Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services


A malvertising campaign using sponsored results on Microsoft’s search platform delivered a weaponized PuTTY that established persistence, enabled hands-on keyboard control, and executed Kerberoasting to target Active Directory service accounts.

According to an investigation published by LevelBlue’s MDR SOC and corroborated by independent research tracking Oyster/Broomstick backdoor activity tied to trojanized admin tools distributed via search ads and SEO poisoning.

Search results highlight a sponsored link for downloading PuTTY, illustrating the malvertising tactics used in the campaign.
Search results highlight a sponsored link for downloading PuTTY, illustrating the malvertising tactics used in the campaign.

LevelBlue’s SOC received a SentinelOne high-risk alert in USM Anywhere, flagging a suspicious PuTTY.exe download signed by “NEW VISION MARKETING LLC,” an unexpected signer for legitimate PuTTY and the first red flag on the endpoint.

Google News

The analysis highlighted outbound traffic from PuTTY.exe to malicious infrastructure, suspicious DLL creation in %appdata% and %temp%, scheduled-task persistence via rundll32 DllRegisterServer, and HOK activity culminating in Kerberoasting. 

Next, the asset was isolated, the account was disabled, and execution chains were reconstructed. This revealed that the fake installer had scheduled a task, “Security Updater,” to run every three minutes, loading a malicious DLL (twain_96.dll). This DLL then dropped “green.dll,” which was used for operator access and reconnaissance.

Weaponized PuTTY to Exploit Kerberos

Fake PuTTY with an anomalous code-signing certificate executed and created a scheduled task persistence, invoking rundll32 with DllRegisterServer at three-minute intervals.

The first-stage DLL (twain_96[.]dll) dropped a second-stage (green[.]dll) that initiated a single outbound 443 connection and spawned cmd[.]exe for discovery commands consistent with ransomware operator TTPs (nltest, net group domain admins, nltest /dclist).

SentinelOne telemetry and VirusTotal classifications mapped the DLLs to the Oyster/Broomstick backdoor family known for hardcoded C2, scheduled-task persistence, and remote command execution.

The final recorded action was an inline PowerShell script performing Kerberoasting, requesting TGS tickets for SPN-bearing accounts and leveraging weak RC4-HMAC if AES enforcement was absent, then extracting ticket bytes in-memory to emit Hashcat-ready $krb5tgs$ material (mode 13100).

PowerShell script showcasing a command execution bypass designed for Kerberoasting
PowerShell script showcasing a command execution bypass designed for Kerberoasting

The script borrowed from Invoke-Kerberoast patterns, executed fully in-memory without disk writes, and was validated via USM Anywhere events showing RC4-HMAC-encrypted Kerberos service tickets (Event ID 4769). This enabled offline cracking of service account credentials for privilege escalation and lateral movement against AD services.

LevelBlue traced the initial access to malicious sponsored results impersonating putty[.]org and redirecting to typosquatted domains such as puttyy[.]org and puttysystems[.]com that delivered the trojanized installer, with payload hosting observed via heartlandenergy[.]ai and a rotating loader script at putty[.]network pulling from compromised WordPress sites.

The MDR team noted variant payload hashes, multiple code-signing certificates (including NEW VISION MARKETING LLC) to evade hash/signer-based detections, and alternate scheduled-task names such as “FireFox Agent INC” in sandboxed samples.

This activity aligns with broader 2024–2025 malvertising/SEO poisoning trends delivering trojanized PuTTY/WinSCP and Oyster/Broomstick, as reported by Rapid7 and Arctic Wolf.

Here is a consolidated table of the reported IOCs from the LevelBlue investigation into weaponized PuTTY malvertising tied to the Oyster/Broomstick backdoor; add these to blocklists and detection pipelines for rapid containment. The entries below reflect the indicators documented by LevelBlue and aligned open-source reporting on the same campaign.

Below is the consolidated IOC table combining domains, hashes, signers, IPs, URLs, and scheduled tasks linked to the weaponized PuTTY/Oyster malvertising activity. Use these indicators for blocklists, retro-hunting, and detection content.

TypeIndicatorContext/Notes
Domainputtyy[.]orgTyposquat used to deliver trojanized PuTTY installers.
Domainputtysystems[.]comMalvertising landing used to impersonate PuTTY download.
Domainupdaterputty[.]comNewly registered domain associated with campaign flow.
Domainputty[.]betCampaign-associated domain registration.
Domainputtyy[.]comTyposquat tied to delivery infrastructure.
Domainputty[.]runCampaign-associated domain registration.
Domainputty[.]latCampaign-associated domain registration.
Domainputty[.]us[.]comCampaign-associated domain registration.
Domainheartlandenergy[.]aiObserved hosting payload behind “Download PuTTY.”
Domainputty[.]networkLoader page rotating mirrors via JS for payload checks.
Domainruben.findinit[.]comCompromised WordPress site used to serve payloads.
Domainekeitoro.siteinwp[.]comCompromised WordPress site used to serve payloads.
Domaindanielaurel[.]tvCompromised WordPress site used to serve payloads.
File hash (SHA256)0b85ad058aa224d0b66ac7fdc4f3b71145aede462068cc9708ec2cee7c5717d4Malicious PuTTY/Oyster-related sample.
File hash (SHA256)e9f05410293f97f20d528f1a4deddc5e95049ff1b0ec9de4bf3fd7f5b8687569Malicious PuTTY/Oyster-related sample.
File hash (SHA256)d73bcb2b67aebb19ff26a840d3380797463133c2c8f61754020794d31a9197d1Malicious PuTTY/Oyster-related sample.
File hash (SHA256)dd995934bdab89ca6941633dea1ef6e6d9c3982af5b454ecb0a6c440032b30fbMalicious PuTTY/Oyster-related sample.
File hash (SHA256)03012e22602837132c4611cac749de39fb1057a8dead227594d4d4f6fb961552Malicious PuTTY/Oyster-related sample.
File hash (SHA256)a653b4f7f76ee8e6bd9ffa816c0a14dca2d591a84ee570d4b6245079064b5794Malicious PuTTY/Oyster-related sample.
File hash (SHA256)e02d21a83c41c15270a854c005c4b5dfb94c2ddc03bb4266aa67fc0486e5dd35Malicious PuTTY/Oyster-related sample.
File hash (SHA256)80c8a6ecd5619d137aa57ddf252ab5dc9044266fca87f3e90c5b7f3664c5142fMalicious PuTTY/Oyster-related sample.
File hash (SHA256)1112b72f47b7d09835c276c412c83d89b072b2f0fb25a0c9e2fed7cf08b55a41Malicious PuTTY/Oyster-related sample.
File hash (SHA256)3d22a974677164d6bd7166e521e96d07cd00c884b0aeacb5555505c6a62a1c26Malicious PuTTY/Oyster-related sample.
File hash (SHA256)e8e9f0da26a3d6729e744a6ea566c4fd4e372ceb4b2e7fc01d08844bfc5c3abbMalicious PuTTY/Oyster-related sample.
File hash (SHA256)eef6d4b6bdf48a605cade0b517d5a51fc4f4570e505f3d8b9b66158902dcd4afMalicious PuTTY/Oyster-related sample.
File signerTHE COMB REIVERS LIMITEDAbused code-signing certificate on trojanized installers.
File signerNEW VISION MARKETING LLCAnomalous signer on fake PuTTY[.]exe observed.
File signerPROFTORG LLCAbused certificate on malicious samples.
File signerLLC FortunaAbused certificate on malicious samples.
File signerLLC BRAVERYAbused certificate on malicious samples.
File signerLLC Infomed22Abused certificate on malicious samples.
IP45.86.230[.]77C2/registration/login endpoints observed.
IP185.208.159[.]119Malicious API host observed in activity.
IP144.217.207[.]26Outbound 443 connection (green.dll).
IP85.239.52[.]99Malicious API host observed in activity.
IP194.213.18[.]89C2 registration/login endpoints observed.
URL (defanged)hxxp[:]//185.208.158[.]119/api/jgfnsfnuefcnegfnehjbfncejfhMalicious API path.
URL (defanged)hxxp[:]//185.208.158[.]119/api/kcehcMalicious API path.
URL (defanged)hxxp[:]//45.86.230[.]77:443/regC2 registration endpoint.
URL (defanged)hxxp[:]//45.86.230[.]77:443/loginC2 login endpoint.
URL (defanged)hxxp[:]//85.239.52[.]99/api/jgfnsfnuefcnegfnehjbfncejfhMalicious API path.
URL (defanged)hxxp[:]//85.239.52[.]99/api/kcehcMalicious API path.
URL (defanged)hxxp[:]//194.213.18[.]89:443/regC2 registration endpoint.
URL (defanged)hxxp[:]//194.213.18[.]89:443/loginC2 login endpoint.
Scheduled taskSecurity UpdaterPersistence via rundll32 DllRegisterServer at 3‑minute intervals.
Scheduled taskFireFox Agent INCAlternate task name seen in sandboxed samples.

Recommendations include blocking the identified domains, enforcing AES for Kerberos on SPN accounts, rotating credentials for affected SPNs, and restricting software acquisition to vetted repositories and official vendor sites.

Security teams should deploy custom detections for rundll32 DllRegisterServer misuse, three-minute recurring scheduled tasks, in-memory Kerberoasting patterns, and storyline correlations linking fake admin tools to DLL drops and cmd.[]exe reconnaissance.

Continuous user training for privileged staff and rapid MDR-led threat hunting across fleets can reduce dwell time and blunt credential theft-to-ransomware escalation paths.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.



Source link