UNG0801: Tracking Threat Clusters obsessed with AV Icon Spoofing targeting Israel

Dec. 23, 2025, 9:41 a.m.

Description

An analysis of threat clusters, dubbed UNG0801 or Operation IconCat, targeting Israeli organizations. The actors use socially engineered phishing lures in Hebrew, exploiting antivirus icon spoofing from well-known vendors like SentinelOne and Check Point. Two distinct infection chains were identified, both utilizing AV-themed decoys dropped by malicious Word and PDF documents. The first campaign deploys a PyInstaller-based implant called PYTRIC, capable of system-wide wipes and backup deletion. The second campaign uses a Rust-based implant named RUSTRIC, focusing on antivirus enumeration and system information gathering. Both campaigns share similar tactics but differ in their ultimate objectives, with the first aimed at destruction and the second at espionage.

Date

  • Created: Dec. 22, 2025, 5:06 p.m.
  • Published: Dec. 22, 2025, 5:06 p.m.
  • Modified: Dec. 23, 2025, 9:41 a.m.

Indicators

  • 6df21646d13c5b68c14c70516dfc74ef2aef4a4246970d7f4fbd072053ba40e6
  • 6f079c1e2655ed391fb8f0b6bfafa126acf905732b5554f38a9d32d0b9ca407d
  • 77ceeb88a1fe4fb03af1acc589e02aeb156e3b22b110124ce1b25c940b0d9bbe
  • 54ebdea80d30660f1d7be0b71bc3eb04189ef2036cdbba24d60f474547d3516a
  • 2afcac3231235b5cea0fc702d705ec76afec424a9cec820749b83b6299d1fe1b
  • e422c2f25fbb4951f069c6ba24e9b917e95edb9019c10d34de4309f480c342df
  • 159.198.68.25

Attack Patterns

Additional Informations

  • Technology
  • Information Technologies Consulting
  • stratioai.org
  • Israel