Recent OTX pulses indicate a concerning trend where threat actors are migrating C2 infrastructure to immutable blockchains (Solana, Ethereum) and popular messaging platforms (Telegram) to withstand takedowns. Three distinct campaigns were observed:
- GlassWorm: A supply chain attack targeting developers, using the Solana blockchain to fetch payloads and install surveillance extensions.
- Rebex-based Telegram RAT: A campaign specifically targeting Vietnamese victims via trojanized CHM (Compiled HTML) files, utilizing Python loaders and XOR encryption.
- EtherRAT: A North Korean APT-linked Node.js backdoor targeting the retail and software sectors, using "EtherHiding" (smart contracts) for C2 infrastructure.
Collectively, these threats demonstrate a shift toward "living-off-the-chain" infrastructure and sophisticated multi-stage loaders designed to bypass traditional network defenses.
Threat Actor / Malware Profile
| Malware | Distribution | Payload Behavior | C2 & Comms | Persistence | Techniques |
|---|---|---|---|---|---|
| GlassWorm | Compromised code repositories/package managers. | Installs fake browser extension & RAT. Steals crypto/dev creds. | Uses Solana blockchain for payload retrieval; covert C2. | Registry modifications (Browser extensions). | Supply Chain Compromise, Blockchain Abuse. |
| Rebex Telegram RAT | Trojanized CV documents (.CHM). | Python loader spawns C++ DLLs with XOR encryption. | Telegram API. | Shell hijacking, Scheduled Tasks. | CHM Infection, Multi-stage payload, Python Loader. |
| EtherRAT (NK APT) | IT Support Scams / Phishing. | Node.js backdoor; arbitrary command execution. | Ethereum Smart Contracts (EtherHiding); CDN-like beaconing. | Node.js installation folders. | Host Fingerprinting, CIS Language Check, Smart Contract Abuse. |
IOC Analysis
The provided indicators consist primarily of file hashes for the multi-stage payloads of the Telegram RAT and network infrastructure (domains) associated with the EtherRAT campaign.
- File Hashes (Pulse 2): A cluster of SHA256, MD5, and SHA1 hashes corresponding to the CHM dropper, Python loader, and encrypted C++ payloads.
- Domains (Pulse 3): A list of domains (
o-parana.com,rpc.payload.de, etc.) used for CDN-like beaconing and Ethereum RPC interaction.
Operational Guidance:
- SOAR/EDR: Import the SHA256 hashes into EDR quarantine lists immediately. The Pulse 2 hashes include the initial dropper and subsequent payloads.
- Network Security: Block the listed domains at the proxy/DNS firewall level. Note that
rpc.payload.demimics a legitimate RPC endpoint but is part of the EtherHiding infrastructure. - Threat Hunting: Use the hashes to hunt for artifacts on developer workstations and retail endpoints.
Detection Engineering
Sigma Rules
---
title: Potential GlassWorm Browser Extension Installation
id: 441f8a9a-1c2b-4f3d-8e9f-1a2b3c4d5e6f
description: Detects suspicious registry modifications associated with GlassWorm fake browser extension installation in non-standard paths.
status: experimental
date: 2026/04/30
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/662fa9e1a4e0e96d0e8b4567
tags:
- attack.persistence
- attack.t1547.001
logsource:
product: windows
registry:
- add
detection:
selection:
TargetObject|contains:
- 'Software\\Google\\Chrome\\Extensions'
- 'Software\\Mozilla\\Firefox\\Extensions'
Details|contains:
- '\\AppData\\Local\\Temp'
- '\\AppData\\Roaming\\'
filter:
Details|contains: 'chrome-extension://'
condition: selection and not filter
falsepositives:
- Legitimate developer sideloading of extensions
level: high
---
title: Rebex Telegram RAT CHM Infection Chain
id: 552g9b0b-2d3c-5g4e-9f0g-2b3c4d5e6f7a
description: Detects hh.exe (CHM viewer) spawning a Python interpreter, characteristic of the Rebex Telegram RAT campaign.
status: experimental
date: 2026/04/30
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/662fa9e1a4e0e96d0e8b4568
tags:
- attack.initial_access
- attack.t1566.001
logsource:
category: process_creation
detection:
selection_parent:
ParentImage|endswith: '\\hh.exe'
selection_child:
Image|endswith:
- '\\python.exe'
- '\\python3.exe'
- '\\pwsh.exe'
condition: all of selection_*
falsepositives:
- Legitimate documentation opening scripts
level: critical
---
title: EtherRAT CDN-like Beaconing to Suspicious Domains
id: 663h0c1c-3e4d-6h5f-0g1h-3c4d5e6f7a8b
description: Detects processes connecting to domains associated with EtherRAT C2 infrastructure.
status: experimental
date: 2026/04/30
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/662fa9e1a4e0e96d0e8b4569
tags:
- attack.command_and_control
- attack.t1071.001
logsource:
category: network_connection
detection:
selection_domains:
Initiated|equals: 'true'
DestinationHostname|contains:
- 'o-parana.com'
- 'rpc.payload.de'
- 'jariosos.com'
- 'hayesmed.com'
- 'regancontrols.com'
- 'salinasrent.com'
- 'justtalken.com'
- 'mebeliotmasiv.com'
condition: selection_domains
falsepositives:
- Rare (domains are likely sinkholed or specific C2)
level: high
KQL (Microsoft Sentinel)
// Hunt for EtherRAT Network Connections
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemoteUrl has_any (
"o-parana.com", "rpc.payload.de", "jariosos.com", "hayesmed.com",
"regancontrols.com", "salinasrent.com", "justtalken.com", "mebeliotmasiv.com"
)
| project Timestamp, DeviceName, InitiatingProcessFileName, RemoteUrl, RemotePort
;
// Hunt for Rebex Telegram RAT File Artifacts
DeviceFileEvents
| where Timestamp > ago(7d)
| where SHA256 in (
"ced7fe9c5ec508216e6dd9a59d2d5193a58bdbac5f41a38ea97dd5c7fceef7a5",
"1323278360d41a74ab09d310f08902087ff2798d1eda99be65d07c1b1123a25c",
"67b51a73c72f39b9cf41dd35eb22b369713ab2e576641b40b9089ebc9d4a1fb2",
"6db64b44305ff125f729713d7ff516e84e4ca38504a2ab0571eb19597f49feee"
)
| project Timestamp, DeviceName, FileName, FolderPath, SHA256
;
// Hunt for GlassWorm CHM Spawning Python
DeviceProcessEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName == "hh.exe"
| where FileName in ("python.exe", "python3.exe")
| project Timestamp, DeviceName, InitiatingProcessCommandLine, FileName, CommandLine
PowerShell Hunt Script
# IOC Hunt for Rebex Telegram RAT and Persistence Mechanisms
Write-Host "[*] Starting IOC Hunt for Rebex RAT and GlassWorm..." -ForegroundColor Cyan
# 1. Check for File Hashes (Rebex Payloads)
$hashes = @( "ced7fe9c5ec508216e6dd9a59d2d5193a58bdbac5f41a38ea97dd5c7fceef7a5",
"1323278360d41a74ab09d310f08902087ff2798d1eda99be65d07c1b1123a25c",
"67b51a73c72f39b9cf41dd35eb22b369713ab2e576641b40b9089ebc9d4a1fb2",
"6db64b44305ff125f729713d7ff516e84e4ca38504a2ab0571eb19597f49feee")
$drives = @("C:")
Write-Host "[+] Scanning for malicious file hashes..." -ForegroundColor Yellow
foreach ($hash in $hashes) {
$result = Get-ChildItem -Path $drives -Recurse -ErrorAction SilentlyContinue |
Get-FileHash -Algorithm SHA256 -ErrorAction SilentlyContinue |
Where-Object { $_.Hash -eq $hash }
if ($result) {
Write-Host "[!] MALICIOUS FILE FOUND: $($result.Path)" -ForegroundColor Red
}
}
# 2. Check for Suspicious Scheduled Tasks (Persistence)
Write-Host "[+] Checking for suspicious scheduled tasks..." -ForegroundColor Yellow
$suspiciousTasks = Get-ScheduledTask | Where-Object {
$_.Actions.Execute -like "*python*" -or
$_.Actions.Execute -like "*cmd*" -and
$_.TaskName -notmatch "Microsoft|Windows|Google|Adobe"
}
if ($suspiciousTasks) {
Write-Host "[!] Potential suspicious tasks found:" -ForegroundColor Red
$suspiciousTasks | Select-Object TaskName, State, LastRunTime | Format-Table
}
Write-Host "[*] Hunt Complete." -ForegroundColor Green
---
# Response Priorities
Immediate (0-12 hours)
- Network Blocking: Block all domains listed in the EtherRAT pulse at the firewall and proxy level.
- Isolation: Identify and isolate any endpoints that have generated alerts for the SHA256 hashes associated with the Telegram RAT.
- Process Termination: Kill any instances of
hh.exespawningpython.exeimmediately.
Within 24 Hours
- Credential Verification: For GlassWorm infections, force a password reset for all development and cryptocurrency wallet credentials on affected systems.
- Browser Forensics: Scan developer workstations for unauthorized browser extensions (GlassWorm) and remove them.
- Task Analysis: Review all non-Microsoft scheduled tasks for signs of the Shell hijacking persistence mechanism used by the Telegram RAT.
Within 1 Week
- Software Restriction: Implement Application Control policies to block the execution of CHM files (
.chm) from the internet or email attachments. - Supply Chain Audit: Audit code repositories and package managers for GlassWorm indicators or unauthorized dependency changes.
- Blockchain Monitoring: Configure network monitoring to detect or block RPC calls to public Ethereum/Solana nodes from non-approved developer workstations.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.