TLP: WHITE
Date: 2026-04-09
Analyst: GHOST (Breakglass Intelligence)
Classification: Cybercrime — Trojanized Remote Access Tool Distribution
Lead Credit: @JohnEskimSmith (reply to Breakglass GeorgeGinx/Striker thread)
Executive Summary
A trojanized Microsoft Teams installer (MSTeamsSetup.exe) has been identified distributing a weaponized RustDesk remote access client, code-signed with a fraudulent certificate issued to "Zlatin Stamatov" via Certum. The C2 domain mon.systemautoupdater[.]com resolves to 23.27.141[.]44, an EvoXT-hosted server whose TLS certificate is issued to calipology[.]com — a domain directly tied to the "calipology" Telegram handle identified in our prior GeorgeGinx/Striker C2 investigation. This confirms that the Striker C2 operator has expanded operations from Striker C2 framework deployment to trojanized software distribution using signed RustDesk payloads. The operator appears to run a legitimate UK brake caliper refurbishment business (calipology[.]co[.]uk) as their real-world identity or cover.
Key Findings
CONFIRMED infrastructure overlap with GeorgeGinx/Striker investigation: TLS certificate on 23.27.141[.]44:443 is issued to CN=calipology[.]com with SANs for calipology[.]com and www.calipology[.]com — the same handle ("calipology") from our prior Striker C2 Telegram attribution
Same hosting provider: EvoXT (ASN AS149440), same provider used in the original Striker C2 infrastructure
Trojanized MSTeams installer: 14 MB PE file masquerading as legitimate Microsoft Teams Setup, actually deploys weaponized RustDesk remote access
Code-signed payload: Signed by "Zlatin Stamatov" via Certum Code Signing 2021 CA, certificate valid 2026-03-14 to 2027-03-14 — this is either a stolen certificate or a fraudulently obtained one
HTTPS redirect to real business: mon.systemautoupdater[.]com on port 443 redirects to https://calipology[.]co[.]uk, a legitimate UK brake caliper refurbishment business registered since Nov 2019
"Trading Bots Management" panel on port 3004: A Python SimpleHTTP-served Svelte/Vue application titled "Trading Bots Management" — suggests additional criminal activity (crypto trading fraud or bot management)
Active infrastructure: 5 open ports (21/FTP, 22/SSH, 80/HTTP, 443/HTTPS, 8080/nginx, 3004/Python HTTP)
GoDaddy Website Builder "decoy": The apex systemautoupdater[.]com is a GoDaddy Website Builder placeholder page with locale en-PH (Philippines), suggesting the actor may have ties to or is spoofing a Philippines location
Infrastructure Map
THREAT ACTOR: "calipology" (Telegram handle from Striker investigation)
|
|-- LEGITIMATE BUSINESS (COVER):
| calipology[.]co[.]uk (Brake Caliper Refurbs, UK)
| Registered: 2019-11-22 (Squarespace/Nominet)
| NS: sid.ns.cloudflare.com / zoe.ns.cloudflare.com
| IPs: 172.67.202[.]93, 104.21.44[.]175 (Cloudflare)
| Content: WordPress, LiteSpeed, legitimate business site
|
|-- C2 DOMAIN (calipology brand):
| calipology[.]com
| Registered: 2025-06-16 (GoDaddy, privacy-protected)
| NS: beth.ns.cloudflare.com / derek.ns.cloudflare.com
| IPs: 104.21.4[.]11, 172.67.223[.]239 (Cloudflare)
| TLS cert on server: Sectigo DV, issued 2025-06-16
| Content: GoDaddy Website Builder "Brake Caliper Refurbs"
|
|-- MALWARE C2 DOMAIN:
| systemautoupdater[.]com
| Registered: 2025-05-07 (GoDaddy, Domains By Proxy)
| NS: ns59.domaincontrol.com / ns60.domaincontrol.com
| Apex IPs: 76.223.105[.]230, 13.248.243[.]5 (AWS Global Accelerator)
| mon.systemautoupdater[.]com -> 23.27.141[.]44 (EvoXT)
| Content: GoDaddy Website Builder placeholder ("Launching Soon", en-PH)
| SOA serial: 2025060100 (last DNS update June 1, 2025)
| TLS certs: GoDaddy CA, 6 certificates since May 2025 (quarterly)
|
|-- C2 SERVER:
23.27.141[.]44 (EvoXT, AS149440, New York City)
Port 21: vsFTPd 3.0.5 (login required)
Port 22: OpenSSH 9.6p1 (Ubuntu 24.04)
Port 80: Apache 2.4.58 (default Ubuntu page)
Port 443: Apache 2.4.58 (TLS: CN=calipology[.]com, Sectigo)
HTTPS -> 302 redirect to https://calipology[.]co[.]uk
Port 3004: Python SimpleHTTP/0.6 (Python 3.12.3)
Serving: "Trading Bots Management" (Svelte SPA)
Port 8080: nginx 1.26.2 (default page)
Attack Chain
Victim searches for "MS Teams Download"
|
v
[Malicious Site] --> MSTeamsSetup.exe (14 MB, code-signed PE)
| Signed by: "Zlatin Stamatov"
v
[Trojanized RustDesk Client]
|
v
C2: mon.systemautoupdater[.]com
(23.27.141[.]44)
|
v
[Full Remote Access via RustDesk]
[File Transfer via FTP :21]
[Trading Bot Management :3004]
Assessment: "Zlatin Stamatov" appears to be a Bulgarian name. The certificate was issued just 25 days before the sample appeared on MalwareBazaar, suggesting it was obtained specifically for signing malware. No other samples on MalwareBazaar are signed by this entity. Certum (Asseco, Poland) is commonly used for Eastern European code signing.
Connection to GeorgeGinx/Striker Investigation
Evidence Chain
Evidence
Detail
Confidence
TLS Certificate
Server at 23.27.141[.]44:443 serves cert CN=calipology[.]com
DEFINITIVE
Hosting Provider
Both servers hosted on EvoXT (AS149440)
HIGH
Telegram Handle
"calipology" attributed to Striker C2 operator
DEFINITIVE
Registrar
Both domains via GoDaddy + Domains By Proxy
HIGH
HTTPS Redirect
C2 server redirects to calipology[.]co[.]uk business
HIGH
Attribution Assessment
Confidence: HIGH
Country/Region: United Kingdom (calipology[.]co[.]uk validated by Nominet, registered since 2019)