Operation DupeHike: Targeting Russian employees with DUPERUNNER and AdaptixC2
Operation DupeHike is a spear-phishing campaign targeting Russian corporate employees, especially in HR, payroll, and administrative roles. It uses malicious LNK files disguised as PDF-themed decoy documents about employee bonuses and financial policies to infect victims. The initial malware implant, DUPERUNNER, written in C++, performs process enumeration, shellcode injection, and downloads decoy PDFs to avoid suspicion. DUPERUNNER then loads the AdaptixC2 Beacon, which establishes command-and-control communication with the attacker’s infrastructure. The campaign is tracked as UNG0902 and employs multiple malicious infrastructures. While primarily focused on Russian organizations, the infection vector and malware techniques could pose risks to entities with Russian ties or subsidiaries in Europe. The campaign does not require known exploits but relies on social engineering and user interaction via spear-phishing. No CVSS score is assigned, but the threat is assessed as medium severity due to targeted infection and moderate impact potential. Indicators include multiple file hashes and an IP address linked to the C2 server. Defenders should focus on detecting malicious LNK files, monitoring network C2 traffic, and training employees on spear-phishing risks.
AI Analysis
Technical Summary
Operation DupeHike is a targeted malware campaign primarily aimed at Russian corporate entities, focusing on employees in HR, payroll, and administrative departments. The attack begins with spear-phishing emails containing ZIP archives that include malicious LNK files masquerading as PDF documents themed around employee bonuses and financial policies to entice victims to open them. When executed, the LNK file launches the DUPERUNNER implant, a C++-based malware that performs several functions: it downloads and opens legitimate-looking decoy PDFs to avoid suspicion, enumerates running processes on the infected system, and injects shellcode into processes to maintain stealth and persistence. DUPERUNNER subsequently loads the AdaptixC2 Beacon, which facilitates communication with the attacker’s command-and-control (C2) infrastructure, enabling remote control and data exfiltration. The campaign, tracked under the UNG0902 adversary group, uses multiple malicious infrastructure nodes to maintain resilience and evade detection. The malware employs advanced techniques such as process injection (MITRE ATT&CK T1055), use of LNK files for execution (T1204.002), and C2 communication (T1071.001). Although no known exploits are used, the campaign relies heavily on social engineering and user interaction to succeed. Indicators of compromise include numerous file hashes and an IP address (46.149.71.230) associated with the C2 server. The campaign’s sophistication and targeted nature indicate a medium severity threat, with potential for data theft and espionage within targeted organizations.
Potential Impact
For European organizations, the direct impact of Operation DupeHike is currently limited given its primary focus on Russian corporate entities. However, European companies with subsidiaries, partners, or business ties to Russia, especially those with HR or payroll departments handling Russian employees, could be at risk of infection. Successful compromise could lead to unauthorized access to sensitive employee data, financial information, and internal communications, potentially resulting in data breaches, espionage, or financial fraud. The use of process injection and shellcode increases the difficulty of detection and removal, potentially allowing prolonged attacker presence and lateral movement within networks. Additionally, the campaign’s use of realistic decoy documents may reduce suspicion and increase the likelihood of successful infection. The presence of a C2 beacon enables attackers to exfiltrate data or deploy additional payloads, escalating the threat. European organizations should be aware of this campaign’s tactics as it could be adapted or expanded to target entities within Europe, especially in countries with significant Russian business presence or geopolitical interest.
Mitigation Recommendations
1. Implement advanced email filtering and sandboxing to detect and block spear-phishing emails containing malicious LNK files or suspicious ZIP archives. 2. Educate employees, particularly in HR, payroll, and administrative roles, on recognizing spear-phishing attempts and the risks of opening unexpected attachments or links. 3. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, shellcode execution, and unusual process behaviors indicative of DUPERUNNER activity. 4. Monitor network traffic for anomalous outbound connections, especially to known malicious IPs such as 46.149.71.230, and implement strict egress filtering to limit unauthorized C2 communications. 5. Use application whitelisting to prevent execution of unauthorized LNK files and restrict execution from user directories where such files may be placed. 6. Regularly update and patch systems to reduce attack surface, even though no specific exploits are used, to prevent exploitation of other vulnerabilities that could be chained. 7. Conduct threat hunting exercises focusing on the identified indicators of compromise (IOCs), including the provided file hashes, to detect potential infections early. 8. Isolate and analyze suspicious files in a controlled environment to understand new variants and update detection signatures accordingly.
Affected Countries
Russia, Germany, United Kingdom, France, Italy, Netherlands, Poland, Finland
Indicators of Compromise
- hash: 7a102ffa76773e3f1c9bd4a5667df69f
- hash: 8ea1d8a79e9394f369186c250558d241
- hash: 1f47d4c95b2df45d63a548b383bb324e5db8c37a
- hash: d9eca190944df1346de61d5d063325f5351501db
- hash: 1e0c5129ac74989754b7c27be9e12b1ebf90fa5f81db6d7fe5f1aa050a914cf9
- hash: 2cd715d0702fd70fda45c0569a38b3d983de1a8cf23b559293a7c0623da69c90
- hash: 3a52c13d00af0486095ee4007fd72dae646d3c7384754744507e33537b3fdf2a
- hash: 3ce5ab897b7f33bc1b9036abc8e7d2812b385fbab404dad686afaf9fb83fe07a
- hash: 432974205e1ce4c1d2c0e6bf6ebfafd90f6c19451eec0485ac46beaf65247763
- hash: 48b9f78899b8a3daaeb9cbf7245350a6222cbf0468cd5c2bab954c8dbbce3995
- hash: 7157be86c6612c59e5120ae00260f4268b19560fa5a6fa52ed54d72868070d50
- hash: 87db5cbd76e7adeb6932c4ae14f3d3bb736d631460d65e067fb2a0083b675399
- hash: 8c075d89eee37a58f1f3a8bf0cbd97e0c8f00e73179a36eb2cd8745024c1c4ee
- hash: ba6902efd3771a564785bdae68fa5f5ac12b7ebd828e8975459fff0136e2efdb
- hash: d9e2b6341f6de5c95dd02cf3350c07cd2be3b0a78b82c073229396b6d4c8d3c1
- ip: 46.149.71.230
Operation DupeHike: Targeting Russian employees with DUPERUNNER and AdaptixC2
Description
Operation DupeHike is a spear-phishing campaign targeting Russian corporate employees, especially in HR, payroll, and administrative roles. It uses malicious LNK files disguised as PDF-themed decoy documents about employee bonuses and financial policies to infect victims. The initial malware implant, DUPERUNNER, written in C++, performs process enumeration, shellcode injection, and downloads decoy PDFs to avoid suspicion. DUPERUNNER then loads the AdaptixC2 Beacon, which establishes command-and-control communication with the attacker’s infrastructure. The campaign is tracked as UNG0902 and employs multiple malicious infrastructures. While primarily focused on Russian organizations, the infection vector and malware techniques could pose risks to entities with Russian ties or subsidiaries in Europe. The campaign does not require known exploits but relies on social engineering and user interaction via spear-phishing. No CVSS score is assigned, but the threat is assessed as medium severity due to targeted infection and moderate impact potential. Indicators include multiple file hashes and an IP address linked to the C2 server. Defenders should focus on detecting malicious LNK files, monitoring network C2 traffic, and training employees on spear-phishing risks.
AI-Powered Analysis
Technical Analysis
Operation DupeHike is a targeted malware campaign primarily aimed at Russian corporate entities, focusing on employees in HR, payroll, and administrative departments. The attack begins with spear-phishing emails containing ZIP archives that include malicious LNK files masquerading as PDF documents themed around employee bonuses and financial policies to entice victims to open them. When executed, the LNK file launches the DUPERUNNER implant, a C++-based malware that performs several functions: it downloads and opens legitimate-looking decoy PDFs to avoid suspicion, enumerates running processes on the infected system, and injects shellcode into processes to maintain stealth and persistence. DUPERUNNER subsequently loads the AdaptixC2 Beacon, which facilitates communication with the attacker’s command-and-control (C2) infrastructure, enabling remote control and data exfiltration. The campaign, tracked under the UNG0902 adversary group, uses multiple malicious infrastructure nodes to maintain resilience and evade detection. The malware employs advanced techniques such as process injection (MITRE ATT&CK T1055), use of LNK files for execution (T1204.002), and C2 communication (T1071.001). Although no known exploits are used, the campaign relies heavily on social engineering and user interaction to succeed. Indicators of compromise include numerous file hashes and an IP address (46.149.71.230) associated with the C2 server. The campaign’s sophistication and targeted nature indicate a medium severity threat, with potential for data theft and espionage within targeted organizations.
Potential Impact
For European organizations, the direct impact of Operation DupeHike is currently limited given its primary focus on Russian corporate entities. However, European companies with subsidiaries, partners, or business ties to Russia, especially those with HR or payroll departments handling Russian employees, could be at risk of infection. Successful compromise could lead to unauthorized access to sensitive employee data, financial information, and internal communications, potentially resulting in data breaches, espionage, or financial fraud. The use of process injection and shellcode increases the difficulty of detection and removal, potentially allowing prolonged attacker presence and lateral movement within networks. Additionally, the campaign’s use of realistic decoy documents may reduce suspicion and increase the likelihood of successful infection. The presence of a C2 beacon enables attackers to exfiltrate data or deploy additional payloads, escalating the threat. European organizations should be aware of this campaign’s tactics as it could be adapted or expanded to target entities within Europe, especially in countries with significant Russian business presence or geopolitical interest.
Mitigation Recommendations
1. Implement advanced email filtering and sandboxing to detect and block spear-phishing emails containing malicious LNK files or suspicious ZIP archives. 2. Educate employees, particularly in HR, payroll, and administrative roles, on recognizing spear-phishing attempts and the risks of opening unexpected attachments or links. 3. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, shellcode execution, and unusual process behaviors indicative of DUPERUNNER activity. 4. Monitor network traffic for anomalous outbound connections, especially to known malicious IPs such as 46.149.71.230, and implement strict egress filtering to limit unauthorized C2 communications. 5. Use application whitelisting to prevent execution of unauthorized LNK files and restrict execution from user directories where such files may be placed. 6. Regularly update and patch systems to reduce attack surface, even though no specific exploits are used, to prevent exploitation of other vulnerabilities that could be chained. 7. Conduct threat hunting exercises focusing on the identified indicators of compromise (IOCs), including the provided file hashes, to detect potential infections early. 8. Isolate and analyze suspicious files in a controlled environment to understand new variants and update detection signatures accordingly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/9512-2/"]
- Adversary
- UNG0902
- Pulse Id
- 69304959476d2ade5f1c7ff2
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash7a102ffa76773e3f1c9bd4a5667df69f | — | |
hash8ea1d8a79e9394f369186c250558d241 | — | |
hash1f47d4c95b2df45d63a548b383bb324e5db8c37a | — | |
hashd9eca190944df1346de61d5d063325f5351501db | — | |
hash1e0c5129ac74989754b7c27be9e12b1ebf90fa5f81db6d7fe5f1aa050a914cf9 | — | |
hash2cd715d0702fd70fda45c0569a38b3d983de1a8cf23b559293a7c0623da69c90 | — | |
hash3a52c13d00af0486095ee4007fd72dae646d3c7384754744507e33537b3fdf2a | — | |
hash3ce5ab897b7f33bc1b9036abc8e7d2812b385fbab404dad686afaf9fb83fe07a | — | |
hash432974205e1ce4c1d2c0e6bf6ebfafd90f6c19451eec0485ac46beaf65247763 | — | |
hash48b9f78899b8a3daaeb9cbf7245350a6222cbf0468cd5c2bab954c8dbbce3995 | — | |
hash7157be86c6612c59e5120ae00260f4268b19560fa5a6fa52ed54d72868070d50 | — | |
hash87db5cbd76e7adeb6932c4ae14f3d3bb736d631460d65e067fb2a0083b675399 | — | |
hash8c075d89eee37a58f1f3a8bf0cbd97e0c8f00e73179a36eb2cd8745024c1c4ee | — | |
hashba6902efd3771a564785bdae68fa5f5ac12b7ebd828e8975459fff0136e2efdb | — | |
hashd9e2b6341f6de5c95dd02cf3350c07cd2be3b0a78b82c073229396b6d4c8d3c1 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip46.149.71.230 | — |
Threat ID: 693076e4b129615efa107004
Added to database: 12/3/2025, 5:44:04 PM
Last enriched: 12/3/2025, 5:59:13 PM
Last updated: 12/5/2025, 2:25:18 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-04
MediumQilin Ransomware Claims Data Theft from Church of Scientology
MediumSilver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
MediumNew Android malware lets criminals control your phone and drain your bank account
MediumNewly Sold Albiriox Android Malware Targets Banks and Crypto Holders
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.