Recent OTX pulses indicate a convergence of sophisticated delivery mechanisms and legacy exploitation techniques aimed at credential harvesting. The threat landscape is dominated by two distinct but high-impact campaigns:
-
TroyDen's "Lure Factory": A mass-campaign leveraging AI-generated biological taxonomy to mask malicious packages on GitHub. This campaign distributes LuaJIT-wrapped payloads of Redline and LummaStealer, specifically targeting developers and gamers. The use of AI allows for rapid generation of unique, benign-sounding repository names to bypass reputation-based filtering.
-
Mr_Rot13's cPanel Campaigns: An elusive threat actor active for six years is exploiting a critical authentication bypass (CVE-2026-41940) in cPanel. This campaign targets government and defense sectors in Southeast Asia, deploying Go-based installers that establish SSH backdoors and webshells for long-term persistence.
-
Lumma Stealer (Remus Variant): Following the takedown of core Lumma infrastructure, a 64-bit variant named "Remus" has emerged utilizing "EtherHiding"—using the blockchain for C2 communication—to evade traditional network detection.
Collective Objective: Credential theft (browser cookies, crypto wallets, SSH keys) and establishing persistent access on Linux and Windows endpoints.
Threat Actor / Malware Profile
TroyDen
- Malware Families: LuaJIT, Redline, LummaStealer.
- Distribution: Supply chain attack via GitHub repositories. Uses AI to generate package names based on obscure biological/medical terms.
- Payload Behavior: Two-component design. Initial downloader retrieves the LuaJIT-based infostealer.
- C2 Communication: Standard HTTP/HTTPS to hardcoded IP infrastructure.
Mr_Rot13
- Malware Families: Filemanager (RAT), Cpanel-Python (Go-based).
- Distribution: Exploitation of CVE-2026-41940 (cPanel Authentication Bypass).
- Payload Behavior: Drops malicious JavaScript for credential harvesting, plants authorized SSH keys, and deploys PHP webshells.
- Persistence: SSH keys and scheduled tasks/systemd services on Linux.
Remus (Lumma Stealer v2)
- Malware Families: Lumma Stealer (64-bit).
- Distribution: Likely延续续 previous Lumma vectors (Steam cracks, fake browsers) but enhanced with EtherHiding.
- Payload Behavior: 64-bit infostealer capable of bypassing Application-Bound Encryption.
- C2 Communication: EtherHiding (Blockchain-based C2) and fallback to standard domains.
IOC Analysis
The provided IOCs include:
- IPv4 Addresses (TroyDen): C2 servers for the LuaJIT/Redline payload. High confidence of malicious intent.
- Domains (Mr_Rot13 & Remus): Used for C2 communication, payload delivery, and potentially Telegram exfiltration endpoints.
- CVE-2026-41940: A critical vulnerability identifier specific to cPanel.
- File Hashes (MD5/SHA256): Known malicious samples for the Go-based installer (Mr_Rot13) and the Remus stealer.
Operationalization:
- SOC/EDR: Block the listed IPs and Domains immediately at the firewall and proxy.
- Vulnerability Management: Scan for cPanel instances vulnerable to CVE-2026-41940.
- Threat Hunting: Use the file hashes to hunt for dropped payloads in temp directories or user downloads.
Detection Engineering
date: 2026/05/13
description: Detects execution of LuaJIT often associated with TroyDen Redline/Lumma delivery
detection:
selection:
Image|endswith:
- '\luajit.exe'
- '\luajit'
ParentImage|endswith:
- '\powershell.exe'
- '\cmd.exe'
- '\python.exe'
condition: selection
falsepositives:
- Legitimate developer use of LuaJIT
level: high
status: stable
tags:
- attack.execution
- attack.t1059.001
---
date: 2026/05/13
description: Detects potential cPanel exploitation via webshell creation or modification associated with Mr_Rot13
detection:
selection_file:
TargetFilename|contains:
- '/public_html/'
- '/www/'
Image|endswith:
- '/httpd'
- '/apache2'
selection_keyword:
TargetFilename|contains:
- 'config.php'
- 'index.php.bak'
condition: 1 of selection_*
falsepositives:
- Legitimate web admin activity
level: high
status: stable
tags:
- attack.persistence
- attack.t1505.003
---
date: 2026/05/13
description: Detects network connections to Remus/Lumma C2 domains and EtherHiding infrastructure
detection:
selection_ip:
DestinationIp|contains:
- '89.169.12.241'
- '213.176.73'
- '217.119.129'
selection_domain:
DestinationHostname|endswith:
- 'forestoaker.com'
- 'krondez.com'
- 'baxe.pics'
- 'vinte.online'
- 'coox.live'
- 'remnane.biz'
- 'parky.pics'
condition: 1 of selection_
falsepositives:
- Rare, unless network allows access to specific sinkholes
level: critical
status: stable
tags:
- attack.command_and_control
- attack.t1071.001
kql// Hunt for TroyDen and Remus C2 Traffic
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemoteIP has_any ("89.169.12.241", "213.176.73.80", "213.176.73.130", "217.119.129.121", "217.119.129.76", "94.156.154.6", "213.176.73.159", "217.119.129.118")
or RemoteUrl has_any ("forestoaker.com", "krondez.com", "baxe.pics", "vinte.online", "coox.live", "remnane.biz", "parky.pics", "wrned.com", "wpsock.com")
| project Timestamp, DeviceName, InitiatingProcessAccountName, RemoteIP, RemoteUrl, RemotePort
// Hunt for Mr_Rot13 File Hashes on Linux/Windows endpoints
DeviceFileEvents
| where Timestamp > ago(30d)
| where SHA256 in ("b037fa1dd769891b538d9ca26131890c93e3458eec965354bdebe50d04a5b3d")
or MD5 has_any ("02a5990b11293236e01f174f5999df20", "22613c952459e65ce09fb6b5c1c03d47", "2286f126ab4740ccf2595ad1fa0c615c", "29222f5e73dd10088fcf1204aa21f87f", "2de27ca8d97124adaf604b18161a441e")
| project Timestamp, DeviceName, FileName, FolderPath, SHA256, MD5, InitiatingProcessAccountName
powershell# IOC Hunter for TroyDen and Remus
# Checks for the presence of specific file hashes and network connections
$MaliciousSHA256 = @(
"b037fa1dd769891b538d9ca26131890c93e3458eec965354bdebe50d04a5b3d"
)
$MaliciousDomains = @(
"forestoaker.com", "krondez.com", "baxe.pics", "vinte.online",
"coox.live", "remnane.biz", "parky.pics", "wrned.com", "wpsock.com"
)
Write-Host "[*] Hunting for Remus/Lumma File Artifacts..."
# Scan user download directories and temp folders
$PathsToScan = @("C:\Users\*\Downloads\", "C:\Windows\Temp\", "C:\ProgramData\")
foreach ($path in $PathsToScan) {
if (Test-Path $path) {
Get-ChildItem -Path $path -Recurse -ErrorAction SilentlyContinue | ForEach-Object {
$hash = (Get-FileHash -Path $_.FullName -Algorithm SHA256 -ErrorAction SilentlyContinue).Hash
if ($MaliciousSHA256 -contains $hash) {
Write-Host "[!] MALICIOUS FILE FOUND: $($_.FullName) | Hash: $hash" -ForegroundColor Red
}
}
}
}
Write-Host "[*] Checking DNS Cache for C2 Domains..."
$DnsCache = Get-DnsClientCache -ErrorAction SilentlyContinue
if ($DnsCache) {
foreach ($entry in $DnsCache) {
if ($MaliciousDomains -contains $entry.Name) {
Write-Host "[!] SUSPICIOUS DNS ENTRY: $($entry.Name) -> $($entry.Data)" -ForegroundColor Yellow
}
}
}
Write-Host "[*] Hunt Complete."
# Response Priorities
**Immediate (0-24 hours):**
* **Block Indicators:** Implement immediate blocks on all listed IPs and Domains at perimeter firewalls and proxies.
* **Patch CVE-2026-41940:** Identify and patch all cPanel instances immediately. Restrict cPanel access to VPN-only if patching is delayed.
* **Hunt for Webshells:** Scan web servers (specifically `/public_html` and `/wp-content`) for recently modified PHP files matching the Mr_Rot13 profile.
**24-48 hours:**
* **Credential Audit:** Given the prevalence of Redline and Lumma, force password resets for privileged accounts (DevOps, SysAdmins) and rotate SSH keys on Linux servers compromised by Mr_Rot13.
* **GitHub Supply Chain Audit:** Audit developer workstations for cloned repositories matching the TroyDen AI-lure pattern (obscure biological names).
**1 Week:**
* **Architecture Hardening:** Implement Application Boundaries (AppLocker) to prevent execution of LuaJIT binaries from user profile directories.
* **Network Segmentation:** Ensure cPanel management interfaces are not accessible from the public internet.
* **Developer Training:** Educate development teams on the risks of downloading unverified packages from GitHub.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.