Apache SeaTunnel Bug Enables Deserialization Attack
June 20, 2025Prometei Botnet Hits Linux for Crypto Mining – Active IOCs
June 20, 2025Apache SeaTunnel Bug Enables Deserialization Attack
June 20, 2025Prometei Botnet Hits Linux for Crypto Mining – Active IOCs
June 20, 2025Severity
High
Analysis Summary
A sophisticated malware campaign dubbed SERPENTINE#CLOUD has emerged, exploiting Cloudflare’s tunneling service to stealthily deliver multi-stage Python-based malware. This operation marks a significant leap in cybercriminal tactics, leveraging legitimate cloud infrastructure, advanced evasion techniques, and social engineering to infiltrate organizations primarily across the US, UK, Germany, and parts of Europe and Asia. Initial access is achieved via phishing emails containing malicious .lnk (shortcut) files disguised as PDF documents, typically crafted around invoice themes to deceive business users. The campaign’s use of trycloudflare.com subdomains allows attackers to bypass conventional security filters by blending malicious traffic with legitimate Cloudflare usage.
According to the Researcher, the infection chain is highly modular and layered, beginning with a disguised shortcut file that runs a command invoking Windows’ robocopy utility to pull malicious payloads from WebDAV shares hosted on Cloudflare’s infrastructure. This process retrieves a .wsf (Windows Script File) that then executes a remote batch script from a secondary Cloudflare tunnel. The multi-domain architecture and use of native Windows tools significantly complicate detection and analysis. Each stage of this infection chain is designed to increase stealth and resilience, showcasing a deep understanding of system internals and security evasion techniques.
One of the most advanced components of the campaign is the batch file stage, which uses UTF-16LE encoding, variable obfuscation, and anti-AV checks to stay undetected. This stage also drops decoy PDF files to divert user suspicion, downloads complete Python environments, and sets up Windows startup folder persistence. The payloads are then used to run a Python-based shellcode loader that implements Early Bird APC injection, a stealthy method of injecting shellcode into memory without touching disk, enabling fileless persistence.
The final payload is a Donut-packed Remote Access Trojan (RAT) capable of stealing credentials, browser session data, and other sensitive information. The RAT maintains command-and-control communication via various domains, including nhvncpure .shop, nhvncpure.sbs, and dynamic DNS platforms like DuckDNS. The campaign reflects nation-state-level sophistication, though attribution remains unclear. However, the English language fluency in the code, careful infrastructure selection, and scalable delivery methods indicate a well-funded and capable adversary possibly testing infrastructure for wider operations.
Impact
- Sensitive Information Theft
- Security Bypass
- Remotely Access
- Gain Access
Indicators of Compromise
Domain Name
- nhvncpure.shop
- nhvncpure.sbs
- nhvncpure.click
- nhvncpureybs.duckdns.org
- nhvncpurekfl.duckdns.org
- ncmomenthv.duckdns.org
- hvncmomentpure.duckdns.org
- nhvncpure.twilightparadox.com
- nhvncpure1.strangled.net
IP
- 51.89.212.145
MD5
- 176ba0c07961c2895f339828ba34b805
- a19d13980a8b49a71d09dbe72be8a7da
- 35b6f6b3cfdae34ba9d272c705f4a6d6
- 9cf6d945c93c5c5040e0775720f0916b
- 24282a25b210faf337eb91836f5cf27f
- bbbeae15adabffe9d93abf1ceb3c7df1
SHA-256
- 193218243c54d7903c65f5e7be9b865ddb286da9005c69e6e955e31ec3efa1a7
- 3b97a79ed920a508b4cd91240d0795713c559c36862c75ec6c9a41b4ec05d279
- 32253d3ea50927d0fd79f5bfdd6ee93c46aa26126ce4360d9915fabd2e5f562f
- 81c47e749e8a3376294de8593c2387a0642080303bb17d902babff1de561e743
- ac6eb3435cec6058ffea590ac51507b3313a74ea07893b984f2d87be12e17027
- d70b2ec135b1dc4d0be8e029574d9e686b29c0225022fc65d0af0811fdf88ce7
SHA1
- a0a0c84f5eee22b4a8ae594792069d4dbeb99867
- f6b940d7eb2331ce8e27d125cf96b53fffbe1313
- cbe89b3de55ad522be8222e1018057de44e3e9a9
- 037736cf63cf047f5165f0b6e0ab1d86d3d96512
- dc773f84f5b1bf39cfede5f87b7f6ce58315c5e9
- ce61eb2033737cb0e37ea32c14340fa712d93694
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Block unauthorized outbound traffic to Cloudflare Tunnel domains (e.g., trycloudflare.com).
- Monitor network traffic for suspicious use of CloudFlare binaries or unusual tunnel activity.
- Implement application allowlisting to prevent unauthorized execution of Python scripts and tunneling tools.
- Use endpoint detection and response (EDR) solutions to detect Python-based malware behavior.
- Regularly update antivirus and threat detection signatures to identify tunneling malware.
- Educate employees on phishing and social engineering tactics used to deliver initial payloads.
- Isolate and analyze suspicious Python scripts or binaries in a sandbox environment before execution.
- Implement strict access controls and privilege management on systems to limit lateral movement.