Back to reports
highPhishing

Storm-1811 Signed Nine Times: An EV Code Signing Certificate, DNS MX Tunneling, and a Ransomware Precursor Built in Four Iterations

PublishedMarch 12, 2026
Threat Actors:s stockpiled the certificate before use.ProfileAssessment**: Blitz Brigantine (a.k.a. Storm-1811, STAC5777)by Microsoft)s through likely fraudulent means.
phishingdll-sideloadingsocial-engineeringc2ransomwareexploitaptspearphishing

TL;DR: Nine malware samples from the A0Backdoor family surfaced on MalwareBazaar today -- all signed with a now-revoked Extended Validation code signing certificate issued to an Argentinian media company. The samples are the work of Blitz Brigantine (Storm-1811 / STAC5777), a Black Basta and Cactus ransomware affiliate targeting finance and healthcare across 10 countries. The attack chain abuses Microsoft Teams vishing and Quick Assist to deploy trojanized MSI installers that sideload a shellcode launcher DLL through legitimate Microsoft CrossDeviceService binaries. The backdoor phones home through DNS MX record tunneling -- a covert channel that hides C2 traffic inside what looks like routine email infrastructure lookups to Google and Cloudflare DNS. We reconstructed four distinct build iterations spanning December 9-17, 2025, identified two DLL sideloading vectors (hostfxr.dll and clipsp.dll), mapped the build pipeline's operational security failures, and authored four YARA rules for detection. This is the most APT-like cluster we have analyzed to date.


Why This One Matters

Most malware we process through GHOST lands somewhere on the commodity spectrum -- mass-distributed stealers, boilerplate loaders, infrastructure that screams "automated." This cluster is different. An EV code signing certificate does not fall off the back of a truck. Someone either compromised a legitimate Argentinian company or walked through SSL.com's identity verification process with forged documentation. The threat actors then used that certificate to sign nine distinct payloads across four build iterations, deployed them through Microsoft's own collaboration tools, and tunneled their command-and-control traffic through DNS MX records to avoid leaving a single direct connection to attacker infrastructure.

This is methodical. This is funded. And the end goal is ransomware.

The Delivery: Teams Vishing and Quick Assist Abuse

The initial access vector for this campaign does not involve a phishing email in the traditional sense. The operators behind Blitz Brigantine have adopted a social engineering playbook that exploits enterprise communication tools:

  1. Email bombing -- the target's inbox is flooded with subscription confirmations and spam, creating confusion and urgency
  2. Microsoft Teams call -- the attacker contacts the victim via Teams, impersonating IT support offering to "fix" the email problem
  3. Quick Assist session -- the victim grants remote access through Microsoft Quick Assist, a legitimate Windows remote support tool
  4. MSI deployment -- the attacker drops Update.msi via Microsoft cloud storage and executes it

This delivery chain is devastatingly effective because every tool involved is a legitimate Microsoft product. The victim never opens a suspicious attachment. They never click a phishing link. They grant access through the same Quick Assist workflow their real IT department uses. Most email security gateways and browser sandboxes never see a thing.

The Payload: Anatomy of an MSI That Looks Like Microsoft

The MSI installer masquerades as "Microsoft Cross Device Add-in" -- a product name close enough to real Microsoft branding that it would not raise flags during a casual review. Under the hood, the packaging is polished:

PropertyValue
Product NameCross Device Add-in
ManufacturerMicrosoft 3rd Party Application Component
Version25017.203.3370
Build ToolAdvanced Installer 19.9 (build de6d6401)
Install Path%LocalAppData%\Microsoft\CrossDevice Share\25017.203.3370\
ExecutionCustomAction type 1234 (hidden, async, SYSTEM context)

The install path is the detail that sells the disguise. It nests inside %LocalAppData%\Microsoft\ -- a directory that any sysadmin would recognize as a legitimate Microsoft application folder. The version number 25017.203.3370 mimics Microsoft's internal build numbering scheme.

The MSI drops four files into the install directory:

CrossDevice Share\25017.203.3370\
    |-- CrossDeviceService.exe    (legitimate .NET 9 apphost)
    |-- CrossDeviceService.dll    (legitimate .NET assembly, AOT-compiled)
    |-- hostfxr.dll               (TROJANIZED -- dll_sc_launcher.dll)
    |-- hostpolicy.dll            (legitimate .NET hosting)

Three of the four files are real Microsoft binaries, complete with PDB paths pointing to Microsoft's internal build infrastructure (D:\a\_work\1\s\artifacts\obj\win-x64.Release\). The fourth -- hostfxr.dll -- is the weapon.

The Sideload: Hijacking .NET's Own Loading Mechanism

DLL sideloading is not new. But sideloading through .NET's hosting layer is a particularly elegant choice. When CrossDeviceService.exe launches, it follows the standard .NET apphost initialization sequence: load hostfxr.dll, initialize the runtime, load the application assembly. The attacker replaces hostfxr.dll with their own DLL that exports all the expected functions (hostfxr_main, hostfxr_close, hostfxr_initialize_for_runtime_config) while silently executing a shellcode payload.

The internal name for all malicious DLLs is dll_sc_launcher.dll -- "DLL shellcode launcher." The attackers are not even being subtle in their own build artifacts.

We identified two sideloading vectors across the nine samples:

VectorFile ReplacedExport PatternSamples
.NET hostfxrhostfxr.dllhostfxr_* functions4 variants
Windows CLIPclipsp.dllClip* functions (ClipCallServer, ClipOpen, ClipClose)1 variant

The clipsp.dll variant targets Windows Client License Service Provider -- a completely separate sideloading chain built on the same day as hostfxr v3 (December 16, 2025). This parallel development of multiple sideloading vectors indicates the operators are actively diversifying their execution paths, likely to maintain access if one vector gets detected and blocked.

The Encryption: Dictionary Words as Camouflage

Each trojanized DLL carries a ~950KB encrypted blob in its .rdata section. The decryption routine is custom but not complex:

  1. The first byte of the encrypted buffer serves as a seed value
  2. Each subsequent byte is decrypted via a byte-wise subtraction loop
  3. The decryption key is derived from the lowercase ASCII string crossdeviceservice.exe -- the name of the host executable
  4. For each byte, the routine subtracts a value composed of the seed, the current loop index, and the corresponding key byte, with the key cycling at its null terminator
  5. An additional 55-hour time window check prevents decryption outside the expected execution window

That last detail is an anti-sandbox trick. Most automated sandbox runs complete in 5-15 minutes. If the malware checks the system clock and determines it is not within a 55-hour window relative to some baseline, it refuses to decrypt the payload. The sandbox sees nothing. The analyst sees nothing. The malware sits inert until real deployment.

But the most creative evasion technique is the dictionary padding. Random English words are embedded alongside the encrypted shellcode:

accordion, balaclava, calculator, precipitation,
psychiatrist, skullduggery, overclocking

These words serve a single purpose: entropy dilution. Encrypted data has high entropy (randomness), and many EDR products flag PE sections with entropy above a threshold as suspicious. By mixing in recognizable English words, the operators drag the overall section entropy down from near-theoretical maximum to a level that passes static analysis heuristics. The encrypted blob still registers at 7.51 entropy -- high, but no longer an automatic red flag when blended with plaintext strings.

The C2: Hiding in Plain DNS

This is the detail that elevates this campaign from "competent cybercrime" to "genuinely sophisticated." The A0Backdoor does not make HTTP callbacks. It does not connect to a hardcoded IP. It does not use a domain generation algorithm that resolves to attacker infrastructure. Instead, it communicates entirely through DNS MX record queries.

[A0Backdoor on victim machine]
        |
        | DNS MX query: <encoded_metadata>.fsdgh[.]com
        | (sent to 8.8.8.8 or 1.1.1.1)
        |
        v
[Google/Cloudflare public DNS resolvers]
        |
        | Recursive lookup to authoritative NS for fsdgh[.]com
        | (ns1.fsdgh[.]com / ns2.fsdgh[.]com -- attacker-controlled)
        |
        v
[Attacker's nameserver receives query, extracts encoded data]
        |
        | Returns commands encoded in MX record responses
        |
        v
[A0Backdoor receives MX response, executes commands]

This is covert channel design at its best. Here is why it works:

  1. DNS to 8.8.8.8 and 1.1.1.1 is universally whitelisted. Every corporate network allows DNS queries to Google and Cloudflare. Blocking them would break the internet.
  2. MX queries look like email infrastructure lookups. A network monitoring tool seeing MX queries thinks "someone is checking mail routing." It does not think "C2 channel."
  3. No direct connection to attacker infrastructure. The victim machine never touches an attacker-controlled IP. The DNS query travels through Google or Cloudflare's recursive resolver, which then contacts the attacker's authoritative nameserver. Firewall logs show traffic to 8.8.8.8 -- nothing actionable.
  4. The data channel is in the subdomain itself. Encoded victim metadata travels in the subdomain portion of the query (<encoded_data>.fsdgh[.]com), meaning the data exfiltration happens in the DNS query, not the response.
C2 IndicatorValue
Domainfsdgh[.]com
RegistrarRealtime Register B.V. (Netherlands)
Created2026-02-04 (34 days before MalwareBazaar upload)
NS1ns1.fsdgh[.]com (no glue records, unresolvable)
NS2ns2.fsdgh[.]com (no glue records, unresolvable)
DNSSECUnsigned
ProtocolDNS MX tunneling via public resolvers
Current StatusRegistered but NS offline

The nameservers are self-referential (ns1/ns2.fsdgh.com) with no glue records at the registry level, meaning they currently resolve to nothing. Either the infrastructure has been deliberately taken offline, or the operators are staging for the next phase.

The Certificate: Five Months of Stockpiling

The Authenticode signature on all nine samples traces back to a single Extended Validation code signing certificate:

FieldValue
Subject CNMULTIMEDIOS CORDILLERANOS SRL
CountryArgentina
ProvinceSan Juan
Tax ID (CUIT)30-71069624-8
IssuerSSL.com EV Code Signing Intermediate CA RSA R3
Valid From2025-07-21
Valid To2026-07-21
Thumbprint (SHA-256)f16c37e18db8c324dfe9a8922361610a7d4bf5b723ca7bd8c724819a6cf417d2
StatusREVOKED

EV code signing certificates are the gold standard of software trust. Obtaining one requires physical verification of the organization, government-issued identification, and a call-back to a verified phone number. These are not self-signed certificates you generate in five minutes. Someone either compromised Multimedios Cordilleranos SRL -- a real media company in San Juan, Argentina -- or fabricated documentation convincing enough to pass SSL.com's verification process.

The timeline is telling: the certificate was issued July 21, 2025. The first signed malware sample appeared December 9, 2025. That is a five-month gap between acquisition and first use. The operators stockpiled the certificate, waiting until their tooling was ready before burning it.

During the active campaign window, this certificate was fully valid and trusted. Windows SmartScreen would have waved these binaries through. EDR products that use code signing as a trust signal would have scored them as low risk. The certificate has since been revoked by SSL.com, but the damage window -- from first signing in December through revocation -- gave the operators months of trusted execution.

The Build Pipeline: Four Iterations in Nine Days

Authenticode timestamps across all nine samples reveal a rapid development cycle that leaked significant operational security details:

DateTime (UTC)Event
2025-07-2117:34EV certificate issued by SSL.com
2025-12-0915:48hostfxr.dll v1 compiled and signed
2025-12-0915:50MSI v1 packaged and signed (+2 min)
2025-12-1116:41hostfxr.dll v2 compiled and signed
2025-12-1116:44MSI v2 packaged and signed (+3 min)
2025-12-1615:29hostfxr.dll v3 compiled and signed
2025-12-1615:32MSI v3 packaged and signed (+3 min)
2025-12-1615:42clipsp.dll variant signed (+10 min)
2025-12-1714:50hostfxr.dll v4 signed (new imphash)
2025-12-1714:53MSI v4 packaged and signed (+3 min)
2026-02-0417:29fsdgh[.]com registered
2026-03-1010:56All 9 samples uploaded to MalwareBazaar

Several things jump out:

The 2-3 minute gap between DLL signing and MSI packaging is consistent across all four builds. This is an automated build pipeline -- compile the DLL, sign it, drop it into the MSI template, sign the MSI. The consistency eliminates manual intervention.

The imphash changes between v3 and v4. Three of the four hostfxr.dll variants share imphash cb24c83e9e0f68a811d65891b8e7dc53. The fourth (December 17) has a different imphash (8f1fd2927973be754986ef34afeba09d), indicating the source code was modified between December 16 and 17. Given that the MSI template and clean files remained identical, this confirms a modular pipeline where only the malicious DLL is swapped between builds.

All four MSIs share identical ProductCode, UpgradeCode, and version strings. The only file that changes is the trojanized hostfxr.dll. New encrypted shellcode payloads are compiled and inserted into the same MSI template. This is production-grade malware engineering.

Attack Chain

[Email Bombing / Microsoft Teams Vishing]
         |
         v
[Victim grants Quick Assist remote access]
         |
         v
[Update.msi deployed via Microsoft Cloud Storage]
         |
         v
[MSI installs to %LocalAppData%\Microsoft\CrossDevice Share\25017.203.3370\]
    |-- CrossDeviceService.exe  (legitimate .NET 9 apphost)
    |-- CrossDeviceService.dll  (legitimate .NET assembly)
    |-- hostfxr.dll             (TROJANIZED - dll_sc_launcher.dll)
    |-- hostpolicy.dll          (legitimate .NET hosting)
         |
         v
[CrossDeviceService.exe loads hostfxr.dll via .NET init sequence]
         |
         v
[hostfxr.dll decrypts ~950KB shellcode from .rdata]
[Key: "crossdeviceservice.exe" + seed byte + positional index]
[Anti-sandbox: 55-hour time window, QEMU detection, IsDebuggerPresent]
         |
         v
[A0Backdoor shellcode executes in memory]
         |
         v
[DNS MX queries to <encoded>.fsdgh[.]com via 8.8.8.8 / 1.1.1.1]
[Metadata encoded in high-entropy subdomains]
[Commands returned in MX record responses]
         |
         v
[Lateral movement --> Ransomware deployment (Black Basta / Cactus)]

What We Found vs. What Was Known

BlueVoyant published initial reporting on the A0Backdoor family and its connection to Storm-1811. Our analysis extends their findings substantially:

AspectPrior Reporting (BlueVoyant)Our Analysis
Samples analyzed2 hashes mentioned9 samples fully analyzed (4 MSI + 5 DLL)
Build iterationsNot documented4 distinct builds reconstructed (Dec 9-17)
Sideloading vectorshostfxr.dll onlyhostfxr.dll (4 variants) + clipsp.dll (1 variant)
Certificate statusActive at time of reportNow REVOKED by SSL.com
Imphash clusteringNot documented2 distinct imphash clusters, code change between v3/v4
Encrypted payload detail"Custom byte-wise decryption"~950KB blob, entropy 7.51, dictionary word padding technique
Build pipeline analysisNot documentedAutomated 2-3 min DLL-to-MSI cycle, Advanced Installer 19.9
C2 domain statusfsdgh.com reported as activeNS servers offline, no glue records

Anti-Analysis Techniques

The operators layer multiple evasion mechanisms, each targeting a different class of defender:

TechniqueTarget DefenderImplementation
EV code signingSmartScreen, EDR trust chainsRevoked cert from Multimedios Cordilleranos SRL
55-hour time windowAutomated sandboxesDecryption refuses to proceed outside window
QEMU artifact detectionVM-based analysisChecks for QEMU hardware strings
IsDebuggerPresentManual reversingStandard anti-debug API
Dictionary word paddingStatic entropy analysisEnglish words dilute section entropy below alert threshold
Runtime-only decryptionDisk forensicsPayload never exists in plaintext on disk
Heavy thread pool usageBehavioral analysisCreateThread, CreateThreadpoolTimer, CreateThreadpoolWait
Legitimate sideload hostApplication whitelistingReal Microsoft binary loads the malicious DLL

Indicators of Compromise

Network Indicators

# C2 Domain (DNS MX tunneling)
fsdgh[.]com

# C2 DNS pattern
*[.]fsdgh[.]com (MX queries via 8[.]8[.]8[.]8 and 1[.]1[.]1[.]1)

File Indicators -- MSI Installers

# MSI v1 - Update.msi (2025-12-09)
SHA-256: 7a1914bdc09b3f4cb6c64d3ff13585e52cb1e61acb96b798f811674a67f528d3

# MSI v2 - Update (2).msi (2025-12-11)
SHA-256: 1ec97383327393c772d3664b126150431617a4882b5e0b20b0cb240fdbf0eab1

# MSI v3 - Update (4).msi (2025-12-16)
SHA-256: 0c99481dcacda99014e1eeef2e12de3db44b5db9879ce33204d3c65469e969ff

# MSI v4 - Update (3).msi (2025-12-17)
SHA-256: a68683df0f2f8dd594d5c1554f62a2fd60ac42f130c75c1a12b6c99e445649fa

File Indicators -- Trojanized DLLs

# hostfxr.dll v1 (2025-12-09) -- imphash: cb24c83e9e0f68a811d65891b8e7dc53
SHA-256: 3da98d2e328c4878eb3c43ab560dda53370b87bbaa900253e5e871db457bb239

# hostfxr.dll v2 (2025-12-11) -- imphash: cb24c83e9e0f68a811d65891b8e7dc53
SHA-256: d618cbee8607403c41f3c5528c4998258d29f5a06461de3e47e09b5e67c16c39

# hostfxr.dll v3 (2025-12-16) -- imphash: cb24c83e9e0f68a811d65891b8e7dc53
SHA-256: 26db06a2319c09918225e59c404448d92fe31262834d70090e941093e6bb650a

# hostfxr.dll v4 (2025-12-17) -- imphash: 8f1fd2927973be754986ef34afeba09d
SHA-256: 77d916998e9e9b5c248b464d83ec199dec6ad56b8c12e53f3d60568975b8580d

# clipsp.dll variant (2025-12-16) -- imphash: 338888d33faf3d11abed4461126e3456
SHA-256: b6017c2f4fa83c28bcee7ec80e7c06f67b02835b61fa51a21cc5b6915352830c

File Indicators -- Clean Sideloading Components

# CrossDeviceService.exe (legitimate .NET 9 apphost)
SHA-256: 0a03fe00baf9381c31144ff6bc937036585b991e25e9c3ff4eb1581ddab84a4f

# CrossDeviceService.dll (legitimate .NET assembly)
SHA-256: 3bbaa1fe8f8698966a182f8636d7e3b882ebf95429eebcbf1fb35a3c0f6245ad

# hostpolicy.dll (legitimate .NET hosting)
SHA-256: b602ce56d1e017d51a4542530db02087fd7f0a1218f4bbd4e35cae8b82a3c734

Certificate Indicators

# EV Code Signing Certificate (REVOKED)
Thumbprint (SHA-256): f16c37e18db8c324dfe9a8922361610a7d4bf5b723ca7bd8c724819a6cf417d2
Serial:               2F2E62C3A8A3A4B85C44D3DF84D6D41A
Subject CN:           MULTIMEDIOS CORDILLERANOS SRL
Issuer:               SSL.com EV Code Signing Intermediate CA RSA R3

Behavioral Indicators

# Install path
%LocalAppData%\Microsoft\CrossDevice Share\25017.203.3370\

# Internal DLL name (all variants)
dll_sc_launcher.dll

# MSI identifiers
ProductCode:  {298A183F-68CC-4B11-840F-66749C9DD8BB}
UpgradeCode:  {36A917B0-FC49-454C-83C3-8C35D88FAA2F}

# Fuzzy hashes (primary MSI)
SSDEEP: 49152:92SX7jizoL5laI3xBBkpu7+is6PhvIg6Wsl5q0hWrACxtFTSxKP8pIEmM:J0ssiYWsBQZHSCMDmM
TLSH:   T1CFE50122738BC626C55D02B0159AEB5E1139FDB34B3450E7B7E8392F98F44C26779B82

MITRE ATT&CK Mapping

TacticTechniqueIDImplementation
Initial AccessPhishing: Spearphishing via ServiceT1566.003Microsoft Teams social engineering
ExecutionUser Execution: Malicious FileT1204.002Update.msi execution via Quick Assist
ExecutionSystem Services: Windows InstallerT1218.007MSI CustomAction type 1234 (SYSTEM context)
PersistenceHijack Execution Flow: DLL Side-LoadingT1574.002hostfxr.dll / clipsp.dll replacement
Defense EvasionSubvert Trust Controls: Code SigningT1553.002EV certificate (Multimedios Cordilleranos SRL)
Defense EvasionObfuscated Files or InformationT1027Encrypted shellcode + dictionary word padding
Defense EvasionVirtualization/Sandbox EvasionT1497.001QEMU detection, 55-hour time window
Defense EvasionDebugger EvasionT1622IsDebuggerPresent API check
Defense EvasionMasquerading: Match Legitimate NameT1036.005"Microsoft Cross Device Add-in" branding
Command and ControlApplication Layer Protocol: DNST1071.004DNS MX-based C2 tunneling
Command and ControlProtocol TunnelingT1572Data encoded in DNS subdomain queries
DiscoveryProcess DiscoveryT1057Process enumeration
DiscoverySystem Language DiscoveryT1614.001Locale checks

Detection: YARA Rules

rule A0Backdoor_DLL_SC_Launcher {
    meta:
        author = "GHOST - Breakglass Intelligence"
        description = "Detects A0Backdoor DLL shellcode launcher (hostfxr.dll variant)"
        date = "2026-03-10"
        tlp = "TLP:CLEAR"
        severity = "CRITICAL"
        reference = "https://intel.breakglass.tech"
    strings:
        $internal_name = "dll_sc_launcher.dll" ascii
        $export1 = "hostfxr_main" ascii
        $export2 = "hostfxr_close" ascii
        $export3 = "hostfxr_initialize_for_runtime_config" ascii
        $cert_subject = "MULTIMEDIOS CORDILLERANOS SRL" ascii
        $cert_serial = { 2F 2E 62 C3 A8 A3 A4 B8 5C 44 D3 DF 84 D6 D4 1A }
    condition:
        uint16(0) == 0x5A4D and
        $internal_name and
        2 of ($export*) and
        ($cert_subject or $cert_serial)
}

rule A0Backdoor_MSI_Dropper {
    meta:
        author = "GHOST - Breakglass Intelligence"
        description = "Detects A0Backdoor MSI installer packages"
        date = "2026-03-10"
        tlp = "TLP:CLEAR"
        severity = "CRITICAL"
    strings:
        $msi_magic = { D0 CF 11 E0 A1 B1 1A E1 }
        $product = "Cross Device Add-in" wide ascii
        $manufacturer = "Microsoft 3rd Party Application Component" wide ascii
        $upgrade_code = "{36A917B0-FC49-454C-83C3-8C35D88FAA2F}" ascii
        $product_code = "{298A183F-68CC-4B11-840F-66749C9DD8BB}" ascii
        $cert = "MULTIMEDIOS CORDILLERANOS SRL" ascii
    condition:
        $msi_magic at 0 and
        $cert and
        2 of ($product, $manufacturer, $upgrade_code, $product_code)
}

rule A0Backdoor_Clipsp_Sideload {
    meta:
        author = "GHOST - Breakglass Intelligence"
        description = "Detects A0Backdoor clipsp.dll sideloading variant"
        date = "2026-03-10"
        tlp = "TLP:CLEAR"
        severity = "CRITICAL"
    strings:
        $internal = "dll_sc_launcher.dll" ascii
        $clip1 = "ClipCallServer" ascii
        $clip2 = "ClipOpen" ascii
        $clip3 = "ClipClose" ascii
        $clip4 = "ClipGetLicenseData" ascii
        $cert = "MULTIMEDIOS CORDILLERANOS SRL" ascii
    condition:
        uint16(0) == 0x5A4D and
        $internal and
        3 of ($clip*) and
        $cert
}

rule A0Backdoor_Generic_SC_Launcher {
    meta:
        author = "GHOST - Breakglass Intelligence"
        description = "Generic detection for A0Backdoor shellcode launcher via dictionary padding signature"
        date = "2026-03-10"
        tlp = "TLP:CLEAR"
        severity = "HIGH"
    strings:
        $internal = "dll_sc_launcher.dll" ascii
        $pad1 = "accordion" ascii
        $pad2 = "balaclava" ascii
        $pad3 = "calculator" ascii
        $pad4 = "precipitation" ascii
        $pad5 = "skullduggery" ascii
        $pad6 = "psychiatrist" ascii
    condition:
        uint16(0) == 0x5A4D and
        $internal and
        3 of ($pad*)
}

Hunting Queries

Endpoint -- search for install directory:

file_path:*\\Microsoft\\CrossDevice Share\\25017.203.3370\\*

Endpoint -- dll_sc_launcher.dll in loaded modules:

loaded_module_name:"dll_sc_launcher.dll" OR
loaded_module_internal_name:"dll_sc_launcher.dll"

Network -- DNS MX queries to unusual domains from endpoints:

dns_query_type:"MX" AND
NOT dns_query:(*.google.com OR *.microsoft.com OR *.outlook.com) AND
source_type:"endpoint"

Network -- high-entropy subdomain queries (DNS tunneling indicator):

dns_query_entropy:>3.5 AND
dns_query:*fsdgh.com

Certificate -- Authenticode signatures from revoked cert:

authenticode_thumbprint:"f16c37e18db8c324dfe9a8922361610a7d4bf5b723ca7bd8c724819a6cf417d2" OR
authenticode_serial:"2F2E62C3A8A3A4B85C44D3DF84D6D41A" OR
authenticode_subject:"MULTIMEDIOS CORDILLERANOS SRL"

Immediate (24-48 hours)

  • Block fsdgh[.]com at the DNS resolver level -- not just the IP. Block the domain itself so MX queries never leave your network.
  • Add all 9 SHA-256 hashes to EDR blocklists (MSIs and DLLs).
  • Block the certificate thumbprint (f16c37e...6cf417d2) in code signing policies and application control rules.
  • Hunt for the install path %LocalAppData%\Microsoft\CrossDevice Share\25017.203.3370\ on all endpoints.
  • Hunt for dll_sc_launcher.dll in loaded module telemetry.
  • Alert on DNS MX queries to unknown or low-reputation domains originating from endpoint IPs (not mail servers).

Short-term (1-2 weeks)

  • Implement DNS logging with entropy analysis -- subdomain entropy above 3.5 bits/character combined with MX query type is a strong tunneling indicator.
  • Review Microsoft Teams external communication policies -- restrict external users from initiating calls or chats with internal users.
  • Audit Quick Assist usage -- restrict Quick Assist to authorized IT staff via Group Policy. Consider blocking it entirely and using a managed remote support tool.
  • Deploy the YARA rules above to mail gateways, file share scanners, and endpoint agents.
  • Check MSI installation logs for packages signed by non-Microsoft certificates installing to Microsoft paths.

Medium-term (1-3 months)

  • Implement code signing certificate allowlisting for binaries in system and Microsoft application directories.
  • Deploy DLL sideloading detection via Sysmon EventID 7 (Image Load) -- flag unsigned or non-Microsoft DLLs loaded by Microsoft-signed executables.
  • Build DNS tunneling detection capabilities -- monitor for anomalous MX query volumes, high-entropy subdomains, and DNS queries to newly registered domains from endpoint IPs.
  • Review EV certificate trust in your environment -- consider whether you need to trust all EV certificates or can restrict to a subset of known CAs.

Attribution

We attribute this activity to Blitz Brigantine (also tracked as Storm-1811 by Microsoft and STAC5777 by Sophos) with HIGH confidence based on:

  1. Exact TTP match -- DLL sideloading via CrossDeviceService + hostfxr.dll is documented as exclusive A0Backdoor tooling for this group
  2. Same certificate -- the Multimedios Cordilleranos SRL certificate was explicitly named in BlueVoyant's A0Backdoor reporting
  3. Same delivery chain -- MSI installers masquerading as Microsoft updates, delivered via Teams vishing + Quick Assist
  4. Same C2 protocol -- DNS MX-based tunneling via public resolvers
  5. Consistent targeting -- finance and healthcare sectors across US, UK, Germany, Canada, Australia, France, Japan, South Korea, Singapore, and Switzerland

Blitz Brigantine operates as an affiliate for both Black Basta and Cactus ransomware operations. The A0Backdoor is the precursor: once persistent access is established, the operators conduct reconnaissance and lateral movement before handing off to the ransomware deployment team. If you find this backdoor in your environment, assume the clock is already ticking.

References


Published by Breakglass Intelligence. Investigation conducted 2026-03-10. 9 samples analyzed. 4 build iterations reconstructed. 2 sideloading vectors identified. 1 revoked EV certificate. DNS MX tunneling C2 confirmed. Classification: TLP:CLEAR

Share