Operation DupeHike: Targeting Russian employees with DUPERUNNER and AdaptixC2

Dec. 3, 2025, 5:59 p.m.

Description

A campaign targeting Russian corporate entities, particularly HR, payroll, and administrative departments, has been uncovered. The attack uses realistic decoy documents themed around employee bonuses and financial policies. The malware ecosystem involves a malicious LNK file leading to an implant dubbed DUPERUNNER, which then loads the AdaptixC2 Beacon to connect to the threat actor's infrastructure. The infection chain begins with a spear-phishing ZIP archive containing PDF-themed LNK files. The DUPERUNNER implant, programmed in C++, performs various functions including downloading and opening decoy PDFs, process enumeration, and shellcode injection. The final stage involves the AdaptixC2 Beacon, which communicates with the command-and-control server. The campaign, tracked as UNG0902, uses multiple malicious infrastructures and is believed to be targeting employees of various organizations.

Date

  • Created: Dec. 3, 2025, 2:29 p.m.
  • Published: Dec. 3, 2025, 2:29 p.m.
  • Modified: Dec. 3, 2025, 5:59 p.m.

Indicators

  • d9e2b6341f6de5c95dd02cf3350c07cd2be3b0a78b82c073229396b6d4c8d3c1
  • ba6902efd3771a564785bdae68fa5f5ac12b7ebd828e8975459fff0136e2efdb
  • 8c075d89eee37a58f1f3a8bf0cbd97e0c8f00e73179a36eb2cd8745024c1c4ee
  • 87db5cbd76e7adeb6932c4ae14f3d3bb736d631460d65e067fb2a0083b675399
  • 7157be86c6612c59e5120ae00260f4268b19560fa5a6fa52ed54d72868070d50
  • 3ce5ab897b7f33bc1b9036abc8e7d2812b385fbab404dad686afaf9fb83fe07a
  • 432974205e1ce4c1d2c0e6bf6ebfafd90f6c19451eec0485ac46beaf65247763
  • 48b9f78899b8a3daaeb9cbf7245350a6222cbf0468cd5c2bab954c8dbbce3995
  • 3a52c13d00af0486095ee4007fd72dae646d3c7384754744507e33537b3fdf2a
  • 2cd715d0702fd70fda45c0569a38b3d983de1a8cf23b559293a7c0623da69c90
  • 1e0c5129ac74989754b7c27be9e12b1ebf90fa5f81db6d7fe5f1aa050a914cf9
  • 46.149.71.230

Attack Patterns

Additional Informations

  • Corporate
  • Russian Federation