantial risk to confidentiality and operational security. The malware's ability to harvest browser profiles can lead to credential theft, enabling further lateral movement or unauthorized access to corporate resources. The capture of sensitive documents and system/network information can facilitate espionage, intellectual property theft, or preparation for more destructive attacks. The local network scanning capability increases the risk of broader compromise within enterprise networks. The use of encrypted exfiltration channels challenges traditional network monitoring and detection tools, potentially allowing prolonged undetected data leakage. Given Europe's stringent data protection regulations such as GDPR, any data breach involving personal or sensitive information could result in severe legal and financial penalties. Additionally, sectors with high-value intellectual property or critical infrastructure in Europe could face operational disruptions or reputational damage if targeted by this malware.
Mitigation Recommendations
To effectively mitigate NordDragonScan, European organizations should implement a layered defense strategy tailored to the malware's infection vectors and behaviors. Specifically: 1) Enhance email and web filtering to block shortened URLs and archives from untrusted sources, and implement sandboxing to analyze HTA and LNK files before delivery to end users. 2) Deploy endpoint detection and response (EDR) solutions capable of detecting obfuscated scripts, suspicious registry modifications, and unusual process behaviors associated with persistence and reconnaissance. 3) Restrict execution of HTA files and LNK shortcuts via application control policies or Windows Defender Application Control (WDAC). 4) Harden browser security by disabling or limiting access to stored credentials and profiles, and enforce multi-factor authentication to reduce impact of credential theft. 5) Monitor network traffic for anomalous TLS connections to unknown or suspicious domains such as those identified (e.g., secfileshare.com, kpuszkiev.com), using SSL/TLS inspection where privacy policies permit. 6) Conduct regular user awareness training focusing on risks of opening unsolicited links and attachments, emphasizing the danger of shortened URLs and archive files. 7) Maintain up-to-date backups and implement strict access controls to limit lateral movement opportunities. 8) Employ threat hunting exercises to proactively search for indicators of compromise (IOCs) including the provided hashes and domains. These targeted measures go beyond generic advice by focusing on the specific infection chain and capabilities of NordDragonScan.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.fortinet.com/blog/threat-research/norddragonscan-quiet-data-harvester-on-windows"]
- Adversary
- NordDragon
- Pulse Id
- 687509d6eb8b150a23369e47
- Threat Score
- null
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainsecfileshare.com | — | |
domainkpuszkiev.com | — |
Hash
Value | Description | Copy |
---|---|---|
hashd68801635d5892646a29fb1149757fb5 | — | |
hash4acc0f1e246b6afcbd533a8406359bcfd76101fa | — | |
hash7b2b757e09fa36f817568787f9eae8ca732dd372853bf13ea50649dbb62f0c5b | — | |
hash3f41b99fe4dda40d0b207061572de023 | — | |
hash4bb22cffc195be3474c1750bccdbd6d7 | — | |
hashcd00b3c263fe03b00ea349635a746570 | — | |
hashd1e1da4e3817f68f6e3b41b4acd6d480 | — | |
hash302c3fdf4827b5ff63425a7c47fbf44c0e82c408 | — | |
hash809d47078badd8bb8f8beab716c7ce4c3a3d29e2 | — | |
hash97c352259808675dfea791a882e5f525b3f9c536 | — | |
hashab6fd65c57cf09862582c945962d3fc03ce496e1 | — | |
hash2102c2178000f8c63d01fd9199400885d1449501337c4f9f51b7e444aa6fbf50 | — | |
hash39c68962a6b0963b56085a0f1a2af25c7974a167b650cf99eb1acd433ecb772b | — | |
hash3f3e367d673cac778f3f562d0792e4829a919766460ae948ab2594d922a0edae | — | |
hash9d1f587b1bd2cce1a14a1423a77eb746d126e1982a0a794f6b870a2d7178bd2c | — | |
hashe07b33b5560bbef2e4ae055a062fdf5b6a7e5b097283a77a0ec87edb7a354725 | — | |
hashf4f6beea11f21a053d27d719dab711a482ba0e2e42d160cefdbdad7a958b93d0 | — | |
hashf8403e30dd495561dc0674a3b1aedaea5d6839808428069d98e30e19bd6dc045 | — | |
hashfbffe681c61f9bba4c7abcb6e8fe09ef4d28166a10bfeb73281f874d84f69b3d | — |
Threat ID: 68750da0a83201eaacc72b31
Added to database: 7/14/2025, 2:01:04 PM
Last enriched: 7/14/2025, 2:16:27 PM
Last updated: 7/16/2025, 5:13:30 AM
Views: 5
Related Threats
OCTALYN STEALER UNMASKED
MediumAnalysis of Secp0 Ransomware
MediumUnmasking AsyncRAT: Navigating the labyrinth of forks
MediumRainbow Hyena strikes again: new backdoor and shift in tactics
MediumKonfety Returns: Classic Mobile Threat with New Evasion Techniques
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.