{"id":1071,"date":"2026-02-05T09:02:19","date_gmt":"2026-02-05T09:02:19","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/"},"modified":"2026-02-05T09:02:19","modified_gmt":"2026-02-05T09:02:19","slug":"stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/","title":{"rendered":"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\"><\/p>\n<h2 id=\"introduction\">Introduction<\/h2>\n<p>Stan Ghouls (also known as Bloody Wolf) is an cybercriminal group that has been launching targeted attacks against organizations in Russia, Kyrgyzstan, Kazakhstan, and Uzbekistan since at least 2023. These attackers primarily have their sights set on the manufacturing, finance, and IT sectors. Their campaigns are meticulously prepared and tailored to specific victims, featuring a signature toolkit of custom Java-based malware loaders and a sprawling infrastructure with resources dedicated to specific campaigns.<\/p>\n<p>We continuously track Stan Ghouls\u2019 activity, providing our clients with intel on their tactics, techniques, procedures, and latest campaigns. In this post, we share the results of our most recent deep dive into a campaign targeting Uzbekistan, where we identified roughly 50 victims. About 10\u00a0devices in Russia were also hit, with a handful of others scattered across Kazakhstan, Turkey, Serbia, and Belarus (though those last three were likely just collateral damage).<\/p>\n<p>During our investigation, we spotted shifts in the attackers\u2019 infrastructure \u2013 specifically, a batch of new domains. We also uncovered evidence suggesting that Stan Ghouls may have added IoT-focused malware to their arsenal.<\/p>\n<h2 id=\"technical-details\">Technical details<\/h2>\n<h3 id=\"threat-evolution\">Threat evolution<\/h3>\n<p>Stan Ghouls relies on phishing emails packed with malicious PDF attachments as their initial entry point. Historically, the group\u2019s <a href=\"https:\/\/bi.zone\/eng\/expertise\/blog\/bloody-wolf-primenyaet-kommercheskoe-vpo-strrat-protiv-organizatsiy-v-kazakhstane\/\" target=\"_blank\" rel=\"noopener\">weapon of choice<\/a> was the <a href=\"https:\/\/digital.nhs.uk\/cyber-alerts\/2021\/cc-3867\" target=\"_blank\" rel=\"noopener\">remote access Trojan (RAT) STRRAT<\/a>, also known as Strigoi Master. Last year, however, they switched strategies, opting to misuse legitimate software, NetSupport, to maintain control over infected machines.<\/p>\n<p>Given Stan Ghouls\u2019 targeting of financial institutions, we believe their primary motive is financial gain. That said, their heavy use of RATs may also hint at cyberespionage.<\/p>\n<p>Like any other organized cybercrime groups, Stan Ghouls frequently refreshes its infrastructure. To track their campaigns effectively, you have to continuously analyze their activity.<\/p>\n<h3 id=\"initial-infection-vector\">Initial infection vector<\/h3>\n<p>As we\u2019ve mentioned, Stan Ghouls\u2019 primary \u2013 and currently only \u2013 delivery method is spear phishing. Specifically, they favor emails loaded with malicious PDF attachments. This has been backed up by research from several of our industry peers (<a href=\"https:\/\/bi.zone\/eng\/expertise\/blog\/bloody-wolf-primenyaet-kommercheskoe-vpo-strrat-protiv-organizatsiy-v-kazakhstane\/\" target=\"_blank\" rel=\"noopener\">1<\/a>, <a href=\"https:\/\/bi.zone\/eng\/expertise\/blog\/evolyutsiya-bloody-wolf-novye-tseli-novye-sredstva-ataki\/\" target=\"_blank\" rel=\"noopener\">2<\/a>, <a href=\"https:\/\/www.group-ib.com\/blog\/bloody-wolf\/\" target=\"_blank\" rel=\"noopener\">3<\/a>). Interestingly, the attackers prefer to use local languages rather than opting for international mainstays like Russian or English. Below is an example of an email spotted in a previous campaign targeting users in Kyrgyzstan.<\/p>\n<div id=\"attachment_118739\" style=\"width: 1056px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1.png\" class=\"magnificImage\"><img fetchpriority=\"high\" decoding=\"async\" aria-describedby=\"caption-attachment-118739\" class=\"size-full wp-image-118739\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1.png\" alt=\"Example of a phishing email from a previous Stan Ghouls campaign\" width=\"1046\" height=\"463\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1.png 1046w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1-300x133.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1-1024x453.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1-768x340.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1-791x350.png 791w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1-740x328.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1-633x280.png 633w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210248\/stanghouls-in-uzbekistan1-800x354.png 800w\" sizes=\"(max-width: 1046px) 100vw, 1046px\"><\/a><\/p>\n<p id=\"caption-attachment-118739\" class=\"wp-caption-text\">Example of a phishing email from a previous Stan Ghouls campaign<\/p>\n<\/div>\n<p>The email is written in Kyrgyz and translates to: \u201cThe service has contacted you. Materials for review are attached. Sincerely\u201d.<\/p>\n<p>The attachment was a malicious PDF file titled \u201c\u041f\u043e\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435_\u0420\u0430\u0439\u043e\u043d\u043d\u044b\u0439_\u0441\u0443\u0434_\u041a\u0447\u0440\u043c_3566_28-01-25_OL4_scan.pdf\u201d (the title, written in Russian, posed it as an order of district court).<\/p>\n<p>During the most recent campaign, which primarily targeted victims in Uzbekistan, the attackers deployed spear-phishing emails written in Uzbek:<\/p>\n<div id=\"attachment_118740\" style=\"width: 924px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210327\/stanghouls-in-uzbekistan2.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118740\" class=\"size-full wp-image-118740\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210327\/stanghouls-in-uzbekistan2.png\" alt=\"Example of a spear-phishing email from the latest campaign\" width=\"914\" height=\"364\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210327\/stanghouls-in-uzbekistan2.png 914w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210327\/stanghouls-in-uzbekistan2-300x119.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210327\/stanghouls-in-uzbekistan2-768x306.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210327\/stanghouls-in-uzbekistan2-879x350.png 879w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210327\/stanghouls-in-uzbekistan2-740x295.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210327\/stanghouls-in-uzbekistan2-703x280.png 703w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210327\/stanghouls-in-uzbekistan2-800x319.png 800w\" sizes=\"auto, (max-width: 914px) 100vw, 914px\"><\/a><\/p>\n<p id=\"caption-attachment-118740\" class=\"wp-caption-text\">Example of a spear-phishing email from the latest campaign<\/p>\n<\/div>\n<p>The email text can be translated as follows:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">[redacted] AKMALZHON IBROHIMOVICH\n\nYou will receive a court notice. Application for retrial. The case is under review by the district court. Judicial Service.\n\nMustaqillik Street, 147 Uraboshi Village, Quva District.<\/pre>\n<p>The attachment, named E-SUD_705306256_ljro_varaqasi.pdf (MD5: 7556e2f5a8f7d7531f28508f718cb83d), is a standard one-page decoy PDF:<\/p>\n<div id=\"attachment_118741\" style=\"width: 794px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118741\" class=\"size-full wp-image-118741\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3.png\" alt=\"The embedded decoy document\" width=\"784\" height=\"1034\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3.png 784w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3-227x300.png 227w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3-776x1024.png 776w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3-768x1013.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3-265x350.png 265w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3-740x976.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3-212x280.png 212w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210422\/stanghouls-in-uzbekistan3-682x900.png 682w\" sizes=\"auto, (max-width: 784px) 100vw, 784px\"><\/a><\/p>\n<p id=\"caption-attachment-118741\" class=\"wp-caption-text\">The embedded decoy document<\/p>\n<\/div>\n<p>Notice that the attackers claim that the \u201ccase materials\u201d (which are actually the malicious loader) can only be opened using the Java Runtime Environment.<\/p>\n<p>They even helpfully provide a link for the victim to download and install it from the official website.<\/p>\n<h3 id=\"the-malicious-loader\">The malicious loader<\/h3>\n<p>The decoy document contains identical text in both Russian and Uzbek, featuring two links that point to the malicious loader:<\/p>\n<ul>\n<li>Uzbek link (\u201c- Ish materiallari 09.12.2025 y\u201d): hxxps:\/\/mysoliq-uz[.]com\/api\/v2\/documents\/financial\/Q4-2025\/audited\/consolidated\/with-notes\/financials\/reports\/annual\/2025\/tashkent\/statistical-statements\/<\/li>\n<li>Russian link (\u201c- \u041c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u044b \u0434\u0435\u043b\u0430 09.12.2025 \u0433.\u201d): hxxps:\/\/my-xb[.]com\/api\/v2\/documents\/financial\/Q4-2025\/audited\/consolidated\/with-notes\/financials\/reports\/annual\/2025\/tashkent\/statistical-statements\/<\/li>\n<\/ul>\n<p>Both links lead to the exact same JAR file (MD5: 95db93454ec1d581311c832122d21b20).<\/p>\n<p>It\u2019s worth noting that these attackers are constantly updating their infrastructure, registering new domains for every new campaign. In the relatively short history of this threat, we\u2019ve already mapped out over 35 domains tied to Stan Ghouls.<\/p>\n<p>The malicious loader handles three main tasks:<\/p>\n<ol>\n<li>Displaying a fake error message to trick the user into thinking the application can\u2019t run. The message in the screenshot translates to: \u201cThis application cannot be run in your OS. Please use another device.\u201d\n<div id=\"attachment_118742\" style=\"width: 343px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210538\/stanghouls-in-uzbekistan4.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118742\" class=\"size-full wp-image-118742\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210538\/stanghouls-in-uzbekistan4.png\" alt=\"Fake error message\" width=\"333\" height=\"264\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210538\/stanghouls-in-uzbekistan4.png 333w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210538\/stanghouls-in-uzbekistan4-300x238.png 300w\" sizes=\"auto, (max-width: 333px) 100vw, 333px\"><\/a><\/p>\n<p id=\"caption-attachment-118742\" class=\"wp-caption-text\">Fake error message<\/p>\n<\/div>\n<\/li>\n<li>Checking that the number of previous RAT installation attempts is less than three. If the limit is reached, the loader terminates and throws the following error: \u201cUrinishlar chegarasidan oshildi. Boshqa kompyuterni tekshiring.\u201d This translates to: \u201cAttempt limit reached. Try another computer.\u201d\n<div id=\"attachment_118743\" style=\"width: 1520px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118743\" class=\"size-full wp-image-118743\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5.png\" alt=\"The limitCheck procedure for verifying the number of RAT download attempts\" width=\"1510\" height=\"381\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5.png 1510w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5-300x76.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5-1024x258.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5-768x194.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5-1387x350.png 1387w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5-740x187.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5-1110x280.png 1110w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210619\/stanghouls-in-uzbekistan5-800x202.png 800w\" sizes=\"auto, (max-width: 1510px) 100vw, 1510px\"><\/a><\/p>\n<p id=\"caption-attachment-118743\" class=\"wp-caption-text\">The limitCheck procedure for verifying the number of RAT download attempts<\/p>\n<\/div>\n<\/li>\n<li>Downloading a remote management utility from a malicious domain and saving it to the victim\u2019s machine. Stan Ghouls loaders typically contain a list of several domains and will iterate through them until they find one that\u2019s live.\n<div id=\"attachment_118744\" style=\"width: 857px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210702\/stanghouls-in-uzbekistan6.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118744\" class=\"size-full wp-image-118744\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210702\/stanghouls-in-uzbekistan6.png\" alt=\"The performanceResourceUpdate procedure for downloading the remote management utility\" width=\"847\" height=\"557\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210702\/stanghouls-in-uzbekistan6.png 847w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210702\/stanghouls-in-uzbekistan6-300x197.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210702\/stanghouls-in-uzbekistan6-768x505.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210702\/stanghouls-in-uzbekistan6-532x350.png 532w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210702\/stanghouls-in-uzbekistan6-740x487.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210702\/stanghouls-in-uzbekistan6-426x280.png 426w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210702\/stanghouls-in-uzbekistan6-800x526.png 800w\" sizes=\"auto, (max-width: 847px) 100vw, 847px\"><\/a><\/p>\n<p id=\"caption-attachment-118744\" class=\"wp-caption-text\">The performanceResourceUpdate procedure for downloading the remote management utility<\/p>\n<\/div>\n<\/li>\n<\/ol>\n<p>The loader fetches the following files, which make up the components of the NetSupport RAT: PCICHEK.DLL, client32.exe, advpack.dll, msvcr100.dll, remcmdstub.exe, ir50_qcx.dll, client32.ini, AudioCapture.dll, kbdlk41a.dll, KBDSF.DLL, tcctl32.dll, HTCTL32.DLL, kbdibm02.DLL, kbd101c.DLL, kbd106n.dll, ir50_32.dll, nskbfltr.inf, NSM.lic, pcicapi.dll, PCICL32.dll, qwave.dll. This list is hardcoded in the malicious loader\u2019s body. To ensure the download was successful, it checks for the presence of the client32.exe executable. If the file is found, the loader generates a NetSupport launch script (run.bat), drops it into the folder with the other files, and executes it:<\/p>\n<div id=\"attachment_118745\" style=\"width: 1079px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210747\/stanghouls-in-uzbekistan7.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118745\" class=\"size-full wp-image-118745\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210747\/stanghouls-in-uzbekistan7.png\" alt=\"The createBatAndRun procedure for creating and executing the run.bat file, which then launches the NetSupport RAT\" width=\"1069\" height=\"291\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210747\/stanghouls-in-uzbekistan7.png 1069w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210747\/stanghouls-in-uzbekistan7-300x82.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210747\/stanghouls-in-uzbekistan7-1024x279.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210747\/stanghouls-in-uzbekistan7-768x209.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210747\/stanghouls-in-uzbekistan7-740x201.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210747\/stanghouls-in-uzbekistan7-1029x280.png 1029w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03210747\/stanghouls-in-uzbekistan7-800x218.png 800w\" sizes=\"auto, (max-width: 1069px) 100vw, 1069px\"><\/a><\/p>\n<p id=\"caption-attachment-118745\" class=\"wp-caption-text\">The createBatAndRun procedure for creating and executing the run.bat file, which then launches the NetSupport RAT<\/p>\n<\/div>\n<p>The loader also ensures NetSupport persistence by adding it to startup using the following three methods:<\/p>\n<ol type=\"a\">\n<li>It creates an autorun script named SoliqUZ_Run.bat and drops it into the Startup folder (<code>%APPDATA%MicrosoftWindowsStart MenuProgramsStartup<\/code>):\n<div id=\"attachment_118746\" style=\"width: 1335px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213320\/stanghouls-in-uzbekistan8.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118746\" class=\"size-full wp-image-118746\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213320\/stanghouls-in-uzbekistan8.png\" alt=\"The generateAutorunScript procedure for creating the batch file and placing it in the Startup folder \" width=\"1325\" height=\"246\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213320\/stanghouls-in-uzbekistan8.png 1325w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213320\/stanghouls-in-uzbekistan8-300x56.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213320\/stanghouls-in-uzbekistan8-1024x190.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213320\/stanghouls-in-uzbekistan8-768x143.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213320\/stanghouls-in-uzbekistan8-740x137.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213320\/stanghouls-in-uzbekistan8-800x149.png 800w\" sizes=\"auto, (max-width: 1325px) 100vw, 1325px\"><\/a><\/p>\n<p id=\"caption-attachment-118746\" class=\"wp-caption-text\">The generateAutorunScript procedure for creating the batch file and placing it in the Startup folder<\/p>\n<\/div>\n<\/li>\n<li>It adds the run.bat file to the registry\u2019s autorun key (<code>HKCUSoftwareMicrosoftWindowsCurrentVersionRunmalicious_key_name<\/code>).\n<div id=\"attachment_118747\" style=\"width: 1770px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118747\" class=\"size-full wp-image-118747\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9.png\" alt=\"The registryStartupAdd procedure for adding the RAT launch script to the registry autorun key\" width=\"1760\" height=\"160\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9.png 1760w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9-300x27.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9-1024x93.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9-768x70.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9-1536x140.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9-740x67.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9-1600x145.png 1600w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213435\/stanghouls-in-uzbekistan9-800x73.png 800w\" sizes=\"auto, (max-width: 1760px) 100vw, 1760px\"><\/a><\/p>\n<p id=\"caption-attachment-118747\" class=\"wp-caption-text\">The registryStartupAdd procedure for adding the RAT launch script to the registry autorun key<\/p>\n<\/div>\n<\/li>\n<li>It creates a scheduled task to trigger run.bat using the following command:<br \/>\n<code>schtasks Create \/TN \"[malicious_task_name]\" \/TR \"[path_to_run.bat]\" \/SC ONLOGON \/RL LIMITED \/F \/RU \"[%USERNAME%]\"<\/code><\/p>\n<div id=\"attachment_118748\" style=\"width: 1414px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213511\/stanghouls-in-uzbekistan10.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118748\" class=\"size-full wp-image-118748\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213511\/stanghouls-in-uzbekistan10.png\" alt=\"The installStartupTask procedure for creating a scheduled task to launch the NetSupport RAT (via run.bat)\" width=\"1404\" height=\"222\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213511\/stanghouls-in-uzbekistan10.png 1404w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213511\/stanghouls-in-uzbekistan10-300x47.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213511\/stanghouls-in-uzbekistan10-1024x162.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213511\/stanghouls-in-uzbekistan10-768x121.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213511\/stanghouls-in-uzbekistan10-740x117.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03213511\/stanghouls-in-uzbekistan10-800x126.png 800w\" sizes=\"auto, (max-width: 1404px) 100vw, 1404px\"><\/a><\/p>\n<p id=\"caption-attachment-118748\" class=\"wp-caption-text\">The installStartupTask procedure for creating a scheduled task to launch the NetSupport RAT (via run.bat)<\/p>\n<\/div>\n<\/li>\n<\/ol>\n<p>Once the NetSupport RAT is downloaded, installed, and executed, the attackers gain total control over the victim\u2019s machine. While we don\u2019t have enough telemetry to say with 100% certainty what they do once they\u2019re in, the heavy focus on finance-related organizations suggests that the group is primarily after its victims\u2019 money. That said, we can\u2019t rule out cyberespionage either.<\/p>\n<h3 id=\"malicious-utilities-for-targeting-iot-infrastructure\">Malicious utilities for targeting IoT infrastructure<\/h3>\n<p>Previous Stan Ghouls attacks targeting organizations in Kyrgyzstan, as <a href=\"https:\/\/www.group-ib.com\/blog\/bloody-wolf\/\" target=\"_blank\" rel=\"noopener\">documented<\/a> by Group-IB researchers, featured a NetSupport RAT configuration file client32.ini with the MD5 hash cb9c28a4c6657ae5ea810020cb214ff0. While reports mention the Kyrgyzstan campaign kicked off in June 2025, Kaspersky solutions first flagged this exact config file on May 16, 2025. At that time, it contained the following NetSupport RAT command-and-control server info:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">...\n[HTTP]\nCMPI=60\nGatewayAddress=hgame33[.]com:443\nGSK=FN:L?ADAFI:F?BCPGD;N&gt;IAO9J&gt;J@N\nPort=443\nSecondaryGateway=ravinads[.]com:443\nSecondaryPort=443<\/pre>\n<p>\nAt the time of our January 2026 investigation, our telemetry showed that the domain specified in that config, hgame33[.]com, was also hosting the following files:<\/p>\n<ul>\n<li>hxxp:\/\/www.hgame33[.]com\/00101010101001\/morte.spc<\/li>\n<li>hxxp:\/\/hgame33[.]com\/00101010101001\/debug<\/li>\n<li>hxxp:\/\/www.hgame33[.]com\/00101010101001\/morte.x86<\/li>\n<li>hxxp:\/\/www.hgame33[.]com\/00101010101001\/morte.mpsl<\/li>\n<li>hxxp:\/\/www.hgame33[.]com\/00101010101001\/morte.arm7<\/li>\n<li>hxxp:\/\/www.hgame33[.]com\/00101010101001\/morte.sh4<\/li>\n<li>hxxp:\/\/hgame33[.]com\/00101010101001\/morte.arm<\/li>\n<li>hxxp:\/\/hgame33[.]com\/00101010101001\/morte.i686<\/li>\n<li>hxxp:\/\/hgame33[.]com\/00101010101001\/morte.arc<\/li>\n<li>hxxp:\/\/hgame33[.]com\/00101010101001\/morte.arm5<\/li>\n<li>hxxp:\/\/hgame33[.]com\/00101010101001\/morte.arm6<\/li>\n<li>hxxp:\/\/www.hgame33[.]com\/00101010101001\/morte.m68k<\/li>\n<li>hxxp:\/\/www.hgame33[.]com\/00101010101001\/morte.ppc<\/li>\n<li>hxxp:\/\/www.hgame33[.]com\/00101010101001\/morte.x86_64<\/li>\n<li>hxxp:\/\/hgame33[.]com\/00101010101001\/morte.mips<\/li>\n<\/ul>\n<p>All of these files belong to the infamous IoT malware named <a href=\"https:\/\/threats.kaspersky.com\/en\/threat\/Backdoor.Linux.Mirai\/\" target=\"_blank\" rel=\"noopener\">Mirai<\/a>. Since they are sitting on a server tied to the Stan Ghouls\u2019 campaign targeting Kyrgyzstan, we can hypothesize \u2013 with a low degree of confidence \u2013 that the group has expanded its toolkit to include IoT-based threats. However, it\u2019s also possible it simply shared its infrastructure with other threat actors who were the ones actually wielding Mirai. This theory is backed up by the fact that the domain\u2019s registration info was last updated on July 4, 2025, at 11:46:11 \u2013 well after Stan Ghouls\u2019 activity in May and June.<\/p>\n<h2 id=\"attribution\">Attribution<\/h2>\n<p>We attribute this campaign to the Stan Ghouls (Bloody Wolf) group with a high degree of confidence, based on the following similarities to <a href=\"https:\/\/www.group-ib.com\/blog\/bloody-wolf\/\" target=\"_blank\" rel=\"noopener\">the attackers\u2019 previous campaigns<\/a>:<\/p>\n<ol>\n<li>Substantial code overlaps were found within the malicious loaders. For example:\n<div id=\"attachment_118749\" style=\"width: 1666px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118749\" class=\"size-full wp-image-118749\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11.png\" alt=\"Code snippet from sample 1acd4592a4eb0c66642cc7b07213e9c9584c6140210779fbc9ebb76a90738d5e, the loader from the Group-IB report\" width=\"1656\" height=\"530\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11.png 1656w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11-300x96.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11-1024x328.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11-768x246.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11-1536x492.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11-1094x350.png 1094w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11-740x237.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11-875x280.png 875w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214603\/stanghouls-in-uzbekistan11-800x256.png 800w\" sizes=\"auto, (max-width: 1656px) 100vw, 1656px\"><\/a><\/p>\n<p id=\"caption-attachment-118749\" class=\"wp-caption-text\">Code snippet from sample 1acd4592a4eb0c66642cc7b07213e9c9584c6140210779fbc9ebb76a90738d5e, the loader from the Group-IB report<\/p>\n<\/div>\n<div id=\"attachment_118750\" style=\"width: 1681px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118750\" class=\"size-full wp-image-118750\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12.png\" alt=\"Code snippet from sample 95db93454ec1d581311c832122d21b20, the NetSupport loader described here\" width=\"1671\" height=\"462\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12.png 1671w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12-300x83.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12-1024x283.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12-768x212.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12-1536x425.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12-1266x350.png 1266w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12-740x205.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12-1013x280.png 1013w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214647\/stanghouls-in-uzbekistan12-800x221.png 800w\" sizes=\"auto, (max-width: 1671px) 100vw, 1671px\"><\/a><\/p>\n<p id=\"caption-attachment-118750\" class=\"wp-caption-text\">Code snippet from sample 95db93454ec1d581311c832122d21b20, the NetSupport loader described here<\/p>\n<\/div>\n<\/li>\n<li>Decoy documents in both campaigns look identical.\n<div id=\"attachment_118751\" style=\"width: 801px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118751\" class=\"size-full wp-image-118751\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13.png\" alt=\"Decoy document 5d840b741d1061d51d9786f8009c37038c395c129bee608616740141f3b202bb from the campaign reported by Group-IB\" width=\"791\" height=\"1032\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13.png 791w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13-230x300.png 230w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13-785x1024.png 785w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13-768x1002.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13-268x350.png 268w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13-740x965.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13-215x280.png 215w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214751\/stanghouls-in-uzbekistan13-690x900.png 690w\" sizes=\"auto, (max-width: 791px) 100vw, 791px\"><\/a><\/p>\n<p id=\"caption-attachment-118751\" class=\"wp-caption-text\">Decoy document 5d840b741d1061d51d9786f8009c37038c395c129bee608616740141f3b202bb from the campaign reported by Group-IB<\/p>\n<\/div>\n<div id=\"attachment_118752\" style=\"width: 799px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118752\" class=\"size-full wp-image-118752\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14.png\" alt=\"Decoy document 106911ba54f7e5e609c702504e69c89a used in the campaign described here\" width=\"789\" height=\"1033\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14.png 789w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14-229x300.png 229w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14-782x1024.png 782w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14-768x1006.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14-267x350.png 267w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14-740x969.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14-214x280.png 214w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/03214859\/stanghouls-in-uzbekistan14-687x900.png 687w\" sizes=\"auto, (max-width: 789px) 100vw, 789px\"><\/a><\/p>\n<p id=\"caption-attachment-118752\" class=\"wp-caption-text\">Decoy document 106911ba54f7e5e609c702504e69c89a used in the campaign described here<\/p>\n<\/div>\n<\/li>\n<li>In both current and past campaigns, the attackers utilized loaders written in Java. Given that Java has fallen out of fashion with malicious loader authors in recent years, it serves as a distinct fingerprint for Stan Ghouls.<\/li>\n<\/ol>\n<h2 id=\"victims\">Victims<\/h2>\n<p>We identified approximately 50\u00a0victims of this campaign in Uzbekistan, alongside 10 in Russia and a handful of others in Kazakhstan, Turkey, Serbia, and Belarus (we suspect the infections in these last three countries were accidental). Nearly all phishing emails and decoy files in this campaign were written in Uzbek, which aligns with the group\u2019s track record of leveraging the native languages of their target countries.<\/p>\n<p>Most of the victims are tied to industrial manufacturing, finance, and IT. Furthermore, we observed infection attempts on devices within government organizations, logistics companies, medical facilities, and educational institutions.<\/p>\n<p>It is worth noting that over 60\u00a0victims is quite a high headcount for a sophisticated campaign. This suggests the attackers have enough resources to maintain manual remote control over dozens of infected devices simultaneously.<\/p>\n<h2 id=\"takeaways\">Takeaways<\/h2>\n<p>In this post, we\u2019ve broken down the recent campaign by the Stan Ghouls group. The attackers set their sights on organizations in industrial manufacturing, IT, and finance, primarily located in Uzbekistan. However, the ripple effect also reached Russia, Kazakhstan, and a few, likely accidental, victims elsewhere.<\/p>\n<p>With over 60\u00a0targets hit, this is a remarkably high volume for a sophisticated targeted campaign. It points to the significant resources these actors are willing to pour into their operations. Interestingly, despite this, the group sticks to a familiar toolkit including the legitimate NetSupport remote management utility and their signature custom Java-based loader. The only thing they seem to keep updating is their infrastructure. For this specific campaign, they employed two new domains to house their malicious loader and one new domain dedicated to hosting NetSupport RAT files.<\/p>\n<p>One curious discovery was the presence of Mirai files on a domain linked to the group\u2019s previous campaigns. This might suggest Stan Ghouls are branching out into IoT malware, though it\u2019s still too early to call it with total certainty.<\/p>\n<p>We\u2019re keeping a close watch on Stan Ghouls and will continue to keep our customers in the loop regarding the group\u2019s latest moves. Kaspersky products provide robust protection against this threat at every stage of the attack lifecycle.<\/p>\n<h2 id=\"indicators-of-compromise\">Indicators of compromise<\/h2>\n<p><em>* Additional IoCs and a YARA rule for detecting Stan Ghouls activity are available to customers of our <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/services?icid=gl_sl_ti-lnk_sm-team_63057f3138f7f09f#threat-intelligence\" target=\"_blank\" rel=\"noopener\">Threat Intelligence Reporting service<\/a>. For more details, contact us at <a href=\"mailto:crimewareintel@kaspersky.com\" target=\"_blank\" rel=\"noopener\">crimewareintel@kaspersky.com<\/a>.<\/em><\/p>\n<h3 id=\"pdf-decoys\">PDF decoys<\/h3>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/b4ff4aa3eba9409f9f1a5210c95dc5c3\/?icid=gl_sl_opentip-lnk_sm-team_8c92addc70254cec&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">B4FF4AA3EBA9409F9F1A5210C95DC5C3<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/af9321ddb4bef0c3cd1ff3c7c786f0e2\/?icid=gl_sl_opentip-lnk_sm-team_0bd4ff6f0fbca87b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">AF9321DDB4BEF0C3CD1FF3C7C786F0E2<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/056b75fe0d230e6ff53ac508e0f93ccb\/?icid=gl_sl_opentip-lnk_sm-team_6276614b706883f3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">056B75FE0D230E6FF53AC508E0F93CCB<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/db84febfd85f1469c28b4ed70ac6a638\/?icid=gl_sl_opentip-lnk_sm-team_5c382854eaf3b462&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">DB84FEBFD85F1469C28B4ED70AC6A638<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/649c7cacdd545e30d015edb9fcab3a0c\/?icid=gl_sl_opentip-lnk_sm-team_da287d1238e425b2&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">649C7CACDD545E30D015EDB9FCAB3A0C<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/be0c87a83267f1ce13b3f75c78eac295\/?icid=gl_sl_opentip-lnk_sm-team_3c8cdacb7d7453d2&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">BE0C87A83267F1CE13B3F75C78EAC295<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/78cb3abd00a1975bebeda852b2450873\/?icid=gl_sl_opentip-lnk_sm-team_9bef7d874ffe1584&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">78CB3ABD00A1975BEBEDA852B2450873<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/51703911dc437d4e3910ce7f866c970e\/?icid=gl_sl_opentip-lnk_sm-team_2b95085856d17200&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">51703911DC437D4E3910CE7F866C970E<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/fa53b0fcef08f8ff3ffddfee7f1f4f1a\/?icid=gl_sl_opentip-lnk_sm-team_86e503a30616282f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">FA53B0FCEF08F8FF3FFDDFEE7F1F4F1A<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/79d0eeafb30aa2bd4c261a51104f6acc\/?icid=gl_sl_opentip-lnk_sm-team_bb6cf00a7eb6b8d6&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">79D0EEAFB30AA2BD4C261A51104F6ACC<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/8da8f0339d17e2466b3d73236d18b835\/?icid=gl_sl_opentip-lnk_sm-team_4f27d4456bb6d0b0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">8DA8F0339D17E2466B3D73236D18B835<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/299a7e3d6118ad91a9b6d37f94ac685b\/?icid=gl_sl_opentip-lnk_sm-team_17eb86e143b9fc76&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">299A7E3D6118AD91A9B6D37F94AC685B<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/62afacc37b71d564d75a58fc161900c3\/?icid=gl_sl_opentip-lnk_sm-team_171ba5b1aae8298f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">62AFACC37B71D564D75A58FC161900C3<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/047a600e3afbf4286175badd4d88f131\/?icid=gl_sl_opentip-lnk_sm-team_2297b91a066842ed&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">047A600E3AFBF4286175BADD4D88F131<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/ed0ccada1fe1e13ef78553a48260d932\/?icid=gl_sl_opentip-lnk_sm-team_d0ba8f6d9659fb13&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">ED0CCADA1FE1E13EF78553A48260D932<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/c363cd87178fd660c25cdd8d978685f6\/?icid=gl_sl_opentip-lnk_sm-team_c7854f86d5a6e5ed&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">C363CD87178FD660C25CDD8D978685F6<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/61ff22ba4c3df7ae4a936fcfdeb020ea\/?icid=gl_sl_opentip-lnk_sm-team_f98fd4fe32f1bd89&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">61FF22BA4C3DF7AE4A936FCFDEB020EA<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/b51d9edc1dc8b6200f260589a4300009\/?icid=gl_sl_opentip-lnk_sm-team_9f9114f342800b62&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">B51D9EDC1DC8B6200F260589A4300009<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/923557554730247d37e782db3bea365d\/?icid=gl_sl_opentip-lnk_sm-team_4e2ffe50f7d5fa50&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">923557554730247D37E782DB3BEA365D<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/60c34ad7e1f183a973fb8ee29dc454e8\/?icid=gl_sl_opentip-lnk_sm-team_96029ce6a048fe9f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">60C34AD7E1F183A973FB8EE29DC454E8<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/0cc80a24841401529ec9c6a845609775\/?icid=gl_sl_opentip-lnk_sm-team_6bf171e453473433&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">0CC80A24841401529EC9C6A845609775<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/0ce06c962e07e63d780e5c2777a661fc\/?icid=gl_sl_opentip-lnk_sm-team_205242f0de5b6584&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">0CE06C962E07E63D780E5C2777A661FC<\/a><\/p>\n<h3 id=\"malicious-loaders\">Malicious loaders<\/h3>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/1b740b17e53c4daeed45148bfbee4f14\/?icid=gl_sl_opentip-lnk_sm-team_b092373827147459&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">1b740b17e53c4daeed45148bfbee4f14<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/3f99fed688c51977b122789a094fec2e\/?icid=gl_sl_opentip-lnk_sm-team_aef03c8678dc4eab&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">3f99fed688c51977b122789a094fec2e<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/8b0bbe7dc960f7185c330baa3d9b214c\/?icid=gl_sl_opentip-lnk_sm-team_38ef868fcf40da34&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">8b0bbe7dc960f7185c330baa3d9b214c<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/95db93454ec1d581311c832122d21b20\/?icid=gl_sl_opentip-lnk_sm-team_28fee4f9b7ef76b4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">95db93454ec1d581311c832122d21b20<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/646a680856f837254e6e361857458e17\/?icid=gl_sl_opentip-lnk_sm-team_495e41e1099424d2&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">646a680856f837254e6e361857458e17<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/8064f7ac9a5aa845ded6a1100a1d5752\/?icid=gl_sl_opentip-lnk_sm-team_1b8af51dddfbab70&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">8064f7ac9a5aa845ded6a1100a1d5752<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/d0cf8946acd3d12df1e8ae4bb34f1a6e\/?icid=gl_sl_opentip-lnk_sm-team_1d2efd653956e9fb&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">d0cf8946acd3d12df1e8ae4bb34f1a6e<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/db796d87acb7d980264fdcf5e94757f0\/?icid=gl_sl_opentip-lnk_sm-team_646bc7c6b8c085b3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">db796d87acb7d980264fdcf5e94757f0<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/e3cb4dafa1fb596e1e34e4b139be1b05\/?icid=gl_sl_opentip-lnk_sm-team_3419ef4def083937&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">e3cb4dafa1fb596e1e34e4b139be1b05<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/e0023eb058b0c82585a7340b6ed4cc06\/?icid=gl_sl_opentip-lnk_sm-team_9490f08d941ff0e9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">e0023eb058b0c82585a7340b6ed4cc06<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/0bf01810201004dcc484b3396607a483\/?icid=gl_sl_opentip-lnk_sm-team_cad52b89cf6c449e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">0bf01810201004dcc484b3396607a483<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/4c4fa06bd840405fbec34fe49d759e8d\/?icid=gl_sl_opentip-lnk_sm-team_82cb307958cd6fe3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">4C4FA06BD840405FBEC34FE49D759E8D<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/a539a07891a339479c596babe3060ea6\/?icid=gl_sl_opentip-lnk_sm-team_f507ccddf7889081&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">A539A07891A339479C596BABE3060EA6<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/b13f7ccbedfb71b0211c14afe0815b36\/?icid=gl_sl_opentip-lnk_sm-team_2baec09c535c4821&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">b13f7ccbedfb71b0211c14afe0815b36<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/f14275f8f420afd0f9a62f3992860d68\/?icid=gl_sl_opentip-lnk_sm-team_4a1c43f85f97b294&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">f14275f8f420afd0f9a62f3992860d68<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/3f41091afd6256701dd70ac20c1c79fe\/?icid=gl_sl_opentip-lnk_sm-team_953f93e004495392&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">3f41091afd6256701dd70ac20c1c79fe<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/5c4a57e2e40049f8e8a6a74aa8085c80\/?icid=gl_sl_opentip-lnk_sm-team_74ed3cef6eab1f6a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">5c4a57e2e40049f8e8a6a74aa8085c80<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/7e8feb501885eff246d4cb43c468b411\/?icid=gl_sl_opentip-lnk_sm-team_277602f0cd41c645&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">7e8feb501885eff246d4cb43c468b411<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/8aa104e64b00b049264dc1b01412e6d9\/?icid=gl_sl_opentip-lnk_sm-team_79eff611d9c63d07&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">8aa104e64b00b049264dc1b01412e6d9<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/8c63818261735ddff2fe98b3ae23bf7d\/?icid=gl_sl_opentip-lnk_sm-team_fc590b6b13d444c3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">8c63818261735ddff2fe98b3ae23bf7d<\/a><\/p>\n<h3 id=\"malicious-domains\">Malicious domains<\/h3>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/mysoliq-uz.com\/?icid=gl_sl_opentip-lnk_sm-team_7f2d8a588353f9a8&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">mysoliq-uz[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/my-xb.com\/?icid=gl_sl_opentip-lnk_sm-team_063eacbc304b5c74&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">my-xb[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/xarid-uz.com\/?icid=gl_sl_opentip-lnk_sm-team_4d104c8b27e2e06a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">xarid-uz[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/ach-uz.com\/?icid=gl_sl_opentip-lnk_sm-team_e55a364e6a028190&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">ach-uz[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/soliq-uz.com\/?icid=gl_sl_opentip-lnk_sm-team_6e6bb7a0746555f1&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">soliq-uz[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/minjust-kg.com\/?icid=gl_sl_opentip-lnk_sm-team_95f900030da5b80c&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">minjust-kg[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/esf-kg.com\/?icid=gl_sl_opentip-lnk_sm-team_3d85b4465aba3937&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">esf-kg[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/taxnotice-kg.com\/?icid=gl_sl_opentip-lnk_sm-team_cef65b5be65b8491&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">taxnotice-kg[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/notice-kg.com\/?icid=gl_sl_opentip-lnk_sm-team_cf6652ab3d0a8c1a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">notice-kg[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/proauditkg.com\/?icid=gl_sl_opentip-lnk_sm-team_dab9393e40b0d9f5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">proauditkg[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/kgauditcheck.com\/?icid=gl_sl_opentip-lnk_sm-team_2bc7d2ac31d7266b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">kgauditcheck[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/servicedoc-kg.com\/?icid=gl_sl_opentip-lnk_sm-team_bd813343a6044c89&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">servicedoc-kg[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/auditnotice-kg.com\/?icid=gl_sl_opentip-lnk_sm-team_3493a6ea6ca3b274&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">auditnotice-kg[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/tax-kg.com\/?icid=gl_sl_opentip-lnk_sm-team_742782e87620c6ed&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">tax-kg[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/rouming-uz.com\/?icid=gl_sl_opentip-lnk_sm-team_cf4eff57a80edec3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">rouming-uz[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/audit-kg.com\/?icid=gl_sl_opentip-lnk_sm-team_8b03d8496fd3216f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">audit-kg[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/kyrgyzstanreview.com\/?icid=gl_sl_opentip-lnk_sm-team_48eccf5c998f583e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">kyrgyzstanreview[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/salyk-notofocations.com\/?icid=gl_sl_opentip-lnk_sm-team_2b25e79d159f05aa&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">salyk-notofocations[.]com<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Stan Ghouls (also known as Bloody Wolf) is an cybercriminal group that has been launching targeted attacks against organizations in Russia, Kyrgyzstan, Kazakhstan, and Uzbekistan since at least 2023. These attackers primarily have their sights set on the manufacturing, finance, and IT sectors. Their campaigns are meticulously prepared and tailored to specific victims, featuring [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90,240,243,586,588,94,587,221,589,249],"tags":[91],"class_list":["post-1071","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-financial-threats","category-internet-of-things","category-mirai","category-netsupport-rat","category-phishing","category-rat","category-research","category-stan-ghouls","category-targeted-attacks","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Introduction Stan Ghouls (also known as Bloody Wolf) is an cybercriminal group that has been launching targeted attacks against organizations in Russia, Kyrgyzstan, Kazakhstan, and Uzbekistan since at least 2023. These attackers primarily have their sights set on the manufacturing, finance, and IT sectors. Their campaigns are meticulously prepared and tailored to specific victims, featuring [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-05T09:02:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT\",\"datePublished\":\"2026-02-05T09:02:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/\"},\"wordCount\":2272,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\",\"Financial threats\",\"Internet of Things\",\"Mirai\",\"NetSupport RAT\",\"Phishing\",\"RAT\",\"Research\",\"Stan Ghouls\",\"Targeted attacks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/\",\"name\":\"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg\",\"datePublished\":\"2026-02-05T09:02:19+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/","og_locale":"en_US","og_type":"article","og_title":"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT - Imperative Business Ventures Limited","og_description":"Introduction Stan Ghouls (also known as Bloody Wolf) is an cybercriminal group that has been launching targeted attacks against organizations in Russia, Kyrgyzstan, Kazakhstan, and Uzbekistan since at least 2023. These attackers primarily have their sights set on the manufacturing, finance, and IT sectors. Their campaigns are meticulously prepared and tailored to specific victims, featuring [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-02-05T09:02:19+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT","datePublished":"2026-02-05T09:02:19+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/"},"wordCount":2272,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity","Financial threats","Internet of Things","Mirai","NetSupport RAT","Phishing","RAT","Research","Stan Ghouls","Targeted attacks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/","name":"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg","datePublished":"2026-02-05T09:02:19+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/02\/05071357\/SL-Stan-Ghouls-featured-990x400.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/05\/stan-ghouls-targeting-russia-and-uzbekistan-with-netsupport-rat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=1071"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1071\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=1071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=1071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=1071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}