‘Librarian Ghouls’ APT Group Launches Ongoing Malware Attacks on Organizations

A sophisticated cyber espionage campaign attributed to the advanced persistent threat (APT) group known as “Librarian Ghouls” also tracked as “Rare Werewolf” and “Rezet” continues to target organizations in Russia and the CIS region.

The group is notable for its extensive use of legitimate third-party utilities and off-the-shelf tools, which complicates both detection and attribution efforts.

Activity from this actor has persisted through May 2025, with a surge in attacks following a brief lull in late 2024.

Infection Vector

Librarian Ghouls leverage highly targeted spear-phishing emails delivered in the Russian language.

Librarian Ghouls
Example of a phishing page associated with the APT campaign

According to Secure List Report, these emails contain password-protected archives mimicking official documents, such as payment orders.

The infection is triggered when victims extract and open these files, which initiate a self-extracting installer created with Smart Install Maker.

Upon execution, the installer deploys benign decoys, the curl utility, and a LNK shortcut, all placed within the C:\Intel directory.

The core malicious functionality is orchestrated via command and PowerShell scripts encoded in the installer’s configuration file.

These scripts automate several key actions: deploying the legitimate 4t Tray Minimizer (used to mask malicious windows in the system tray), extracting further payloads, and enabling remote access.

The installer executes a batch file (rezet.cmd), which downloads additional binaries from a command-and-control (C2) server.

These include a custom WinRAR executable (driver.exe), the mail-sending tool Blat (blat.exe), AnyDesk for remote desktop control, Defender Control to disable Windows Defender protections, and further batch scripts.

The attack chain continues with the deployment of scheduled tasks designed to shut down the compromised system at 5 AM daily, hindering victim awareness and providing a window for attacker activities.

A PowerShell script (wol.ps1) is leveraged to wake the system and launch Microsoft Edge at 1 AM, ensuring the device is available for remote sessions before the scheduled daily shutdown.

Exfiltration mechanisms use Blat to collect and transmit credentials, including those for cryptocurrency wallets, browser passwords, registry hives (HKLM\SAM, HKLM\SYSTEM), and seed phrases.

Crypto Mining

Towards the end of the infection chain, the threat actors install a crypto miner by downloading an installer from attacker infrastructure.

Librarian Ghouls
PDF document imitating a payment order

This installer checks for existing miner processes and downloads the XMRig mining toolset if not detected.

The miner is configured via a local JSON file and designed to maximize efficiency by collecting system specs, including CPU, RAM, and GPU information, all of which are also communicated to the C2 servers.

Persistence is maintained through scheduled tasks and the deployment of additional legitimate utilities such as Mipko Personal Monitor (for keylogging and screenshots), WebBrowserPassView (for password collection), ngrok (reverse proxy), and NirCmd for covert script execution.

Analysis of the attacker’s infrastructure has identified multiple active C2 domains and public-facing web servers with directory listing enabled, exposing stored malicious payloads.

The majority of observed victims are Russian industrial enterprises and educational institutions, with additional targets in Belarus and Kazakhstan.

All phishing artifacts and decoy documents are localized for Russian-speaking users, aligning with the threat actor’s known focus.

Librarian Ghouls exhibit traits commonly found in hacktivist operations: frequent updates to their toolset, reliance on scripting, and avoidance of custom malware binaries in favor of widely available legitimate utilities.

The group continues to refine its methods, notably expanding into credential phishing and multi-stage data exfiltration while maintaining a strong emphasis on operational stealth.

Indicators of Compromise (IOC)

TypeValue/Hash/DomainDescription
C2 Serverdowndown[.]ru, dragonfires[.]ruPrimary command and control
C2 IP185.125.51[.]5Hosting malicious infrastructure
Malicious Domainsusers-mail[.]ru, deauthorization[.]online, bmapps[.]org, and othersPhishing and malware delivery
Installer Hashesd8edd46220059541ff397f74bfd271336dda702c6b1869e8a081c71f595a9e68 (and more)Malicious install files
BAT Script Hashese880a1bb0e7d422b78a54b35b3f53e348ab27425f1c561db120c0411da5c1ce9 (and more)Malicious BAT batch files
PS1 Script Hashes8b6afbf73a9b98eec01d8510815a044cd036743b64fef955385cbca80ae94f15 (and more)Malicious PowerShell scripts
Miner Hash649ee35ad29945e8dd6511192483dddfdfe516a1312de5e0bd17fdd0a258c27fMiner install binary
Legitimate SoftwareAnyDesk, Mipko Personal Monitor, Blat, curl, WebBrowserPassView, ngrok, NirCmd, 4t Tray MinimizerUsed for persistence, exfiltration, or remote access

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Update

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here