Thursday, May 8, 2025
Homecyber securityGamaredon’s PteroLNK VBScript Malware Infrastructure and TTPs Uncovered by Researchers

Gamaredon’s PteroLNK VBScript Malware Infrastructure and TTPs Uncovered by Researchers

Published on

SIEM as a Service

Follow Us on Google News

Researchers have unearthed details of the Pterodo malware family, notably the PteroLNK variant used by the Russian-nexus threat group, Gamaredon.

The group, which is believed to be associated with Russia’s Federal Security Service (FSB), has been targeting Ukrainian entities, focusing on government, military, and critical infrastructure sectors as part of broader geopolitical conflicts.

Tactics, Techniques, and Procedures (TTPs)

Gamaredon employs a highly obfuscated VBScript malware known as PteroLNK, which dynamically constructs and deploys additional payloads during execution.

- Advertisement - Google News

This script features two main components: a downloader and an LNK dropper, both designed to manipulate and propagate through systems.

The primary script, identified by a unique MD5 hash, establishes persistence by scheduling tasks and altering Windows Explorer settings to hide its activities.

The downloader payload, running every three minutes, retrieves additional malware from a modular, multi-stage C2 infrastructure.

 VBScript Malware
C2 address

It uses a custom HTTP User-Agent string, uniquely identifying the infected machine, and leverages benign websites like ukr.net and sweet.tv for initial connectivity checks.

If connectivity is confirmed, the script proceeds to extract Command and Control (C2) addresses from Dead Drop Resolvers (DDRs) hosted on services like Telegraph and Teletype.

Analysis and Infrastructure

Researchers analyzed samples uploaded between late 2024 and mid-March 2025, identifying active operations through the daily updates to Gamaredon’s DDRs.

The malware uses Cloudflare quick tunnels for anonymity, which can handle up to 200 concurrent requests, making detection challenging.

These tunnels are often pointed to by DDRs, which serve as critical nodes for initial communication, offering flexibility in updating C2 channels.

The infrastructure analysis revealed a timeline of DDR creation from December 28, 2024, to March 26, 2025, showing Gamaredon’s continuous adaptation and operation.

The group has been noted for using previously known domains and even those flagged for phishing by Cloudflare, highlighting their strategic yet not overly sophisticated approach.

The targeted systems predominantly originate from Kyiv, with some uploads from Dnipro, Rivne, Kupyansk, and Odesa, aligning with Gamaredon’s focus on Ukrainian targets.

The malware often uses military-themed lures, reflecting the group’s tactical interest in military operations and personnel logistics.

Attribution to Gamaredon is supported by various technical consistencies and domain associations previously linked to their operations, as well as reports linking them to FSB activities.

Gamaredon’s effectiveness stems not from advanced technical capabilities but from their tactical adaptiveness, focusing on operational impact through aggressive spearphishing, obfuscated malware deployment, and resilient C2 infrastructure.

Their campaigns, especially during Ukraine’s counteroffensive, underscore their role in intelligence gathering and disruption efforts supporting military objectives.

Understanding these tactics is crucial for cybersecurity defenses not only in Ukraine but potentially across Europe as similar techniques might be adopted by other threat actors.

This comprehensive analysis provides valuable insights into Gamaredon’s operations, offering actionable intelligence for cybersecurity professionals to enhance detection and mitigation strategies against these ongoing threats.

Indicators of Compromise (IOCs)

TypeValue
Hashes (SHA-256)0cec5ca5d2fe9616a275b54ca37f45248e1ed6e15f627d6bffb566ffd6295208 – PteroLNK VBScript
File Paths%PUBLIC%\NTUSER.DAT.TMContainer00000000000000000001.regtrans-ms – PteroLNK downloader payload
Scheduled Tasks\Windows\DeviceDirectoryClient\RegisterUserDevice – PteroLNK downloader payload
Registry KeysHKEY_CURRENT_USER\Console\WindowsUpdates
Domains & Hostnamestienes[.]ru – Gamaredon C2
URLshxxps://telegra[.]ph/Vizit-12-28 – Dead drop resolver

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...