Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomat... #1662
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This blog presents a detailed reverse engineering and campaign analysis of AshTag, a new modular .NET malware suite used by Hamas‑affiliated APT Ashen Lepus (aka WIRTE) for long‑running cyber‑espionage against Middle Eastern governmental and diplomatic entities. It explains how the full chain works end‑to‑end: social engineering, loader design, staged HTML‑embedded payloads, C2 crypto/protocol, modular backdoor internals, and hands‑on exfiltration.
Victimology, lures and initi...
🔧 Technical Details
DLL side-loading with decoy documents
The campaign abuses Windows DLL search order: an attacker ships a legitimate‑looking EXE (named as a document) plus a malicious DLL named after a trusted system library (e.g.,
netutils.dll,srvcli.dll,dwampi.dll,wtsapi32.dll) in the same directory. When the user executes the EXE, Windows loads the local DLL instead of the real one. The DLL performs malicious actions (e.g., loading subsequent stages) while the EXE opens a decoy PDF (Document.pdf) so the victim sees normal content. This general technique works for any signed or trusted executable that imports a DLL by name: place a fake DLL with that name in the EXE’s directory and ensure the code triggers during process initialization or exported function calls.Multi-stage HTML-embedded payload delivery
Payloads are hidden inside benign‑looking HTML responses from attacker C2. The first loader i...
🤖 Agent Actions
Summary:
No tests were run (not applicable).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.