Operation DupeHike: Targeting Russian employees with DUPERUNNER and AdaptixC2
A campaign targeting Russian corporate entities, particularly HR, payroll, and administrative departments, has been uncovered. The attack uses realistic decoy documents themed around employee bonuses and financial policies. The malware ecosystem involves a malicious LNK file leading to an implant dubbed DUPERUNNER, which then loads the AdaptixC2 Beacon to connect to the threat actor's infrastructure. The infection chain begins with a spear-phishing ZIP archive containing PDF-themed LNK files. The DUPERUNNER implant, programmed in C++, performs various functions including downloading and opening decoy PDFs, process enumeration, and shellcode injection. The final stage involves the AdaptixC2 Beacon, which communicates with the command-and-control server. The campaign, tracked as UNG0902, uses multiple malicious infrastructures and is believed to be targeting employees of various organizations.
AI Analysis
Technical Summary
Operation DupeHike is a targeted malware campaign primarily aimed at Russian corporate entities, focusing on employees in HR, payroll, and administrative departments. The attack begins with spear-phishing emails containing ZIP archives that include malicious LNK files masquerading as PDF documents themed around employee bonuses and financial policies to entice victims to open them. When executed, the LNK file launches the DUPERUNNER implant, a C++-based malware that performs several functions: it downloads and opens legitimate-looking decoy PDFs to avoid suspicion, enumerates running processes on the infected system, and injects shellcode into processes to maintain stealth and persistence. DUPERUNNER subsequently loads the AdaptixC2 Beacon, which facilitates communication with the attacker’s command-and-control (C2) infrastructure, enabling remote control and data exfiltration. The campaign, tracked under the UNG0902 adversary group, uses multiple malicious infrastructure nodes to maintain resilience and evade detection. The malware employs advanced techniques such as process injection (MITRE ATT&CK T1055), use of LNK files for execution (T1204.002), and C2 communication (T1071.001). Although no known exploits are used, the campaign relies heavily on social engineering and user interaction to succeed. Indicators of compromise include numerous file hashes and an IP address (46.149.71.230) associated with the C2 server. The campaign’s sophistication and targeted nature indicate a medium severity threat, with potential for data theft and espionage within targeted organizations.
Potential Impact
For European organizations, the direct impact of Operation DupeHike is currently limited given its primary focus on Russian corporate entities. However, European companies with subsidiaries, partners, or business ties to Russia, especially those with HR or payroll departments handling Russian employees, could be at risk of infection. Successful compromise could lead to unauthorized access to sensitive employee data, financial information, and internal communications, potentially resulting in data breaches, espionage, or financial fraud. The use of process injection and shellcode increases the difficulty of detection and removal, potentially allowing prolonged attacker presence and lateral movement within networks. Additionally, the campaign’s use of realistic decoy documents may reduce suspicion and increase the likelihood of successful infection. The presence of a C2 beacon enables attackers to exfiltrate data or deploy additional payloads, escalating the threat. European organizations should be aware of this campaign’s tactics as it could be adapted or expanded to target entities within Europe, especially in countries with significant Russian business presence or geopolitical interest.
Mitigation Recommendations
1. Implement advanced email filtering and sandboxing to detect and block spear-phishing emails containing malicious LNK files or suspicious ZIP archives. 2. Educate employees, particularly in HR, payroll, and administrative roles, on recognizing spear-phishing attempts and the risks of opening unexpected attachments or links. 3. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, shellcode execution, and unusual process behaviors indicative of DUPERUNNER activity. 4. Monitor network traffic for anomalous outbound connections, especially to known malicious IPs such as 46.149.71.230, and implement strict egress filtering to limit unauthorized C2 communications. 5. Use application whitelisting to prevent execution of unauthorized LNK files and restrict execution from user directories where such files may be placed. 6. Regularly update and patch systems to reduce attack surface, even though no specific exploits are used, to prevent exploitation of other vulnerabilities that could be chained. 7. Conduct threat hunting exercises focusing on the identified indicators of compromise (IOCs), including the provided file hashes, to detect potential infections early. 8. Isolate and analyze suspicious files in a controlled environment to understand new variants and update detection signatures accordingly.
Affected Countries
Russia, Germany, United Kingdom, France, Italy, Netherlands, Poland, Finland
Indicators of Compromise
- hash: 7a102ffa76773e3f1c9bd4a5667df69f
- hash: 8ea1d8a79e9394f369186c250558d241
- hash: 1f47d4c95b2df45d63a548b383bb324e5db8c37a
- hash: d9eca190944df1346de61d5d063325f5351501db
- hash: 1e0c5129ac74989754b7c27be9e12b1ebf90fa5f81db6d7fe5f1aa050a914cf9
- hash: 2cd715d0702fd70fda45c0569a38b3d983de1a8cf23b559293a7c0623da69c90
- hash: 3a52c13d00af0486095ee4007fd72dae646d3c7384754744507e33537b3fdf2a
- hash: 3ce5ab897b7f33bc1b9036abc8e7d2812b385fbab404dad686afaf9fb83fe07a
- hash: 432974205e1ce4c1d2c0e6bf6ebfafd90f6c19451eec0485ac46beaf65247763
- hash: 48b9f78899b8a3daaeb9cbf7245350a6222cbf0468cd5c2bab954c8dbbce3995
- hash: 7157be86c6612c59e5120ae00260f4268b19560fa5a6fa52ed54d72868070d50
- hash: 87db5cbd76e7adeb6932c4ae14f3d3bb736d631460d65e067fb2a0083b675399
- hash: 8c075d89eee37a58f1f3a8bf0cbd97e0c8f00e73179a36eb2cd8745024c1c4ee
- hash: ba6902efd3771a564785bdae68fa5f5ac12b7ebd828e8975459fff0136e2efdb
- hash: d9e2b6341f6de5c95dd02cf3350c07cd2be3b0a78b82c073229396b6d4c8d3c1
- ip: 46.149.71.230
Operation DupeHike: Targeting Russian employees with DUPERUNNER and AdaptixC2
Description
A campaign targeting Russian corporate entities, particularly HR, payroll, and administrative departments, has been uncovered. The attack uses realistic decoy documents themed around employee bonuses and financial policies. The malware ecosystem involves a malicious LNK file leading to an implant dubbed DUPERUNNER, which then loads the AdaptixC2 Beacon to connect to the threat actor's infrastructure. The infection chain begins with a spear-phishing ZIP archive containing PDF-themed LNK files. The DUPERUNNER implant, programmed in C++, performs various functions including downloading and opening decoy PDFs, process enumeration, and shellcode injection. The final stage involves the AdaptixC2 Beacon, which communicates with the command-and-control server. The campaign, tracked as UNG0902, uses multiple malicious infrastructures and is believed to be targeting employees of various organizations.
AI-Powered Analysis
Technical Analysis
Operation DupeHike is a targeted malware campaign primarily aimed at Russian corporate entities, focusing on employees in HR, payroll, and administrative departments. The attack begins with spear-phishing emails containing ZIP archives that include malicious LNK files masquerading as PDF documents themed around employee bonuses and financial policies to entice victims to open them. When executed, the LNK file launches the DUPERUNNER implant, a C++-based malware that performs several functions: it downloads and opens legitimate-looking decoy PDFs to avoid suspicion, enumerates running processes on the infected system, and injects shellcode into processes to maintain stealth and persistence. DUPERUNNER subsequently loads the AdaptixC2 Beacon, which facilitates communication with the attacker’s command-and-control (C2) infrastructure, enabling remote control and data exfiltration. The campaign, tracked under the UNG0902 adversary group, uses multiple malicious infrastructure nodes to maintain resilience and evade detection. The malware employs advanced techniques such as process injection (MITRE ATT&CK T1055), use of LNK files for execution (T1204.002), and C2 communication (T1071.001). Although no known exploits are used, the campaign relies heavily on social engineering and user interaction to succeed. Indicators of compromise include numerous file hashes and an IP address (46.149.71.230) associated with the C2 server. The campaign’s sophistication and targeted nature indicate a medium severity threat, with potential for data theft and espionage within targeted organizations.
Potential Impact
For European organizations, the direct impact of Operation DupeHike is currently limited given its primary focus on Russian corporate entities. However, European companies with subsidiaries, partners, or business ties to Russia, especially those with HR or payroll departments handling Russian employees, could be at risk of infection. Successful compromise could lead to unauthorized access to sensitive employee data, financial information, and internal communications, potentially resulting in data breaches, espionage, or financial fraud. The use of process injection and shellcode increases the difficulty of detection and removal, potentially allowing prolonged attacker presence and lateral movement within networks. Additionally, the campaign’s use of realistic decoy documents may reduce suspicion and increase the likelihood of successful infection. The presence of a C2 beacon enables attackers to exfiltrate data or deploy additional payloads, escalating the threat. European organizations should be aware of this campaign’s tactics as it could be adapted or expanded to target entities within Europe, especially in countries with significant Russian business presence or geopolitical interest.
Mitigation Recommendations
1. Implement advanced email filtering and sandboxing to detect and block spear-phishing emails containing malicious LNK files or suspicious ZIP archives. 2. Educate employees, particularly in HR, payroll, and administrative roles, on recognizing spear-phishing attempts and the risks of opening unexpected attachments or links. 3. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, shellcode execution, and unusual process behaviors indicative of DUPERUNNER activity. 4. Monitor network traffic for anomalous outbound connections, especially to known malicious IPs such as 46.149.71.230, and implement strict egress filtering to limit unauthorized C2 communications. 5. Use application whitelisting to prevent execution of unauthorized LNK files and restrict execution from user directories where such files may be placed. 6. Regularly update and patch systems to reduce attack surface, even though no specific exploits are used, to prevent exploitation of other vulnerabilities that could be chained. 7. Conduct threat hunting exercises focusing on the identified indicators of compromise (IOCs), including the provided file hashes, to detect potential infections early. 8. Isolate and analyze suspicious files in a controlled environment to understand new variants and update detection signatures accordingly.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/9512-2/"]
- Adversary
- UNG0902
- Pulse Id
- 69304959476d2ade5f1c7ff2
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash7a102ffa76773e3f1c9bd4a5667df69f | — | |
hash8ea1d8a79e9394f369186c250558d241 | — | |
hash1f47d4c95b2df45d63a548b383bb324e5db8c37a | — | |
hashd9eca190944df1346de61d5d063325f5351501db | — | |
hash1e0c5129ac74989754b7c27be9e12b1ebf90fa5f81db6d7fe5f1aa050a914cf9 | — | |
hash2cd715d0702fd70fda45c0569a38b3d983de1a8cf23b559293a7c0623da69c90 | — | |
hash3a52c13d00af0486095ee4007fd72dae646d3c7384754744507e33537b3fdf2a | — | |
hash3ce5ab897b7f33bc1b9036abc8e7d2812b385fbab404dad686afaf9fb83fe07a | — | |
hash432974205e1ce4c1d2c0e6bf6ebfafd90f6c19451eec0485ac46beaf65247763 | — | |
hash48b9f78899b8a3daaeb9cbf7245350a6222cbf0468cd5c2bab954c8dbbce3995 | — | |
hash7157be86c6612c59e5120ae00260f4268b19560fa5a6fa52ed54d72868070d50 | — | |
hash87db5cbd76e7adeb6932c4ae14f3d3bb736d631460d65e067fb2a0083b675399 | — | |
hash8c075d89eee37a58f1f3a8bf0cbd97e0c8f00e73179a36eb2cd8745024c1c4ee | — | |
hashba6902efd3771a564785bdae68fa5f5ac12b7ebd828e8975459fff0136e2efdb | — | |
hashd9e2b6341f6de5c95dd02cf3350c07cd2be3b0a78b82c073229396b6d4c8d3c1 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip46.149.71.230 | — |
Threat ID: 693076e4b129615efa107004
Added to database: 12/3/2025, 5:44:04 PM
Last enriched: 12/3/2025, 5:59:13 PM
Last updated: 1/18/2026, 9:47:22 AM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-17
MediumLOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing
MediumGootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
MediumThreatFox IOCs for 2026-01-16
MediumHUMINT Operations Uncover Cryptojacking Campaign: Discord-Based Distribution of Clipboard Hijacking Malware Targeting Cryptocurrency Communities
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.