‘Librarian Ghouls’ APT Group Targets Organizations

'Librarian Ghouls' APT Group Targets Organizations

The Advanced Persistent Threat (APT) group known as “Librarian Ghouls,” also tracked as “Rare Werewolf” and “Rezet,” has been actively targeting organizations across Russia and the Commonwealth of Independent States (CIS) with highly sophisticated malware deployment campaigns.

Active through May 2025, this group has demonstrated a consistent focus on Russian companies, employing targeted phishing emails as their primary infection vector.

Example of a phishing page associated with the APT campaign

These emails, often disguised as legitimate communications from trusted entities, contain password-protected archives with malicious executables.

– Advertisement –
Google News

Sophisticated Phishing and Malware Tactics Unveiled

Once victims unlock and execute these files, a complex infection chain begins, leveraging legitimate third-party software to mask their activities and hinder detection.

According to Secure List Report, this approach not only complicates attribution but also allows attackers to deploy remote access tools, steal sensitive credentials, and install crypto-mining malware like XMRig on compromised systems.

Delving deeper into their technical tactics, Librarian Ghouls initiate infections through self-extracting installers crafted with tools like Smart Install Maker for Windows.

These installers deploy seemingly innocuous software such as 4t Tray Minimizer to minimize visible activity on the victim’s system, while simultaneously extracting malicious components to directories like C:Intel.

Librarian Ghouls
PDF document imitating a payment order

From here, scripts like rezet.cmd connect to command-and-control (C2) servers, such as downdown[.]ru, to download additional payloads disguised as JPG files but renamed to executables like AnyDesk for remote access, Blat for SMTP-based data exfiltration, and Defender Control to disable Windows Defender.

Exploiting Legitimate Tools for Malicious Intent

Subsequent batch files, such as bat.bat, orchestrate a series of malicious actions, including setting up unattended access with AnyDesk, disabling security measures, and scheduling tasks to wake or shut down systems at specific times to evade user suspicion.

PowerShell scripts further automate daily activations of Microsoft Edge to ensure system availability for remote exploitation.

The attackers’ use of customized legitimate tools, including a modified WinRAR 3.80 (driver.exe) for data compression and utilities like WebBrowserPassView for credential theft, underscores their strategy of blending malicious intent with trusted software.

Their deployment of phishing domains like users-mail[.]ru to harvest email credentials and the installation of miners via configurations fetched from bmapps[.]org highlight the multifaceted nature of their operations, targeting industrial enterprises and educational institutions with Russian-language decoys to maximize impact in the region.

Organizations are urged to remain vigilant, update security protocols, and monitor for these indicators to mitigate the risks posed by this persistent and evolving threat actor.

Indicators of Compromise (IoC)

Below is a curated list of IoCs associated with the Librarian Ghouls campaign for cybersecurity teams to monitor and defend against potential threats:

Type Indicator (SHA256)
Implant d8edd46220059541ff397f74bfd271336dda702c6b1869e8a081c71f595a9e68
Malicious Archive fd58900ea22b38bad2ef3d1b8b74f5c7023b8ca8a5b69f88cfbfe28b2c585baf
Malicious BAT File e880a1bb0e7d422b78a54b35b3f53e348ab27425f1c561db120c0411da5c1ce9
Miner Installer (install.exe) 649ee35ad29945e8dd6511192483dddfdfe516a1312de5e0bd17fdd0a258c27f
Malicious Domain downdown[.]ru

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link