From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations

Oct. 29, 2025, 8:19 p.m.

Description

Tangerine Turkey is a cryptomining campaign that uses VBScript worms to spread via USB drives, leveraging living-off-the-land binaries for execution and persistence. The group employs defense evasion techniques by modifying registry keys and masquerading malicious binaries as legitimate system files. Their primary goal is financial gain through unauthorized cryptocurrency mining. The malware creates a mock directory to hide its activity, establishes persistence through malicious services and scheduled tasks, and attempts to disable Windows Defender. While currently focused on cryptomining, the actor's ability to achieve persistence and move laterally poses broader security risks.

Date

  • Created: Oct. 29, 2025, 6:37 p.m.
  • Published: Oct. 29, 2025, 6:37 p.m.
  • Modified: Oct. 29, 2025, 8:19 p.m.

Indicators

  • 93d74ed188756507c6480717330365cede4884e98aeb43b38d707ed0b98da7cc
  • 4ffb3c0c7b38105183fb06d1084ab943c6e87f9644f783014684c5cb8db32e32
  • 4617cfd1e66aab547770f049abd937b46c4722ee33bbf97042aab77331aa6525

Attack Patterns