The Governmental Computer Emergency Response Team of Ukraine (CERT-UA) has identified renewed cyber activity from the criminal group UAC-0173 since mid-January 2025. This group, which operates for financial gain, has been executing targeted attacks against notary offices in Ukraine. Their primary objective is to gain unauthorized remote access to notaries’ systems, allowing them to manipulate state registers, CERT-UA said.
Starting in late January 2025, UAC-0173 intensified its phishing campaigns. On February 11, attackers distributed malicious emails impersonating the Ministry of Justice of Ukraine. These emails contained links to executable files, such as:
Executing these files infects the system with DARKCRYSTALRAT (DCRAT), granting attackers initial access to the compromised machine.
Upon initial infection, UAC-0173 deploys additional tools to establish deeper control over the compromised system:
CERT-UA, in collaboration with the Notarial Chamber of Ukraine’s Cybersecurity Commission, has detected and mitigated attacks across six regions, preventing unauthorized modifications in state registers.
File Name | SHA-256 Hash |
HAKA3.exe | a6b692e0ed3d5cd6fd20820dd06608ac7120b8beef9967442ab23dd5b7d7d7c27 |
bore.exe (BORE) | 89b5837e2772041a6ed63e78c08426d4884e86732f0c0ccb7d802a4fd6f08d70 |
Client.exe (DCRAT) | e9cedc98677b6b5146b14009ced7d6243788802d0823e330707ee80bb96ef29e |
xupwork3.exe | 2bcb9aa0b04299c1c902f5f2ff4034f7f9d5f5b0b924a4ba903fdef291bfe8ea |
ft89.exe (XWORM) | cd53f35297016fe68fa60ddaa57402ac6f37d60bd918ae4733abeffa98457409 |
svhost.exe | 539d8bf192341c87f345790f3c2887b88ee10f65476a211ee82a7e06319bc48af |
Malicious Domains & IPs | Description |
hxxp://193[.]233.48.166/ | Malicious file distribution |
hxxp://91[.]92.246.18/upl/t1.exe | Malware payload |
hxxps://87[.]120.126.48/not | Phishing infrastructure |
89[.]105.201.98 | Command-and-Control (C2) |
Path | Description |
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe | Auto-start persistence |
%LOCALAPPDATA%\install.bat | Malicious batch script execution |
%PROGRAMFILES%\RDP Wrapper\rdpwrap.dll | RDP backdoor installation |
NOTE: For a complete set of IoCs, please refer to the CERT-UA blog link at the bottom of the article.
Given the scale and persistence of this attack campaign, Ukrainian notary offices and other potential targets must take immediate action:
The resurgence of UAC-0173’s cyber activities shows the growing threat landscape targeting Ukrainian government institutions. CERT-UA’s swift mitigation efforts of real-time threat monitoring and proactive cyber defense helped the cause. Given the continued demand for illicit modifications of state registers, it is crucial for government agencies to enhance their cybersecurity frameworks and collaborate closely with cybersecurity authorities to counter evolving threats.
For further details and incident reporting, affected entities are urged to contact CERT-UA and the Notarial Chamber of Ukraine’s Cybersecurity Commission immediately.
https://cert.gov.ua/article/6282536
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.