
Bloody Wolf evolution: new targets, new tools
BI.ZONE Threat Intelligence continues to monitor Bloody Wolf’s activity. While previously the attackers primarily used STRRAT malware, they have now opted for the legitimate remote administration tool NetSupport. Additionally, a retrospective analysis of the campaigns reveals that the attacks targeted organizations not only in Kazakhstan but also in Russia. In their latest activity, the criminals compromised more than 400 systems.
- Attackers tend to replace malware with legitimate solutions to minimize detection by conventional defenses.
- Widespread telecommuting encourages the proliferation of remote administration software: attackers exploit such software on a target system and can deploy their own.
- Legitimate remote administration tools often give attackers full access to a compromised system, allowing them to manipulate it in any way they want.
In December 2024, BI.ZONE Threat Intelligence detected new activity from Bloody Wolf targeting organizations in Kazakhstan. As before, the attackers used phishing to distribute PDF documents masquerading as compliance notices.

Such documents would contain phishing links that could catch a victim off guard and result in the download of a malicious JAR file, NCALayerUpdatedRU.jar
.
This file was a loader that performed the following operations:
- checked for the folder
%APPDATA%\NCALayerUpdated
and created one if not found - used the link
hxxps://pastebin[.]com/raw/pruy96p1
to retrieve a list of URLs for loading NetSupport components - loaded the NetSupport components into the folder
%APPDATA%\NCALayerUpdated
- ran the component
%APPDATA%\NCALayerUpdated\update.bat
- ran the component
%APPDATA%\NCALayerUpdated\run.bat
- sent the name of the compromised system to a dedicated Telegram chat

getFileUrlsFromPastebin

downloadFile

sendTelegramMessage
The update.bat
file launched the NetSupport client, while run.bat
ensured its persistence on the compromised system.

run.bat
file contents
In this specific campaign, Bloody Wolf used NetSupport client version 11.42.
NetSupport is designed for remote control, monitoring, support, and learning. The software is used in educational institutions for remote training and in corporate IT departments.
A retrospective analysis of the Bloody Wolf activity also revealed a campaign targeting Russian organizations.
As in the case with Kazakhstan, the attackers used phishing emails to distribute PDF documents.

The PDF document with phishing links was disguised as a ruling on liability for a tax offense.

Similar to the Kazakhstan campaign, the phishing links led to a malicious JAR file, such as ReshenieJCP.jar
.
The file was a loader that performed the following actions:
- checked for the folder
%APPDATA%\CryptoProJCP
and created one if not found - used the link
hxxps://pastebin[.]com/raw/hLUWEXTH
to retrieve a list of URLs for loading NetSupport components - loaded the NetSupport components into the folder
%APPDATA%\CryptoProJCP
- ran the component
%APPDATA%\CryptoProJCP\update.bat
- ran the component
%APPDATA%\CryptoProJCP\run.bat
- sent the name of the compromised system to a dedicated Telegram chat
Thus, we can note that the process of compromising a system is essentially the same as described above.
473596b2f09910b0484bac76190de4868b7d4ac756c46c102dc3bd91609d239e
10cd57a425b72d4f21c8f88b5d4033fad4477dd147cdf13b013f6391168c63bb
b2c776a9554e2919f7a7e287f2954674fc5dbd6a10f342558ad98b606d664075
6ae7b754e74a6aa9f803037a8252cf5acfe5b8e8d82ae4b9b9a38826c4586702
salyk-notofocations[.]com
1994Collective[.]com
1994Collective13[.]com
yessenov[.]com
ozhet[.]com
kazsrv[.]online
More indicators of compromise, information on other campaigns and a profile of the Bloody Wolf cluster are available on the BI.ZONE Threat Intelligence portal.
Tactic | Technique | Procedure |
---|---|---|
Initial Access |
Phishing: Spearphishing Attachment |
Bloody Wolf uses phishing email attachments to distribute malware |
Execution |
Command and Scripting Interpreter |
Bloody Wolf uses malicious Java-based loaders that are delivered to a target system as executable JAR files |
Command and Scripting Interpreter: Windows Command Shell |
Bloody Wolf uses the batch script |
|
User Execution: Malicious File |
Bloody Wolf tricks the victim into installing Java and running a malicious JAR file to initiate the system compromise |
|
Persistence |
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Bloody Wolf uses the batch script |
Defense Evasion |
Masquerading |
Bloody Wolf disguises the names of malicious JAR files and created directories with the names of legitimate NCALayer and CryptoPro JCP software |
Discovery |
System Information Discovery |
Bloody Wolf uses a Java loader to obtain a victim’s computer name |
Command and Control |
Application Layer Protocol: Web Protocols |
Bloody Wolf uses the HTTPS protocol to download malicious JAR files Bloody Wolf uses HTTPS to communicate with the NetSupport C2 server |
Ingress Tool Transfer |
Bloody Wolf uses a Java loader to download NetSupport software and batch scripts from the C2 server |
|
Remote Access Software |
Bloody Wolf uses NetSupport software to gain remote access to a compromised system |
|
Web Service: Dead Drop Resolver |
Bloody Wolf posts links to download the NetSupport software and batch scripts from pastebin[.]com |
|
Web Service: One-Way Communication |
Bloody Wolf uses Telegram to send a victim’s computer name |
The described malicious activity can be detected using the following rules from BI.ZONE EDR:
win_access_to_paste_services_from_nonbrowsers
win_netsupport_client_detected
Attacks similar to those by Bloody Wolf are not only critical to detect but also to neutralize before they affect the infrastructure. To protect your company against advanced threats, we recommend implementing endpoint detection and response practices, for instance, BI.ZONE EDR. The service enables early detection of attacks and immediate incident response, either automated or manual.
To stay ahead of threat actors, you need to be aware of the methods they use when attacking various infrastructures. Understanding the real threat landscape is a massive advantage against adversity. For this purpose, we would recommend that you leverage the data from the BI.ZONE Threat Intelligence portal. The solution provides information about the current attacks, threat actors, their methods and tools. This data helps to ensure the precision of your security solutions, which in turn accelerates incident response and protects your company from the most critical threats.