Skip to main content

Command Palette

Search for a command to run...

When Microsoft Teams is no longer Teams: The truth behind the trojanized RustDesk version

Published
7 min read
When Microsoft Teams is no longer Teams: The truth behind the trojanized RustDesk version

Overview

A sophisticated attack campaign was recently discovered, where the attacker distributes a fake Microsoft Teams installer (MSTeamsSetup.exe) to secretly introduce a trojanized version of RustDesk into the system.

What makes this campaign particularly dangerous is that the malicious file is signed with a valid digital signature under the name "Zlatin Stamatov." This "disguise" allows the malware to easily bypass common defense mechanisms like AV or EDR, which typically trust digitally signed software.

Hidden behind the scenes is a command and control (C2) infrastructure with many signs matching previous activities of the "calipology" group, known for the Striker C2 framework. Instead of developing malware from scratch, the attacker chooses a "smarter" path: exploiting a legitimate tool like RustDesk, but silently reconfiguring it to automatically connect to their server as soon as it's installed.

Event timeline

The campaign demonstrates long-term infrastructure preparation before actual deployment:

Event timeline Event Details
07/05/2025 Domain Registration systemautoupdater[.]com was registered through GoDaddy.
01/06/2025 DNS configuration Update the DNS records, setting up the infrastructure to remain hidden for nearly a year.
14/03/2026 Certificate Issuance Digital signature issued to "Zlatin Stamatov" (Certum Code Signing).
09/04/2026 Detection The first malware samples appeared on MalwareBazaar and CAPE Sandbox.

Main impact

The danger level of this attack chain doesn't lie in using overly complex techniques, but in its ability to "bypass" the current defense systems of businesses.

Bypassing EDR due to being "pre-approved" (whitelisted): The attacker exploits remote desktop software like RustDesk, AnyDesk, or TeamViewer. These are legitimate tools often pre-approved by companies. Therefore, when malware is hidden within these programs, security systems (EDR, Antivirus) overlook them, failing to conduct thorough checks, leaving the SOC team almost blind to any anomalies.

Staying hidden on the victim's machine for a long time: Unlike typical viruses that easily cause errors or slow down the computer, the modified version of RustDesk continues to function normally. Users might even believe they installed it at the IT department's request. This allows the attacker to remain undetected in the system for weeks or months without raising suspicion.

Opening the way for data theft and ransomware: Once they control the machine, hackers can:

  • View the screen, copy clipboard data

  • Retrieve passwords from the password manager

  • Use tools like Rclone to transfer data externally.

Details of the infection process

Step 1: Lure (SEO Poisoning / Malvertising)

In this campaign, the attacker uses SEO poisoning techniques or fake advertising (malvertising) on search engines. When users search for keywords like "Download Microsoft Teams" or "MS Teams setup," they are directed to a fake website that resembles Microsoft's homepage but is actually hosted on the attacker's infrastructure (e.g., subdomains of systemautoupdater[.]com).

Step 2: Download and Bypass Security (Signed Payload)

After reaching the attacker's website, users download the file MSTeamsSetup.exe (approximately 14.3 MB) — this file is, of course, embedded with malicious code.

The first line of defense is Windows SmartScreen, which typically alerts if a file lacks a digital signature. However, the attacker embedded a valid digital signature:

Signer: Zlatin Stamatov

Issuer: Certum Code Signing 2021 CA

Thumbprint: 0c8bb17a1c27a39817f4e1bd74b6c616fba3faef909f94772e685e64fe34cef3

Having a digital signature allows this file to bypass many basic antivirus solutions and creates a false sense of security for users when checking the file properties (Properties -> Digital Signatures).

Step 3: Execute and Compromise (Trojanized RustDesk)

When users run the installer file: Silent Execution: Instead of installing Teams, this file is actually a wrapper around the RustDesk client. It automatically extracts and executes RustDesk components in the temporary directory (%TEMP% or %APPDATA%).

Hardcoded Configuration: This version of RustDesk has been modified (weaponized) to bypass the usual connection verification steps. Parameters like Server ID, Relay Server, and Key are pre-set to point to the attacker's infrastructure.

Establishment: An encrypted connection is established to mon.systemautoupdater[.]com. The attacker can now see the victim's machine appear in their control list.

Analysis of Infrastructure and OPSEC Failures

The infrastructure of this campaign reveals a contradiction between thorough preparation and mistakes in OPSEC (Operational Security).

Infrastructure Overlap

The C2 server at IP 23.27.141[.]44 (EvoXT, New York) is hosting extremely suspicious services:

Port 443 (HTTPS): Uses a TLS certificate issued for calipology[.]com. This is the key linking this campaign to the "calipology" entity on Telegram, which has been tracked in previous Striker C2 campaigns.

Port 3004 (Trading Bots): A cryptocurrency trading bot management dashboard (written in Svelte/Vue) is publicly exposed. This suggests the attacker's ultimate financial goal may be to gain wallet access or execute unauthorized transactions on the victim's machine.

Port 21 (FTP): vFTPd 3.0.5 is open with a configuration requiring login, commonly used to exfiltrate data from the victim's machine to the central server.

Typical vulnerabilities

Reuse of TLS Property: Keeping the certificate for calipology[.]com on the same server as the malware is a major mistake, allowing researchers to link identities.

Redirection: Direct access to port 443 of the C2 IP is redirected to https://calipology\[.\]co\[.\]uk - the website of a legitimate business in the UK (brake pad restoration). This might be an attempt to create a "legitimate business" cover for the activities.

Expert opinion

The "Calvary" campaign exemplifies the trend of "Living-off-the-Land Tools" (LotLT). Instead of expending resources to develop sophisticated RAT malware, the attacker simply customizes legitimate Remote Desktop software.

In Vietnam, the risk from software installation packages from "external sources" (Google search links instead of official websites) remains high due to the habits of small and medium-sized business users. The presence of malware with valid digital signatures further increases the risk of bypassing IT teams' controls, which often prioritize whitelisting digitally signed applications. Additionally, the discovery of the "Trading Bot" dashboard indicates that individual users involved in cryptocurrency trading are a primary target for this group.

MITRE ATT&CK Mapping

Tactic Technique ID
Resource Development Acquire Infrastructure: VPS T1583.003
Resource Development Obtain Capabilities: Code Signing Certificates T1588.003
Initial Access Drive-by Compromise T1189
Execution User Execution: Malicious File T1204.002
Defense Evasion Subvert Trust Controls: Code Signing T1553.002
Defense Evasion Masquerading: Match Legitimate Name T1036.005
Command and Control Application Layer Protocol: Web T1071.001
Command and Control Remote Access Software T1219

IOC & Artifacts

Network Indicators

  • C2 Domain: mon.systemautoupdater[.]com

  • C2 IP: 23.27.141[.]44 (EvoXT)

  • Infrastructure Domains: systemautoupdater[.]com, calipology[.]com

  • Redirect Target: calipology[.]co[.]uk

File Indicators

  • Filename: MSTeamsSetup.exe

  • SHA256: d01148808fbeefa22cd4541cdaaee8bc1f74e3045302115dc5b08b99ff93dc9c

  • Cert Serial: 57193231454133499427671191024346513426

  • Cert Thumbprint: 0C8BB17A1C27A39817F4E1BD74B6C616FBA3FAEF909F94772E685E64FE34CEF3

Recommendation (Mitigation)

Immediate (0-24h)

  • Block all IPs and domains in the IOC list at the firewall/proxy layer.

  • Review DNS logs or proxy logs to search for connections to subdomains of systemautoupdater[.]com.

  • Conduct threat hunting on EDR to find RustDesk processes executing from uncommon paths or with suspicious outbound connection parameters.

Short-term (1-7 days)

  • Implement a policy to block the execution of applications not approved by IT (Application Whitelisting/AppLocker).

  • Alert users to prioritize using the Microsoft Store or the official microsoft.com site to download MS Teams.

Long-term

  • Establish a process for regularly checking unusual digital certificates (Code Signing) appearing in the system.

  • Transition to a Zero Trust model, strictly controlling remote management connections (RMM), even those from "legitimate" tools.

Refer

https://intel.breakglass.tech/post/systemautoupdater-23-27-141-44 https://bazaar.abuse.ch/sample/d01148808fbeefa22cd4541cdaaee8bc1f74e3045302115dc5b08b99ff93dc9c/ https://www.capesandbox.com/analysis/60828/

Analysis MSTeamsSetup.exe (MD5: FF8505309831284BFF66A1CFD5049DAC) Malicious activity - Interactive analysis ANY.RUN

More from this blog

F

FPT IS Security

759 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.