Back to reports
highRAT

Calipology / SystemAutoUpdater — Trojanized RustDesk via Signed MSTeams Installer

InvestigatedApril 9, 2026PublishedApril 9, 2026
Threat Actors:may have ties to or is spoofing a Philippines location"calipology" (Telegram handle from Striker investigation)Assessment
systemautoupdaterc2ratcloudflaretelegramtorrustdeskmsteams

TLP: WHITE Date: 2026-04-09 Analyst: GHOST (Breakglass Intelligence) Classification: Cybercrime — Trojanized Remote Access Tool Distribution Lead Credit: @JohnEskimSmith (reply to Breakglass GeorgeGinx/Striker thread)


Executive Summary

A trojanized Microsoft Teams installer (MSTeamsSetup.exe) has been identified distributing a weaponized RustDesk remote access client, code-signed with a fraudulent certificate issued to "Zlatin Stamatov" via Certum. The C2 domain mon.systemautoupdater[.]com resolves to 23.27.141[.]44, an EvoXT-hosted server whose TLS certificate is issued to calipology[.]com — a domain directly tied to the "calipology" Telegram handle identified in our prior GeorgeGinx/Striker C2 investigation. This confirms that the Striker C2 operator has expanded operations from Striker C2 framework deployment to trojanized software distribution using signed RustDesk payloads. The operator appears to run a legitimate UK brake caliper refurbishment business (calipology[.]co[.]uk) as their real-world identity or cover.

Key Findings

  • CONFIRMED infrastructure overlap with GeorgeGinx/Striker investigation: TLS certificate on 23.27.141[.]44:443 is issued to CN=calipology[.]com with SANs for calipology[.]com and www.calipology[.]com — the same handle ("calipology") from our prior Striker C2 Telegram attribution
  • Same hosting provider: EvoXT (ASN AS149440), same provider used in the original Striker C2 infrastructure
  • Trojanized MSTeams installer: 14 MB PE file masquerading as legitimate Microsoft Teams Setup, actually deploys weaponized RustDesk remote access
  • Code-signed payload: Signed by "Zlatin Stamatov" via Certum Code Signing 2021 CA, certificate valid 2026-03-14 to 2027-03-14 — this is either a stolen certificate or a fraudulently obtained one
  • HTTPS redirect to real business: mon.systemautoupdater[.]com on port 443 redirects to https://calipology[.]co[.]uk, a legitimate UK brake caliper refurbishment business registered since Nov 2019
  • "Trading Bots Management" panel on port 3004: A Python SimpleHTTP-served Svelte/Vue application titled "Trading Bots Management" — suggests additional criminal activity (crypto trading fraud or bot management)
  • Active infrastructure: 5 open ports (21/FTP, 22/SSH, 80/HTTP, 443/HTTPS, 8080/nginx, 3004/Python HTTP)
  • GoDaddy Website Builder "decoy": The apex systemautoupdater[.]com is a GoDaddy Website Builder placeholder page with locale en-PH (Philippines), suggesting the actor may have ties to or is spoofing a Philippines location

Infrastructure Map

THREAT ACTOR: "calipology" (Telegram handle from Striker investigation)
  |
  |-- LEGITIMATE BUSINESS (COVER):
  |     calipology[.]co[.]uk (Brake Caliper Refurbs, UK)
  |       Registered: 2019-11-22 (Squarespace/Nominet)
  |       NS: sid.ns.cloudflare.com / zoe.ns.cloudflare.com
  |       IPs: 172.67.202[.]93, 104.21.44[.]175 (Cloudflare)
  |       Content: WordPress, LiteSpeed, legitimate business site
  |
  |-- C2 DOMAIN (calipology brand):
  |     calipology[.]com
  |       Registered: 2025-06-16 (GoDaddy, privacy-protected)
  |       NS: beth.ns.cloudflare.com / derek.ns.cloudflare.com
  |       IPs: 104.21.4[.]11, 172.67.223[.]239 (Cloudflare)
  |       TLS cert on server: Sectigo DV, issued 2025-06-16
  |       Content: GoDaddy Website Builder "Brake Caliper Refurbs"
  |
  |-- MALWARE C2 DOMAIN:
  |     systemautoupdater[.]com
  |       Registered: 2025-05-07 (GoDaddy, Domains By Proxy)
  |       NS: ns59.domaincontrol.com / ns60.domaincontrol.com
  |       Apex IPs: 76.223.105[.]230, 13.248.243[.]5 (AWS Global Accelerator)
  |       mon.systemautoupdater[.]com -> 23.27.141[.]44 (EvoXT)
  |       Content: GoDaddy Website Builder placeholder ("Launching Soon", en-PH)
  |       SOA serial: 2025060100 (last DNS update June 1, 2025)
  |       TLS certs: GoDaddy CA, 6 certificates since May 2025 (quarterly)
  |
  |-- C2 SERVER:
        23.27.141[.]44 (EvoXT, AS149440, New York City)
          Port 21:   vsFTPd 3.0.5 (login required)
          Port 22:   OpenSSH 9.6p1 (Ubuntu 24.04)
          Port 80:   Apache 2.4.58 (default Ubuntu page)
          Port 443:  Apache 2.4.58 (TLS: CN=calipology[.]com, Sectigo)
                     HTTPS -> 302 redirect to https://calipology[.]co[.]uk
          Port 3004: Python SimpleHTTP/0.6 (Python 3.12.3)
                     Serving: "Trading Bots Management" (Svelte SPA)
          Port 8080: nginx 1.26.2 (default page)

Attack Chain

Victim searches for "MS Teams Download"
         |
         v
   [Malicious Site] --> MSTeamsSetup.exe (14 MB, code-signed PE)
                              |  Signed by: "Zlatin Stamatov"
                              v
                   [Trojanized RustDesk Client]
                              |
                              v
                   C2: mon.systemautoupdater[.]com
                          (23.27.141[.]44)
                              |
                              v
                   [Full Remote Access via RustDesk]
                   [File Transfer via FTP :21]
                   [Trading Bot Management :3004]

Malware Analysis

Sample Details

AttributeValue
SHA256d01148808fbeefa22cd4541cdaaee8bc1f74e3045302115dc5b08b99ff93dc9c
SHA193aa31051cd1bac3bb2ffddb71f93330dcab9d89
MD5ff8505309831284bff66a1cfd5049dac
File NameMSTeamsSetup.exe
File Size14,058,976 bytes (13.4 MB)
File TypePE32 executable (I386)
Imphash6d5e13c0269946a5a10390c178d8e9a5
SSDeep393216:YaJ1HSHwSmh3UhzxrY+hyBGih0bRjDHfTczLcpyPjGm6hkDf2B73v:...
First Seen2026-04-08 13:58:24 UTC
Origin CountryHU (Hungary)
Reportersmica83 (MalwareBazaar)
SignatureRustDesk
Downloads128 (as of investigation date)

Code Signing Certificate

AttributeValue
Subject CNZlatin Stamatov
Issuer CNCertum Code Signing 2021 CA
Algorithmsha256WithRSAEncryption
Valid From2026-03-14T10:18:47Z
Valid To2027-03-14T10:18:46Z
Serial0f971773c38e4b32acb121855151baa4
Thumbprint (SHA256)0c8bb17a1c27a39817f4e1bd74b6c616fba3faef909f94772e685e64fe34cef3

Assessment: "Zlatin Stamatov" appears to be a Bulgarian name. The certificate was issued just 25 days before the sample appeared on MalwareBazaar, suggesting it was obtained specifically for signing malware. No other samples on MalwareBazaar are signed by this entity. Certum (Asseco, Poland) is commonly used for Eastern European code signing.

Connection to GeorgeGinx/Striker Investigation

Evidence Chain

EvidenceDetailConfidence
TLS CertificateServer at 23.27.141[.]44:443 serves cert CN=calipology[.]comDEFINITIVE
Hosting ProviderBoth servers hosted on EvoXT (AS149440)HIGH
Telegram Handle"calipology" attributed to Striker C2 operatorDEFINITIVE
RegistrarBoth domains via GoDaddy + Domains By ProxyHIGH
HTTPS RedirectC2 server redirects to calipology[.]co[.]uk businessHIGH

Attribution Assessment

  • Confidence: HIGH
  • Country/Region: United Kingdom (calipology[.]co[.]uk validated by Nominet, registered since 2019)
  • Possible ties: Philippines (en-PH locale), Hungary (sample origin), Bulgaria (cert signer name)
  • Motivation: Financial — trojanized RustDesk for unauthorized remote access + crypto trading bots
  • Evolution: Escalated from Striker C2 framework to signed trojanized software distribution

Operational Security Failures

  1. Reused infrastructure: Same EvoXT hosting for both Striker C2 and RustDesk C2
  2. TLS certificate leak: Left calipology[.]com cert on C2 server, linking to identity
  3. HTTPS redirect to personal business: Port 443 redirects to brake caliper refurb business
  4. Exposed management panel: "Trading Bots Management" on port 3004
  5. Default pages: Apache/nginx defaults still serving — sloppy hardening

Domain Infrastructure Timeline

DateEvent
2019-11-22calipology[.]co[.]uk registered (legitimate business)
2025-05-07systemautoupdater[.]com registered (GoDaddy)
2025-05-07First GoDaddy SSL cert for systemautoupdater[.]com
2025-06-01SOA serial update
2025-06-16calipology[.]com registered (GoDaddy)
2025-06-16Sectigo TLS cert for calipology[.]com (on C2 server)
2025-06-16Apache page last modified on 23.27.141[.]44
2025-09-22nginx installed on port 8080
2026-03-06Latest GoDaddy cert for systemautoupdater[.]com
2026-03-14"Zlatin Stamatov" code signing cert obtained
2026-04-08MSTeamsSetup.exe first on MalwareBazaar
2026-04-09Investigation — all services LIVE

MITRE ATT&CK Mapping

TacticTechniqueID
Resource DevelopmentAcquire Infrastructure: VPST1583.003
Resource DevelopmentObtain Capabilities: Code Signing CertificatesT1588.003
Initial AccessDrive-by CompromiseT1189
ExecutionUser Execution: Malicious FileT1204.002
Defense EvasionSubvert Trust Controls: Code SigningT1553.002
Defense EvasionMasquerading: Match Legitimate NameT1036.005
Command and ControlApplication Layer Protocol: WebT1071.001
Command and ControlRemote Access SoftwareT1219

IOC Summary

Network Indicators

TypeValueContextStatus
Domainsystemautoupdater[.]comC2 apex domainLIVE
Domainmon[.]systemautoupdater[.]comActive C2 subdomainLIVE
Domaincalipology[.]comActor identity domainLIVE
Domaincalipology[.]co[.]ukActor legitimate businessLIVE
IP23[.]27[.]141[.]44C2 server (EvoXT)LIVE
IP76[.]223[.]105[.]230Apex (AWS)LIVE
IP13[.]248[.]243[.]5Apex (AWS)LIVE

File Indicators

TypeValue
SHA256d01148808fbeefa22cd4541cdaaee8bc1f74e3045302115dc5b08b99ff93dc9c
SHA193aa31051cd1bac3bb2ffddb71f93330dcab9d89
MD5ff8505309831284bff66a1cfd5049dac
Imphash6d5e13c0269946a5a10390c178d8e9a5
Cert Thumbprint0c8bb17a1c27a39817f4e1bd74b6c616fba3faef909f94772e685e64fe34cef3
Cert Serial0f971773c38e4b32acb121855151baa4

TLS Certificate on C2 Server

AttributeValue
CNcalipology[.]com
IssuerSectigo Public Server Authentication CA DV R36
Serial48:a0:69:6c:33:f7:d5:71:37:02:46:55:5e:3a:f0:94
Valid2025-06-16 to 2026-06-16
SANscalipology[.]com, www[.]calipology[.]com

Immediate (24-48 hours)

  • Block all IOCs at network perimeter
  • Search for RustDesk connecting to systemautoupdater[.]com
  • Check for cert thumbprint 0c8bb17a... on signed binaries
  • Report "Zlatin Stamatov" certificate to Certum for revocation

Short-term (1-2 weeks)

  • Abuse report to EvoXT (abuse@evoxt.com) for 23.27.141[.]44
  • Abuse report to GoDaddy for systemautoupdater[.]com
  • Monitor CT logs for new subdomains

Medium-term (1-3 months)

  • Monitor calipology infrastructure for migration
  • Track Certum cert serial for reuse
  • Watch MalwareBazaar for new "Zlatin Stamatov" signed samples

References


GHOST — Breakglass Intelligence "One indicator. Total infrastructure."

Share