WIRTE APT (Ashen Lepus) Espionage

Targeted Sectors

·         Government

·         Diplomatic entities

·         Military advisors

·         NGOs

·         Think tanks

Countries

·         Oman

·         Morocco

·         Palestinian Authority

·         Jordan

·         Iraq

·         Saudi Arabia

·         Egypt

BLUF

WIRTE is conducting persistent, wide-reaching espionage campaigns in the Middle East using spear-phishing and DLL sideloading to install the AshTag backdoor for data exfiltration.

Date of First Reported Activity

·         Campaign ongoing since at least 2020, with new tools reported on December 11, 2025.

Date of Last Reported Activity Update

·         December 11, 2025.

APT Names

·         WIRTE aka

o   Ashen Lepus

o   UNC4057

o   Star Blizzard

o   Callisto

Associated Criminal Organization Names

·         None

IOCs

Malicious Files

·         AshenLoader (DLLs used for sideloading)

·         AshTag backdoor samples

Recent C2 Domains

·         api. healthylifefeed[.]com

·         api.softmatictech[.]com

·         auth.onlinefieldtech[.]com

C2 Infrastructure Evolution

Key aspects of the group's C2 architecture and operational shift:

Subdomain Usage

Instead of standalone domains, they register subdomains on existing, seemingly legitimate domains to evade detection.

Theming

The domain names often have a technology or medical theme, which appears innocuous to an observer.

Geofencing and Obfuscation

The C2 servers are geofenced and perform initial checks on the victim's endpoint to avoid analysis in sandbox environments.

Payload Embedding

Secondary payloads are embedded within specific, custom HTML tags (e.g., <headerp>, <article>) of an otherwise benign-looking webpage hosted on the C2 server, requiring the malware to parse the HTML to extract the next stage

Tools Used

·         AshenLoader

·         AshTag malware suite

TTPs

·         (TA0001) Initial Access: Spear-phishing emails containing malicious attachments/lures.

·         (TA0005) Defense Evasion: DLL search order hijacking/sideloading (AshenLoader).

·         (TA0002) Execution: Execution of AshTag backdoor.

·         (TA0011) Command and Control: Communication with C2 servers for data exfiltration.

Malware Names

·         AshenLoader

·         AshTag

Malware Samples

AshenLoader variant one

sha256

f554c43707f5d87625a3834116a2d22f551b1d9a5aff1e446d24893975c431bc

URL Link to sample

·         hxxps://www.virustotal.com/gui/file/f554c43707f5d87625a3834116a2d22f551b1d9a5aff1e446d24893975c431bc/details

Ashen Loader variant two

sha256

f9816bc81de2e8639482c877a8defcaed9b15ffdce12beaef1cff3fea95999d4

URL Link to sample

·         hxxps://www.virustotal.com/gui/file/f9816bc81de2e8639482c877a8defcaed9b15ffdce12beaef1cff3fea95999d4

 

 

CVEs and CVSS Vectors

·         Not applicable

o   This relies on social engineering and DLL sideloading techniques

 

Nessus ID

·         Not applicable

Suggested rules / potential hunts

Suggested Suricata Rules

Rules detecting suspicious outbound C2 traffic patterns associated with known AshTag domains (check vendor reports for current C2s).

Suggested SentinelOne Rules

Behavioral rules detecting unusual DLL loading sequences or attempts to make outbound connections from standard diplomatic/government systems.

Suggested Splunk Hunts

index=* (source=*email* OR source=*proxy*) ("spear-phishing" OR "AshenLoader" OR "AshTag") | stats count by source_address, recipient

Delivery Method

Spear-phishing emails with malicious attachments leading to DLL sideloading.

Email Samples

·         Lures often related to government/diplomatic themes

References

The Hacker News

·         hxxps://thehackernews.com/2025/12/wirte-leverages-ashenloader-sideloading.html

Unit 42

·         hxxps://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag

VirusTotal

·         hxxps://www.virustotal.com/gui/file/f554c43707f5d87625a3834116a2d22f551b1d9a5aff1e446d24893975c431bc/details

·         hxxps://www.virustotal.com/gui/file/f9816bc81de2e8639482c877a8defcaed9b15ffdce12beaef1cff3fea95999d4

Previous
Previous

Google Chrome ANGLE Graphics Zero-Day CVE-2025-6558

Next
Next

GeoServer XXE Vulnerability CVE-2025-58360