UNG0801: Tracking Threat Clusters obsessed with AV Icon Spoofing targeting Israel
Dec. 23, 2025, 9:41 a.m.
Description
An analysis of threat clusters, dubbed UNG0801 or Operation IconCat, targeting Israeli organizations. The actors use socially engineered phishing lures in Hebrew, exploiting antivirus icon spoofing from well-known vendors like SentinelOne and Check Point. Two distinct infection chains were identified, both utilizing AV-themed decoys dropped by malicious Word and PDF documents. The first campaign deploys a PyInstaller-based implant called PYTRIC, capable of system-wide wipes and backup deletion. The second campaign uses a Rust-based implant named RUSTRIC, focusing on antivirus enumeration and system information gathering. Both campaigns share similar tactics but differ in their ultimate objectives, with the first aimed at destruction and the second at espionage.
Tags
Date
- Created: Dec. 22, 2025, 5:06 p.m.
- Published: Dec. 22, 2025, 5:06 p.m.
- Modified: Dec. 23, 2025, 9:41 a.m.
Indicators
- 6df21646d13c5b68c14c70516dfc74ef2aef4a4246970d7f4fbd072053ba40e6
- 6f079c1e2655ed391fb8f0b6bfafa126acf905732b5554f38a9d32d0b9ca407d
- 77ceeb88a1fe4fb03af1acc589e02aeb156e3b22b110124ce1b25c940b0d9bbe
- 54ebdea80d30660f1d7be0b71bc3eb04189ef2036cdbba24d60f474547d3516a
- 2afcac3231235b5cea0fc702d705ec76afec424a9cec820749b83b6299d1fe1b
- e422c2f25fbb4951f069c6ba24e9b917e95edb9019c10d34de4309f480c342df
- 159.198.68.25
Additional Informations
- Technology
- Information Technologies Consulting
- stratioai.org
- Israel