

Linux-PAM PoC Enables Root Escalation
October 20, 2025
Remcos RAT – Active IOCs
October 20, 2025
Linux-PAM PoC Enables Root Escalation
October 20, 2025
Remcos RAT – Active IOCs
October 20, 2025Severity
High
Analysis Summary
DarkTortilla is a highly obfuscated, .NET-based malware crypter active since at least 2015. It is primarily linked to the financially motivated threat group GOLD CAMOUFLAGE, which operates DarkTortilla as a malware distribution service. Designed to deliver a wide range of payloads, it is frequently used to deploy info-stealers (AgentTesla, RedLine, NanoCore, AsyncRAT) and sometimes advanced tools like Cobalt Strike.
Known by aliases like "win.darktortilla", this malware features strong anti-analysis and evasion techniques, including process injection and in-memory execution to avoid detection. Its modular design allows for high configurability, enabling threat actors to adjust payloads, persistence methods, and communication protocols.
Recent campaigns show DarkTortilla masquerading as legitimate installers from brands like Grammarly and Cisco, distributed through phishing websites. Victims are lured into downloading malicious files, which then deploy the crypter to establish persistence, contact command-and-control (C2) servers, and deliver secondary payloads for data theft and espionage.
DarkTortilla has been used in targeted attacks in Kazakhstan, where it was coupled with AgentTesla to steal personal data. Its flexibility has made it a tool of choice for attacks across government, finance, critical infrastructure, and individual users, particularly in Central Asia, but its impact is global.
In summary, DarkTortilla serves as a powerful delivery mechanism for cybercriminals, offering stealth, adaptability, and effectiveness in a wide range of malware campaigns.
Impact
- Data Theft
- Cyber Espionage
Indicators of Compromise
MD5
7ffb3572cf07c5c9d51bd934b56b0ab2
843e725eba3cd24a9bf3c6732d8de93f
379f7a705ee9c7d87e3c84867ba227c9
SHA-256
7eb16b0b45dab6d07f6b00b20923751acc5313db25c978ee5f5c42317479af3b
cb29310b5e68fa5f5c4aab781924807aea4f10e1d40164892cbf8651abf7bfd7
4c042d2b18dfd5d98145819afa16b61f0e706cec6436e2ac61bd073bd185e7ea
SHA1
cf7009f69eb3eb06961740b05ea3a55b5dc39fff
34e4697ce05cf46373e7b7e3e537ded6d63e6fc8
a0f263a9e21b662a8f122ec623e008a9e3f479e0
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Upgrade your operating system.
- Don't open files and links from unknown sources.
- Install and run anti-virus scans.








