Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Operation DupeHike: Targeting Russian employees with DUPERUNNER and AdaptixC2

0
Medium
Published: Wed Dec 03 2025 (12/03/2025, 14:29:45 UTC)
Source: AlienVault OTX General

Description

Operation DupeHike is a spear-phishing campaign targeting Russian corporate employees, especially in HR, payroll, and administrative roles. It uses malicious LNK files disguised as PDF-themed decoy documents about employee bonuses and financial policies to infect victims. The initial malware implant, DUPERUNNER, written in C++, performs process enumeration, shellcode injection, and downloads decoy PDFs to avoid suspicion. DUPERUNNER then loads the AdaptixC2 Beacon, which establishes command-and-control communication with the attacker’s infrastructure. The campaign is tracked as UNG0902 and employs multiple malicious infrastructures. While primarily focused on Russian organizations, the infection vector and malware techniques could pose risks to entities with Russian ties or subsidiaries in Europe. The campaign does not require known exploits but relies on social engineering and user interaction via spear-phishing. No CVSS score is assigned, but the threat is assessed as medium severity due to targeted infection and moderate impact potential. Indicators include multiple file hashes and an IP address linked to the C2 server. Defenders should focus on detecting malicious LNK files, monitoring network C2 traffic, and training employees on spear-phishing risks.

AI-Powered Analysis

AILast updated: 12/03/2025, 17:59:13 UTC

Technical Analysis

Operation DupeHike is a targeted malware campaign primarily aimed at Russian corporate entities, focusing on employees in HR, payroll, and administrative departments. The attack begins with spear-phishing emails containing ZIP archives that include malicious LNK files masquerading as PDF documents themed around employee bonuses and financial policies to entice victims to open them. When executed, the LNK file launches the DUPERUNNER implant, a C++-based malware that performs several functions: it downloads and opens legitimate-looking decoy PDFs to avoid suspicion, enumerates running processes on the infected system, and injects shellcode into processes to maintain stealth and persistence. DUPERUNNER subsequently loads the AdaptixC2 Beacon, which facilitates communication with the attacker’s command-and-control (C2) infrastructure, enabling remote control and data exfiltration. The campaign, tracked under the UNG0902 adversary group, uses multiple malicious infrastructure nodes to maintain resilience and evade detection. The malware employs advanced techniques such as process injection (MITRE ATT&CK T1055), use of LNK files for execution (T1204.002), and C2 communication (T1071.001). Although no known exploits are used, the campaign relies heavily on social engineering and user interaction to succeed. Indicators of compromise include numerous file hashes and an IP address (46.149.71.230) associated with the C2 server. The campaign’s sophistication and targeted nature indicate a medium severity threat, with potential for data theft and espionage within targeted organizations.

Potential Impact

For European organizations, the direct impact of Operation DupeHike is currently limited given its primary focus on Russian corporate entities. However, European companies with subsidiaries, partners, or business ties to Russia, especially those with HR or payroll departments handling Russian employees, could be at risk of infection. Successful compromise could lead to unauthorized access to sensitive employee data, financial information, and internal communications, potentially resulting in data breaches, espionage, or financial fraud. The use of process injection and shellcode increases the difficulty of detection and removal, potentially allowing prolonged attacker presence and lateral movement within networks. Additionally, the campaign’s use of realistic decoy documents may reduce suspicion and increase the likelihood of successful infection. The presence of a C2 beacon enables attackers to exfiltrate data or deploy additional payloads, escalating the threat. European organizations should be aware of this campaign’s tactics as it could be adapted or expanded to target entities within Europe, especially in countries with significant Russian business presence or geopolitical interest.

Mitigation Recommendations

1. Implement advanced email filtering and sandboxing to detect and block spear-phishing emails containing malicious LNK files or suspicious ZIP archives. 2. Educate employees, particularly in HR, payroll, and administrative roles, on recognizing spear-phishing attempts and the risks of opening unexpected attachments or links. 3. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, shellcode execution, and unusual process behaviors indicative of DUPERUNNER activity. 4. Monitor network traffic for anomalous outbound connections, especially to known malicious IPs such as 46.149.71.230, and implement strict egress filtering to limit unauthorized C2 communications. 5. Use application whitelisting to prevent execution of unauthorized LNK files and restrict execution from user directories where such files may be placed. 6. Regularly update and patch systems to reduce attack surface, even though no specific exploits are used, to prevent exploitation of other vulnerabilities that could be chained. 7. Conduct threat hunting exercises focusing on the identified indicators of compromise (IOCs), including the provided file hashes, to detect potential infections early. 8. Isolate and analyze suspicious files in a controlled environment to understand new variants and update detection signatures accordingly.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/9512-2/"]
Adversary
UNG0902
Pulse Id
69304959476d2ade5f1c7ff2
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash7a102ffa76773e3f1c9bd4a5667df69f
hash8ea1d8a79e9394f369186c250558d241
hash1f47d4c95b2df45d63a548b383bb324e5db8c37a
hashd9eca190944df1346de61d5d063325f5351501db
hash1e0c5129ac74989754b7c27be9e12b1ebf90fa5f81db6d7fe5f1aa050a914cf9
hash2cd715d0702fd70fda45c0569a38b3d983de1a8cf23b559293a7c0623da69c90
hash3a52c13d00af0486095ee4007fd72dae646d3c7384754744507e33537b3fdf2a
hash3ce5ab897b7f33bc1b9036abc8e7d2812b385fbab404dad686afaf9fb83fe07a
hash432974205e1ce4c1d2c0e6bf6ebfafd90f6c19451eec0485ac46beaf65247763
hash48b9f78899b8a3daaeb9cbf7245350a6222cbf0468cd5c2bab954c8dbbce3995
hash7157be86c6612c59e5120ae00260f4268b19560fa5a6fa52ed54d72868070d50
hash87db5cbd76e7adeb6932c4ae14f3d3bb736d631460d65e067fb2a0083b675399
hash8c075d89eee37a58f1f3a8bf0cbd97e0c8f00e73179a36eb2cd8745024c1c4ee
hashba6902efd3771a564785bdae68fa5f5ac12b7ebd828e8975459fff0136e2efdb
hashd9e2b6341f6de5c95dd02cf3350c07cd2be3b0a78b82c073229396b6d4c8d3c1

Ip

ValueDescriptionCopy
ip46.149.71.230

Threat ID: 693076e4b129615efa107004

Added to database: 12/3/2025, 5:44:04 PM

Last enriched: 12/3/2025, 5:59:13 PM

Last updated: 12/5/2025, 2:25:18 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats