top of page

When Your Endpoint Says “New Remote Tool Installed” and You Didn’t Hire Anyone

  • Writer: FAIR INTEL
    FAIR INTEL
  • 6 days ago
  • 22 min read

December 9, 2025

ree

Synopsis

MuddyWater’s campaign reflects a sustained, espionage-driven threat in which targeted spearphishing delivers legitimate-looking RMM installers that subsequently deploy custom loaders, the MuddyViper backdoor, credential stealers, and covert reverse tunnels, enabling persistent access to Windows systems, credential theft, and encrypted data exfiltration across government and critical-infrastructure sectors. Strategically, this intelligence requires organizations to reassess their exposure to state-aligned actors, prioritize governance around RMM usage and credential protections, and plan for long-term defensive investment against multi-stage intrusion operations. Operationally, the findings compel improved monitoring of RMM deployments, email and endpoint behaviors, encrypted outbound traffic, and persistence mechanisms, along with tightening incident-response readiness for complex, multi-tool intrusions. Tactically, security teams must enhance phishing detection, endpoint logging, signature and behavior-based detections for loaders and backdoors, and rapid isolation of compromised systems. Overall risk posture increases due to high threat capability, moderate control strength, and user-driven exploitability, resulting in a meaningful likelihood of harmful compromise if contacted during an active campaign. Financial resilience is affected by potential incident-response costs, service disruption, credential resets, regulatory or contractual exposure, and reputational impact, with modeled loss ranges indicating that even contained events can be materially costly. At the same time, worst-case espionage-driven intrusions may impose multi-million-dollar consequences.


Evaluated Source, Context, and Claim

Artifact Title

MuddyWater: Snakes by the riverbank


Source Type

Vendor threat research blog (ESET WeLiveSecurity article)


Publication Date: December 2, 2025


Credibility Assessment

ESET is a long-standing, well-regarded security vendor with a track record of detailed APT reporting and transparent IOCs, which supports high credibility. The article is technically rich, internally consistent, and aligns with broader public reporting on MuddyWater.


General Claim

Iran-aligned MuddyWater is running a focused cyberespionage campaign against Israeli and Egyptian organizations, deploying new custom tools, including the Fooder loader, MuddyViper backdoor, credential stealers, and reverse tunnels to improve stealth, persistence, and credential theft against government and critical infrastructure networks.

 

Narrative Reconstruction

An Iran-aligned cyberespionage group commonly known as MuddyWater is conducting a targeted campaign against organizations in Israel and Egypt, especially in government, engineering, technology, manufacturing, utilities, transportation, and other critical infrastructure verticals. The operators use a killchain-like flow that starts with spearphishing emails linking to remote-monitoring-and-management installers hosted on third-party file-sharing services, then deploy a layered toolset, including the Fooder loader, the MuddyViper backdoor, credential stealers, browser-data stealers, and Go-based reverse tunnels to gain and maintain access. These tools enable system reconnaissance, remote command execution, credential harvesting from browsers and fake Windows Security dialogs, local staging of stolen data, and encrypted command-and-control over HTTP(S) using reflective loading and evasion techniques to avoid analysis and monitoring. The primary assets at risk are Windows workstations and servers in targeted organizations, their stored credentials and browser data, and the connected internal networks that can be reached via remote tunnels, with an operational goal of sustained espionage-focused access and data exfiltration rather than immediate destructive impact.


Risk Scenario

Risk Scenario

An Iran-aligned APT group (MuddyWater) uses spearphishing links to deploy remote monitoring tools and custom loaders that install the MuddyViper backdoor and associated credential stealers on Windows systems in a critical-infrastructure or government organization, enabling persistent remote access, credential theft, and exfiltration of sensitive data, which may lead to operational disruption and incident response, legal, and reputational losses.


Threat

Iran-aligned advanced persistent threat actors (MuddyWater and cooperating Iran-nexus groups such as Lyceum/OilRig) are seeking long-term access to government and critical infrastructure networks for espionage and strategic advantage.


Method

Targeted spearphishing with links to RMM installers hosted on file-sharing services, followed by deployment of the Fooder loader, MuddyViper backdoor, credential stealers (CE-Notes, LP-Notes, Blub), and Go-based socks5 reverse tunnels that use reflective loading, token impersonation, sandbox evasion, encrypted C2, and fake Windows Security dialogs to capture credentials and maintain covert access.


Asset

Windows endpoints and servers in government and critical infrastructure organizations (e.g., local government agencies, engineering and manufacturing firms, utilities, transportation, technology, and university environments), along with the credentials, browser data, and internal network access reachable from these systems.


Impact

If successful, the campaign can result in compromise of privileged accounts, theft of sensitive operational and business data, potential misuse of RMM tools for deeper lateral movement, and sustained unauthorized visibility into critical operations, causing losses from incident response and remediation, regulatory or contractual exposure, business interruption, and long-term reputational and geopolitical impacts.

 

Evidentiary Basis for Synopsis and Recommendations

Supporting observations from the analysis help clarify how the threat landscape, control environment, and organizational behaviors interact to shape overall risk exposure. These insights provide the foundation for identifying where controls perform well, where gaps or weaknesses create unnecessary vulnerability, and how attacker methods intersect with real-world operational conditions. Building on these findings, the recommendations that follow focus on strengthening resilience, improving decision-making, and guiding readers toward practical steps that enhance both security posture and risk-informed governance.


FAIR Breakdown

Threat Event Frequency (TEF)

Because the OSINT describes a multi-month, targeted APT campaign with a finite but diverse victim set, TEF for a single similarly profiled organization must be inferred from MuddyWater’s persistence, sector focus, and spearphishing delivery. TEF is likely low-to-moderate for any one organization, reflecting focused but not ubiquitous outreach within prioritized verticals (government, utilities, transportation, manufacturing, and technology).


Contact Frequency (CF)

The campaign relies on spearphishing emails containing links to RMM installers hosted on file-sharing platforms, indicating episodic but deliberate contact rather than continuous scanning or mass phishing. Given MuddyWater’s multi-country victim list and repeated focus on Israeli critical sectors, CF for a single targeted organization is plausibly on the order of a few tailored phishing approaches per year, with higher intensity during active campaigns.


Probably of Action (PoA)

MuddyWater is assessed as an Iran-aligned espionage actor with a history of sustained operations, suggesting high motivation to gain and maintain access to strategic targets. The use of custom loaders, new backdoors, credential stealers, and reverse tunnels, combined with observable cooperation with Lyceum/OilRig, indicates that once contact is made with a viable target, the actors are highly likely to execute their complete toolchain and pursue exploitation rather than abandoning opportunities.


Threat Capability (TCap)

TCap is high, given the breadth and sophistication of the toolset and tradecraft demonstrated in the campaign.


Exploit sophistication: The attack chain blends social engineering (spearphishing links), abuse of legitimate RMM software, reflective loading of AES-encrypted payloads, browser and credential theft, and fake Windows Security dialogs, indicating above-average technical and operational sophistication.


Bypass ability: MuddyViper and related tools use reflective code loading, sandbox and VM evasion via sleep/delay logic, token impersonation, embedded payloads, and encrypted C2, all designed to bypass endpoint protections and analysis tooling.


Tooling maturity: The presence of multiple purpose-built components (Fooder, MuddyViper, CE-Notes, LP-Notes, Blub, customized go socks5 variants) along with consistent cryptographic APIs (CNG, AES-CBC) and extensive status logging suggests a mature, evolving toolkit rather than ad hoc scripts.


Campaign success rate: Historical reporting on MuddyWater indicates repeated successful compromises of multiple organizations across regions and sectors, and the current OSINT lists a sizable victim set, suggesting a moderate-to-high success rate against contacted, sufficiently exposed targets.


Attack path sophistication: The path includes reconnaissance and targeting, spearphishing link delivery, user execution of RMM installers, weaponization of RMM or loaders to deploy MuddyViper and stealers, establishment of persistence via startup folders and scheduled tasks, credential harvesting, reverse-shell operation, and reverse tunnels for covert C2, reflecting a complex, multi-stage operation.


Cost to run the attack: Once the custom tooling and infrastructure are in place, the incremental operational cost is moderate, centered on phishing operations, infrastructure maintenance, and ongoing development; for a state-aligned group, these costs are easily sustainable, making the attack path feasible over extended periods.


Control Strength (CS)

Typical target environments (government, utilities, engineering/manufacturing, universities) have mixed maturity in phishing defenses, EDR deployment, RMM governance, and monitoring of encrypted outbound traffic. Controls may be strong in some segments but weaker in others, particularly regarding user behavior and RMM oversight, resulting to an overall moderate level of control strength.


Resistive Strength (RS) Effectiveness of preventive/detective controls:

  • Mature email security and phishing filters may block some spearphishing emails or malicious links, but targeted messages with benign-looking RMM installers can bypass generic filters.

  • Endpoint protection and EDR can detect some MuddyWater binaries based on known signatures or behavior, but reflective loading, encrypted payloads, and time-based evasion complicate reliable detection.

  • Strong RMM governance (allowlisting tools, code signing, and monitoring RMM deployments) can significantly reduce the chance that unauthorized RMM-based access persists.

  • Network monitoring and IDS/IPS on egress paths can flag unusual HTTPS traffic to known C2 infrastructure or anomalous file transfers. Still, encrypted C2 and the use of cloud providers can blend into regular traffic.

  • Privileged access management and MFA can limit the impact of stolen credentials, particularly for administrative or remote-access accounts.


Control Failure Rate

  • Weak user training and awareness of spearphishing and RMM abuse can lead users to install unauthorized remote access tools or click links to untrusted file-sharing platforms.

  • Limited inspection of encrypted outbound traffic and insufficient threat-intel integration make it harder to detect AES-encrypted C2 traffic to MuddyWater infrastructure over HTTPS.

  • Inadequate visibility over RMM deployment (shadow or unmanaged tools) allows attackers to piggyback on legitimate remote-access pathways.

  • Gaps in EDR coverage, outdated signatures, or disabled security tooling on specific endpoints create blind spots for loader and backdoor activity.

  • Weak logging, retention, or correlation of Windows startup-folder changes, scheduled tasks, and registry modifications makes persistence harder to detect and remediate.


Susceptibility

Given high threat capability and only moderate control strength, overall susceptibility for a representative critical infrastructure or government organization targeted by MuddyWater is estimated at approximately 45–65 percent. This reflects the chance that, if the organization is contacted with a tailored spearphish during an active campaign, at least one endpoint will be successfully compromised and experience a harmful impact.

Probability the asset will be harmed is influenced by:


Exploitability: User-driven execution of RMM installers and loaders, combined with credential prompts and stealthy C2, means that exploitability is high once a user engages with the phishing link; an exploitability estimate in the 60–75 percent range is reasonable for exposed users lacking strong RMM and EDR governance.

Attack surface: The attack surface includes email users with access to file-sharing platforms, Windows endpoints that permit installation of RMM tools, and outward-facing network paths that allow HTTPS C2; across a typical organization in the cited sectors, 40–60 percent of endpoints may be in scope.

Exposure conditions: Exposure is most significant in organizations that rely on RMM, cloud services, and email attachments for daily operations and that have partner or cross-border ties; during periods of heightened geopolitical tension, staff may see more external communications, raising adequate exposure to 55–70 percent of relevant users.

Patch status: Traditional operating-system patching somewhat mitigates commodity exploit risk but offers limited protection against this primarily social-engineering and tool-abuse-driven campaign; patch posture may reduce the success of some secondary tooling but has only a modest impact (perhaps 10–20 percent improvement) on overall susceptibility without complementary controls.


Numerical Frequencies and Magnitudes

All values relating to actual dollar amounts are for example/speculative purposes only. Organizations would need to take into account their own asset values, control strength, telemetry, etc., and adjust numbers accordingly.


Loss Event Frequency (LEF)

1/year (estimated)

  • Justification: TEF is approximated at two relevant campaign contacts per year, with an estimated vulnerability (probability of harm per contact) of 0.5, yielding LEF ≈ 2 × 0.5 = 1 successful harmful event per year on average.

Vulnerability (probability of harm per contact): .5

  • Justification: Although controls exist, the combination of targeted spearphishing, RMM abuse, stealthy loaders, and social-engineering credential capture suggests that roughly half of meaningful contacts could lead to at least one materially harmful compromise in a typical but moderately mature environment.


Secondary Loss Event Frequency

0.5/year (estimated)

  • Justification: Not all primary compromise events result in secondary losses such as regulatory scrutiny, partner impacts, or broader business interruption, but credential theft and persistent access make secondary misuse reasonably likely in about 50 percent of primary events.


Loss Magnitude

Estimated range:

  • Min: $100,000

  • Most Likely: $750,000

  • Maximum: $5,000,000

Justification:

  • Minimum reflects a contained endpoint-level compromise requiring forensic investigation, reimaging, limited credential rotation, and modest operational disruption.

  • Most likely reflects broader credential resets, extended IR, potential limited data exposure, temporary disruption of specific services, and increased security spend.

  • Maximum reflects scenarios in which attackers access sensitive operational or governmental data, require large-scale remediation, and cause significant downtime of critical services, but still fall short of catastrophic national-level impact.


Secondary Loss Magnitude (SLM)

Estimated range:

  • Min: $250,000

  • Most Likely: $1,500,000

  • Maximum: $10,000,000

Justification:

  • Secondary losses include regulatory or contractual penalties, reputational damage that impacts funding or customer trust, extended service disruptions, and costs related to public communication and external investigations.

  • Maximum bound accounts for severe cases where exposed data or sustained espionage activities lead to significant business or mission impact, large-scale service interruption, or significant compliance actions.


Mapping, Controls, and Modeling


MITRE ATT&CK Mapping

Reconnaissance

T1591 – Gather Victim Org Information

Reference: “MuddyWater primarily targeted organizations in Israel, but also one in Egypt… Table 1 lists the victims by country and vertical.”

Resource Development

T1583 – Acquire Infrastructure

Reference: “MuddyWater… uses acquired infrastructure to host malware download locations and C&C servers.”

T1608 – Stage Capabilities

Reference: “Initial access is typically achieved through spearphishing emails… hosted on free file-sharing platforms such as OneHub, Egnyte, or Mega.”

T1587.001 – Develop Capabilities: Malware

Reference: “MuddyWater develops backdoors like MuddyViper and tools such as the Fooder loader, LP-Notes credential stealer, and the Blub and CE-Notes browser-data stealers.”

T1588.002 – Obtain Capabilities: Tool

Reference: “Once launched thus, Fooder has been used to deliver not only MuddyViper but also HackBrowserData, an open-source utility…”

Initial Access

T1566.002 – Phishing: Spearphishing Link

Reference: “MuddyWater initiated access through a spearphishing email containing a link to an installer for the Syncro remote monitoring and management (RMM) software.”

Execution

T1059.001 – Command-Line Interface: PowerShell

Reference: “In March and April 2023, MuddyWater… deploying a batch script that downloaded a PowerShell-based backdoor…” and “MuddyViper has the capability to open and execute PowerShell scripts.”

T1059.003 – Command-Line Interface: Windows Command Shell

Reference: “MuddyViper… launches a reverse shell using… C:\windows\system32\cmd.exe (command ID 301).”

T1559.001 – Inter-Process Communication: Component Object Model

Reference: “MuddyViper uses the ITaskService COM object to create a scheduled task for persistence.”

T1106 – Native API

Reference: “Fooder then loads the payload directly into memory using reflective techniques… using the WinCrypt API and the AES key,” and “MuddyViper uses the CreateProcess API to execute additional files and commands.”

T1204.001 – User Execution: Malicious Link

Reference: “Initial access is typically achieved through spearphishing emails… These links lead to the download of RMM tools including Atera, Level, PDQ, and SimpleHelp.”

Persistence

T1547.001 – Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Reference: “MuddyViper has two methods of establishing persistence… Its installation directory can be configured as a Windows Startup folder, by setting the following registry values…”

T1543.003 – Create or Modify System Process: Windows Service

Reference: “MuddyWater operators attempt to install RMM tools in %PROGRAMFILES%, which also includes creating a Windows service set to autostart.”

T1053 – Scheduled Task/Job

Reference: “A scheduled task named ManageOnDriveUpdater can launch MuddyViper from the path on each system start.”

Defense Evasion

T1134.001 – Access Token Manipulation: Token Impersonation/Theft

Reference: “Once executed, it attempts to duplicate the token of the specified process via the DuplicateTokenEx API, and then uses CreateProcessAsUserA to execute Fooder,” and “LP-Notes starts by searching for a process named taskhostw.exe… and then impersonating the security context of the process.”

T1140 – Deobfuscate/Decode Files or Information

Reference: “CE-Notes and LP-Notes both use a custom, addition-based routine for string decryption,” and “Fooder… decrypts the embedded payload… using the WinCrypt API and the AES key.”

T1620 – Reflective Code Loading

Reference: “Fooder… loads the payload directly into memory using reflective techniques, allowing it to execute without relying on standard system calls or writing to disk.”

T1497.003 – Virtualization/Sandbox Evasion: Time Based Evasion

Reference: “Another notable characteristic of Fooder is its frequent use of a custom delay function… combined with Sleep API calls… intended to delay execution in an attempt to hide malicious behavior from automated analysis systems.”

T1027.007 – Obfuscated Files or Information: Dynamic API Resolution

Reference: “Finally, to obscure the use of Windows API functions… LP-Notes dynamically resolves the API functions during the C runtime startup… hiding direct references to the API functions.”

T1134.002 – Access Token Manipulation: Create Process with Token

Reference: “Once executed, [the launcher] attempts to duplicate the token of the specified process via the DuplicateTokenEx API, and then uses CreateProcessAsUserA to execute Fooder.”

T1622 – Debugger Evasion

Reference: “MuddyViper searches for specific debugging tools, adjusting its behavior accordingly.”

T1070.009 – Indicator Removal: Clear Persistence

Reference: “Another command, with ID 900, aims to remove MuddyViper from the compromised machine and clear its persistence…”

T1070.004 – Indicator Removal: File Deletion

Reference: “MuddyViper can delete itself from the system, if instructed to uninstall itself.”

T1036 – Masquerading

Reference: “Note that several versions of Fooder masquerade as the Snake game – see the strings and mutexes highlighted…”

T1036.004 – Masquerading: Masquerade Task or Service

Reference: “MuddyViper can be persisted as a scheduled task named ManageOnDriveUpdater.”

T1112 – Modify Registry

Reference: “MuddyViper can modify the HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Startup and… Shell Folders\Startup registry keys…”

T1027.009 – Obfuscated Files or Information: Embedded Payloads

Reference: “Fooder then loads the payload directly into memory… hardcoded payload is decrypted… Fooder can extract an embedded, AES-encrypted payload.”

T1027.013 – Obfuscated Files or Information: Encrypted/Encoded File

Reference: “The hardcoded payload is decrypted using the WinCrypt API and the AES key,” and various components encrypt data with AES-CBC before storage or transmission.

Credential Access

T1555.003 – Credentials from Password Stores: Credentials from Web Browsers

Reference: “CE-Notes is a browser-data stealer… attempts to steal and decrypt the app-bound encryption key… of Chromium browsers,” and “Blub… steals user login data from Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera.”

T1056.002 – Input Capture: GUI Input Capture

Reference: “One of the commands listed in Table 2, with ID 805, displays a fake Windows Security dialog… prompting the user to fill in credentials,” and “The sole purpose of LP-Notes is to entice victims into submitting their credentials by displaying a fake Windows Security dialog.”

Discovery

T1082 – System Information Discovery

Reference: “MuddyViper enables the attackers to collect system information, execute files and shell commands…”

T1518.001 – Software Discovery: Security Software Discovery

Reference: “MuddyViper… keeps a lengthy list of 150+ process names… to be able to send detailed reports about the security tools detected in the compromised environment,” and “Blub checks for running processes associated with security solutions before executing its malicious payload.”

Collection

T1074.001 – Data Staged: Local Data Staging

Reference: “The encrypted data is stored on disk in C:\Users\Public\Downloads\ce-notes.txt for later retrieval,” and “LP-Notes then stores the encrypted credentials in a local file… lp-notes.txt.”

T1560.001 – Archive Collected Data: Archive via Utility

Reference: “MuddyViper then compresses the collected data (into a file named CacheDump.zip) and uploads it to the C&C server.”

Command and Control

T1573.001 – Encrypted Channel: Symmetric Cryptography

Reference: “Both directions of communication AES-CBC encrypt the data, using the CNG API with the key… and the IV 0.”

T1219 – Remote Access Software

Reference: “These links lead to the download of RMM tools including Atera, Level, PDQ, and SimpleHelp,” and “Following the initial compromise, the attackers installed an additional RMM tool, PDQ…”

T1071.001 – Application Layer Protocol: Web Protocols

Reference: “To communicate with its C&C server, MuddyViper uses HTTP GET requests… over port 443… configured to use SSL/TLS.”

T1105 – Ingress Tool Transfer

Reference: “MuddyViper has the capability to download additional payloads from its C&C server.”

T1001 – Data Obfuscation

Reference: “MuddyViper leverages HTTPS for C&C communications, using the Status header to hide a backdoor command ID in the server-to-client direction of the communication.”

T1090 – Proxy

Reference: “MuddyWater’s go socks5 reverse tunnels… relay communication between the compromised machine… and a hardcoded C&C server… allowing the attacker to route C&C traffic… through the compromised machine.”

Exfiltration

T1041 – Exfiltration Over C2 Channel

Reference: “MuddyViper then compresses the collected data… and uploads it to the C&C server,” and “Collected credentials… are exfiltrated to the C&C server.”

T1030 – Data Transfer Size Limits

Reference: “MuddyViper supports downloading/‌uploading files in chunks of limited size… using sleep time between each upload.”

Impact(Explicit destructive impact is not emphasized in the OSINT; activity is primarily espionage-focused, so no additional non-speculative Impact techniques are added.)


NIST 800-53 Affected Controls

AT-2(3) – Literacy Training and Awareness | Social Engineering and Mining

User deception via spearphishing RMM links and fake Windows Security dialogs.

Reference: “Initial access is typically achieved through spearphishing emails… These links lead to the download of RMM tools including Atera, Level, PDQ, and SimpleHelp,” and “One of the commands… displays a fake Windows Security dialog… prompting the user to fill in credentials.”This activity directly attacks the objective of AT-2(3) by exploiting users’ inability to recognize malicious links and credential prompts despite awareness training.

SI-3 – Malicious Code Protection

Evasion and execution of custom loaders, backdoors, and stealers.

Reference: “Among these tools is a custom Fooder loader designed to execute MuddyViper, a C/C++ backdoor,” and “The campaign also leverages credential stealers (CE Notes and LP Notes) and reverse tunneling tools (go socks5).”These components test and bypass SI-3 controls by using reflective loading, encryption, and delayed execution to avoid traditional signature- and behavior-based detection.

SI-4 – System Monitoring

Stealthy, encrypted C2 and reverse tunnels that challenge monitoring.

Reference: “To communicate with its C&C server, MuddyViper uses HTTP GET requests… over port 443… Both directions of communication AES-CBC encrypt the data,” and “go socks5 reverse tunnels… enabling attackers to bypass firewalls and Network Address Translation (NAT) mechanisms.”Encrypted C2 over standard web ports and tunneling through compromised hosts reduce the effectiveness of SI-4 monitoring unless deep inspection and anomaly detection are in place.

SC-7 – Boundary Protection

Use of reverse tunnels and cloud-hosted infrastructure to bypass network boundaries.

Reference: “MuddyWater’s go socks5 proxy is to relay communication… enabling attackers to bypass firewalls and Network Address Translation (NAT) mechanisms,” and the use of cloud providers (Amazon, DigitalOcean) as staging and C&C servers. These behaviors undermine SC-7 by turning internal systems into outbound proxies, effectively punching holes through perimeter defenses.

IA-5 – Authenticator Management

Theft and offline storage of browser and Windows credentials.

Reference: “CE-Notes… attempts to steal and decrypt the app-bound encryption key stored in the Local State file of Chromium browsers,” and “LP-Notes… stores the encrypted credentials in a local file – in this case C:\Users\Public\Downloads\lp-notes.txt.”These activities exploit weaknesses in credential storage and protection, attacking IA-5 objectives to safeguard authenticators and associated secrets.

AC-6 – Least Privilege

Token impersonation and use of RMM to gain elevated access.

Reference: “Once executed, [OsUpdater.exe] attempts to duplicate the token of the specified process via the DuplicateTokenEx API, and then uses CreateProcessAsUserA to execute Fooder,” and “LP-Notes… impersonating the security context of the process (via the ImpersonateLoggedOnUser API).”By duplicating and impersonating tokens, MuddyWater undermines AC-6, effectively escalating privileges and operating with broader access than intended for the compromised identity.

CM-8 – System Component Inventory

Abuse and covert deployment of remote monitoring and management tools.

Reference: “MuddyWater initiated access through a spearphishing email containing a link to an installer for the Syncro remote monitoring and management (RMM) software… Following the initial compromise, the attackers installed an additional RMM tool, PDQ.”The covert introduction and use of unauthorized or unmanaged RMM tools highlight deficiencies in CM-8, where organizations fail to maintain a complete, authorized inventory of software, especially powerful remote-access components.

IR-4 – Incident Handling

Need for coordinated response to multi-tool, multi-stage espionage intrusions.

Reference: “This campaign indicates an evolution in the operational maturity of MuddyWater… being timely, effective, and increasingly challenging to defend against,” and the extensive list of tools and IOCs.The complexity and persistence of the campaign stress IR-4, requiring organizations to have robust incident handling capabilities to detect, analyze, contain, and eradicate MuddyWater’s presence across loaders, backdoors, stealers, and tunnels.


Threat Model

Threat model from the original artifact
Threat model from the original artifact

Monitoring, Hunting, Response, and Reversing

Monitoring

Monitoring for this campaign should prioritize rich endpoint telemetry (EDR process trees, PowerShell and cmd-line logs, scheduled task and registry change auditing, RMM install/uninstall events), proxy and firewall logs for outbound HTTPS to known or suspicious C2 and file-sharing infrastructure, DNS for newly observed domains and atypical resolutions, identity logs for token impersonation and anomalous logons, cloud and RMM logs for new agents or policies, and secure email gateways for spearphishing links. Logging should be expanded to include detailed process command lines, script block logging, module loads, task creation, and startup-folder modifications on Windows servers and workstations, with sufficient retention to enable correlation across multi-month campaigns. Key indicators include installation or execution of RMM tools from non-standard sources, processes named like legitimate software (e.g., Snake/game, updater) executing reflective loaders, repeated fake Windows Security dialogs, creation of tasks named similarly to ManageOnDriveUpdater, local files such as ce-notes.txt or lp-notes.txt in public folders, and persistent HTTPS to a small set of external IPs/domains over port 443 with unusual user agents. Gaps often include a lack of centralized RMM logging, limited visibility into encrypted C2, insufficient monitoring of startup and task persistence, and weak linkage between phishing telemetry and endpoint behavior. Correlation logic should tie spearphishing delivery to subsequent RMM installs, loader execution, persistence events, credential-stealer file creation, and new outbound tunnels, with thresholds tuned to alert on small chains of related events rather than single low-signal indicators. Dashboards should surface RMM usage anomalies, new scheduled tasks and startup entries, high-risk outbound destinations by sector and geography, and counts of credential-stealer-like file creations, with trend views across months. Validation should use replay or simulation of RMM installs, Fooder/MuddyViper-style persistence patterns, and benign test tunnels to confirm that alerts fire as designed without overwhelming operators.


Hunting

Hunting should start from hypotheses such as “MuddyWater-style RMM abuse is present in our environment,” “custom loaders and backdoors are persisting via startup folders or scheduled tasks,” and “browser and Windows credentials are being staged locally then exfiltrated over encrypted C2.” Hunters should leverage endpoint telemetry (process creation, script execution, scheduled tasks, registry changes, file creation in public downloads and appdata paths), network/proxy and DNS logs (HTTPS to rare IPs/domains, especially cloud hosts and suspected staging servers, plus anomalous user agents or small, periodic encrypted beacons), identity logs (logon anomalies associated with RMM or token impersonation), and email logs (targeted spearphishing with file-sharing or RMM links). Detection logic can include chains such as email with external RMM link > new RMM process from user profile or downloads > execution of unusual binaries that spawn cmd/PowerShell > creation of suspicious scheduled tasks or startup entries > subsequent outbound HTTPS with atypical destinations and periodic patterns, along with searches for known file names or patterns reminiscent of CE-Notes/LP-Notes/Blub staging behavior. Noise-to-signal must be managed by scoping hunts to high-value hosts and accounts, focusing on newly introduced RMM agents and tasks rather than all baseline activity, and whitelisting known-good administrative behavior, with hunts tuned to identify small clusters of related anomalies rather than single generic events like every PowerShell invocation.


Response

Response should prioritize collection and preservation of detailed EDR logs, Windows event logs (security, Sysmon if present, task scheduler, application), email gateway logs, proxy/DNS/firewall records, and any RMM and identity provider logs for affected accounts and hosts, focusing on timelines around spearphishing delivery and suspected execution. Expected artifacts include suspicious RMM installers, Fooder-like loaders, and MuddyViper binaries in download or temporary paths, scheduled tasks and startup-folder entries linked to unusual executables, local staging files such as ce-notes.txt, lp-notes.txt, or similar, and traces of encrypted HTTPS C2 and reverse tunnels. Anti-forensic behavior may include self-deletion of binaries, removal or modification of persistence keys, and use of time-based delays to blur event sequences, so responders should rely on central logging where possible. Reconstruction of events should piece together phishing emails, RMM or loader execution, persistence setup, credential harvesting, and subsequent lateral movement or data exfiltration, feeding DFIR findings (number and type of accounts compromised, systems touched, data accessed) into FAIR loss estimates for primary and secondary impacts. Likely containment includes disabling and uninstalling unauthorized RMM agents, blocking outbound C2 endpoints, removing scheduled tasks and startup entries, resetting or revoking affected credentials, and isolating or reimaging high-risk endpoints. Priority artifacts are binaries associated with loaders/backdoors/stealers, scheduled-task XMLs, registry snapshots of startup locations, credential-staging files, and complete packet captures or proxy logs around suspected C2 sessions. Telemetry requirements include a high-fidelity endpoint and network logs with sufficient retention to cover the campaign window. At the same time, IR gaps often involve weak RMM governance, limited task/startup auditing, and incomplete credential-use tracking. DFIR validation should use controlled replays or lab reconstruction of the attack chain to confirm that eradication steps are practical and that no residual persistence or C2 remains.


Reverse Engineering

Reverse engineering efforts should focus on characterizing loader behavior such as Fooder’s decryption routines, reflective loading of embedded AES-encrypted payloads, process-token manipulation, and potential masquerading as benign applications (e.g., games or updaters), capturing how it hands off to MuddyViper or other tools. Analysts should document evasion techniques, including custom delay loops, Sleep-based timing, sandbox/VM checks, and API resolution strategies that hinder static and dynamic analysis, as well as how persistence is delegated to MuddyViper or other components via startup folders and scheduled tasks. Indicators to extract include file names, PDB paths, mutexes, command-line artifacts, URLs and IPs, AES keys or key-derivation routines, user agents, and characteristic registry and filesystem behaviors that can be transformed into detection signatures. Dynamic and static hooks should include monitoring of key APIs (CreateProcess*, DuplicateTokenEx, CredUIPromptForWindowsCredentialsW, LogonUserW, WinHTTP, crypto APIs, task scheduler COM interfaces), as well as filesystem and registry activity tied to startup and task configuration. Expected artifacts are decrypted payloads, configuration blocks (C2 addresses, keys, timing parameters), logs or status messages sent to C2, and staged credential or browser data. Additional suggestions include building YARA rules around code and string patterns, comparing variants to previously documented MuddyWater tools to track evolution, and using sandbox automation to generate behavior-based IOCs suitable for SOC consumption.


CTI

CTI teams should use this campaign to refine PIRs around whether Iran-aligned actors are targeting their sectors, geographies, or key partners, how often spearphish-and-RMM campaigns recur, which TTPs (spearphishing links, RMM abuse, reflective loaders, browser/credential stealers, go socks5 tunnels) remain stable, and which assets (Windows admin accounts, RMM consoles, high-value endpoints) are most consistently pursued. SIR work should close IOC gaps by enriching and normalizing IPs, domains, URLs, and hashes already known from vendor reporting, identifying needs for additional malware samples and deeper infrastructure mapping, clarifying attribution overlaps with other Iran-nexus groups, and specifying which internal logs (email, RMM, EDR, DNS, proxy) are required to validate suspected activity. Collection plans should emphasize continuous OSINT monitoring of vendor blogs and sandboxes for new MuddyWater tooling, ingestion of internal telemetry into threat-intel platforms, collaboration with ISACs/ISAOs for sector-specific indicators, and use of malware repositories and network/endpoint data sources to track new variants. Mapping and analysis should cluster related infrastructure and tools into coherent campaigns, align behaviors to ATT&CK for consistent tagging, compare with historical MuddyWater and Lyceum activity, and assess confidence in clustering and attribution while flagging emerging capabilities such as new loaders or persistence patterns; these findings should be used to confirm or adjust existing hypotheses about the actor’s focus, tradecraft, and likely future evolution.


GRC and Testing

Governance

Governance should reinforce policy adequacy around RMM control, email security, endpoint hardening, and credential management, ensuring policies explicitly prohibit unauthorized RMM installation, require verification of file-sharing links, and mandate privileged-account protections aligned to the threat. Oversight functions should require periodic review of RMM inventories, startup and scheduled-task governance, and executive reporting on spearphishing attempts, credential-harvesting detections, and outbound encrypted C2 trends. RA, PM, and PL family governance documents should be updated to incorporate explicit APT considerations, risk-scenario mapping, and role definitions for monitoring persistence mechanisms across Windows environments. The risk register should add or update entries for unauthorized RMM deployment, reflective-loader evasion, credential harvesting, and covert C2 tunnels, incorporating FAIR-informed loss ranges to support prioritization. Board and executive communication should summarize threat recurrence, targeted sectors, susceptibility factors, and expected financial exposure, while clarifying required investment in detection tooling, RMM governance, and incident-response readiness.


Audit and Offensive Security Testing

Audit should assess whether current RMM governance, phishing controls, endpoint logging, credential-protection mechanisms, and startup/task auditing processes are implemented as documented, and identify evidence gaps, such as missing RMM inventories, insufficient script-block logging, and incomplete tracking of outbound encrypted traffic. Controls should be validated for their ability to detect or block reflective loaders, fake Windows credential prompts, unauthorized scheduled tasks, and browser-credential harvesting. Compliance obligations tied to access control, logging, and malicious-code protection should be evaluated for adherence, particularly in sectors regulated for critical infrastructure. Red team exercises should replicate spearphishing links that deliver benign RMM installers, followed by loader-style persistence to test user behavior and control response. In contrast, purple team sessions validate the detection of credential-stealer artifacts and C2 tunnels. Pen testing scope should include RMM abuse pathways, privilege escalation via token impersonation, and persistence mechanisms. Exploit reproduction should safely mimic Fooder-like reflective loading and MuddyViper persistence without deploying harmful malware, and control validation should confirm detection, alerting, and containment across the chain.


Awareness Training

Awareness training should emphasize social-engineering patterns central to this campaign, especially spearphishing with file-sharing links, deceptive RMM installers, and fake Windows Security dialogs requesting credentials. Training should address human failure modes such as conditioned clicking, trust in familiar tools, and misunderstanding of RMM usage, with adjustments for administrators (RMM scrutiny), finance and customer-facing staff (phishing vigilance), and executives (high-value credential risk). Employees should learn to recognize behavioral indicators such as unexpected credential prompts, unfamiliar RMM installations, and files appearing in public folders. Phishing simulations should mirror the attacker’s style, using realistic but safe RMM-link lures to test user susceptibility. Communication guidelines should reinforce slow-down/verify behaviors when interacting with external links, RMM-related messages, or credential prompts. Reinforcement cycles should use short, recurring modules and measure effectiveness by reducing click-through rates, improving reporting, and validating reductions in simulated-phish success across targeted roles.


Indicators of Compromise

From the original artifact:

3.95.7[.]142

35.175.224[.]64

51.16.209[.]105

62.106.66[.]112

157.20.182[.]45

161.35.172[.]55

167.99.224[.]13

194.11.246[.]78

194.11.246[.]101

206.71.149[.]51

212.232.22[.]136

OsUpdater.exe

Blub.exe

Blub.exe

Blub.exe

stealer.exe

7d1e9726b5YZPYc.dll

fe197add74IVcQn.exe

vmsvc.exe

3a70e4c8c2IVcQn.exe

3a70e4c8c2IVcQn.exe

Dsync-es.exe

App_chek.exe

steam.exe

antimage.exe

wtsapi32.dll

msi.dll

WinWin.exe

20241118_223247_Launcher.exe

Launcher.dll

Launcher.exe

vcruntime140_1.dll

Launcher.exe

ncrypt.dll

WinWin(persist).exe

0bff183a39ruQsY.dll

20d188afdcpfLFq.exe

dttcodexgigas.exe

7295be2b1fHxjyf.exe

fa54125dc8ZpaNJ.exe

20d188afdcWgOQB.exe

bd34a33f5bHOVby.exe

re.exe

bd34a33f5bHOVby.exe

20d188afdcpfLFq.exe

1110254b63WfTEa.exe

FMAPP.dll

bd34a33f5bJeJOf.exe

bd34a33f5bJeJOf.exe

7295be2b1fHxjyf.exe

re.exe

8525e604dfKuDNr.exe

bd34a33f5bJeJOf.exe

20d188afdcpfLFq.exe

main.exe

504f53ca8esoLmG.dll

20d188afdcpfLFq.exe

66f3e097e4tnyHR.exe

fa54125dc8ZpaNJ.exe

fa54125dc8ZpaNJ.exe

7295be2b1fAzMZI.exe

20d188afdcpfLFq.exe

ESETGO.exe

20d188afdcpfLFq.exe

bd34a33f5bHOVby.exe

66f3e097e4tnyHR.exe

Revoke.dll

66f3e097e4tnyHR.exe

main.exe

7295be2b1fAzMZI.exe

20d188afdcpfLFq.exe

AppVs.exe

76632910CF67697BF5D7285FAE38BFCF438EC082

1723D5EA7185D2E339FA9529D245DAA5D5C9A932

69B097D8A3205605506E6C1CC3C13B71091CB519

B7A8F09CB5FF8A33653988FFBA585118ACF24C13

B8997526E4781A6A1479690E30072F38E091899D

8E21DE54638A79D8489C59D958B23FE22E90944A

CD47420F5CE408D95C98306D78B977CDA0400C8F

C1299E8C9A8567A9C292157F3ED65B818AA78900

29CDA06701F9A9C0A6791775C3EB70F5B52BBEFF

8F3ED626E7B929450E36E97BA5539C8371DF0EF8

007B5CD6D6ACF972F7743F79E23CAB9BB2ECBEE3

CD36F93DBC4C718930593D8F029EFDCAA52B619B

47B70C47BEB33E88B4197D6AF1B768230E51B067

D46900D78AE036967E0B37F9EC6A8000131AE604

0657D0B0610618886DDD74C3D0A1D582CDD24863

2939FD218E0145D730BD94AA1C76386A5259EACE

3BC6502A55A4D5D29132DA4D9943E154A810CC83

7950296331802188EB99E232E2C383CB9FDD5D7D

8580824FE14DB158388102B16C1C79DFBBA36083

B48B93B4EB69D01588D371356EDE614C5E7378DE

EA8A1C2382FF765709D7F78EF60482598E4C0DEB

EAF4BAFC62170C9FCA1F6B591848883DBF97F93D

F5EFBA6CCBA5A6AD6C3AFA928C0E5EAA44597411

13DA612D75DC5268F5235F5BACE6D8F0DB0091FF

25361183DE63F296BA71B6FCF0725E022B3C989A

0E9A4892CFA1C9065B36D8F2E164E28609A8CF5D

2B09241CA025BDC4455E9F6BA6009E2F27C08EDF

2E9BE23CDD8152DB6CD1A54E001C4EA82FF6F1C6

45FA7DE711FEA1F8D1E348E87834246C455DD2ED

4E0EF2386980639FC5355FD68DAFF54EB2AD622E

4E9529BA4A6E42D6278D37E3FDEE9E1D991CEBE0

50C6D4A2AD16A231CF11C43F3BBC868D90E20D25

52009F36058337B6401DA0A0F4885A0C185F0520

535882B6EDAB29247E035236A84CA510FB1E0854

544CE18E4C1F1B288DEE6018DFCF4E4D4A315F7A

54EBC125039CC83E4682CA44DD592534562B25C3

5A08150C1DC17E9F691296F0A577C2EC9BA8028C

5D1E61DA8083C41FF1FC23A1222A4A88B43A4E9B

6532E0437C8913FA418F1EE258561B15BBEE9052

6CA41565844118385B345A39A9B79E0BBC0DD338

6FC50A99AAE1D6C40111632D4F49BD19F9794CF6

826CFF5D85713CE4B2F3C15AB53A84E6848D2E2C

87ADD79C7C8335447113EE0D413F52AE2B17F066

93055115559219BE8441880597C533381B99213B

97C3376AB551E899F347CC9DDF49EA01DB2D7903

99FAD0862E2E8D363F3E18952FD92E09493CC27D

A101CBCCD950AA36FC3B40C3C331FDE43ACDBBD2

A227C0A4425E24268B759A740231676A589CA4E6

A997A7AAE727D2C12CCE80FE3607317775A4DF3E

B0271CA76052EC340014D7BCCDBD69325A4E60F2

B0CD4F5DF192BFFE6500E44B80C28505DFD9CA66

B16E7D56A8DC0FF6B3AFD797E1EAB22B20DFFB39

D49979D0063B28BD73390481E6AE642C00CE0791

D518F5C648AB64B390A29AA2858219318CFC556A

DF223D653F761ED55F9C0774F1DBF545FD741F86

DF8FC5213AA11EE445EAD1AAE17A826E7D51A743

E02DD79A8CAED662969F6D5D0792F2CB283116E8

E8F4EA3857EF5FDFEC1A2063D707609251F207DB

F26CAE9E79871DF3A47FA61A755DC028C18451FC

FF09608790077E1BA52C03D9390E0805189ADAD7


bottom of page