Saturday, January 17, 2026

VLC Player Exploited by Elephant APT Group in Cyberattack on Defense Sector Using Encrypted Shellcode

Arctic Wolf Labs has identified a sophisticated cyber-espionage campaign by the Dropping Elephant APT group targeting Turkish defense contractors, specifically a manufacturer of precision-guided missile systems.

The campaign showcases a significant technical evolution from the group’s previous operations, employing a five-stage execution chain that leverages the popular VLC Media Player through DLL side-loading techniques to deliver encrypted shellcode payloads.

Strategic Targeting of Turkish Defense Industry

The attack centers on a carefully crafted spear-phishing campaign using malicious LNK files disguised as conference invitations for the “Unmanned Vehicle Systems Conference 2025 in Istanbul.”

The timing appears deliberately aligned with heightened Turkey-Pakistan defense cooperation and recent India-Pakistan military tensions, suggesting geopolitically motivated targeting

The threat actor leverages Turkey’s commanding 65% share of the global UAV export market and its critical development of hypersonic missile capabilities as strategic intelligence objectives.

The initial vector involves a malicious LNK file (SHA-256: 341f27419becc456b52d6fbe2d223e8598065ac596fa8dec23cc722726a28f62) that executes PowerShell commands to download five distinct components from the malicious domain expouav[.]org, which mimics the legitimate conference website waset.org

The downloaded files include a visual PDF decoy, legitimate VLC Player and Microsoft Task Scheduler binaries, a malicious DLL library, and encrypted shellcode stored as vlc.log.

Technical Evolution and Advanced Evasion Methods

Dropping Elephant has significantly evolved its technical capabilities, transitioning from x64 DLL variants observed in November 2024 to current x86 PE executables with enhanced command structures

 Legitimate waset.org website with the same conference information used by the fake PDF-based replica.

The group has reduced library dependencies and implemented direct C2 command parsing using the C-standard library’s strtok() function with dollar sign delimiters, indicating deliberate operational security improvements.

The attack establishes persistence through a scheduled task that abuses VLC Media Player to side-load the malicious libvlc.dll file (SHA-256: 2cd2a4f1fc7e4b621b29d41e42789c1365e5689b4e3e8686b80f80268e2c0d8d)

The shellcode is decrypted using the key “76bhu93FGRjZX5hj876bhu93FGRjX5” and becomes a 139.37 KB x86 PE executable capable of comprehensive system reconnaissance.

The malware creates a mutex named “ghjghkj” to prevent multiple instances and performs extensive victim profiling, including collecting computer names, gathering usernames, retrieving firmware information, and enabling screenshot capture functionality

Communication occurs through the C2 server roseserve[.]org, which impersonates Turkey’s Pardus Linux distribution project website to maintain operational security.

The infrastructure analysis reveals sophisticated preparation, with domain registrations beginning in June 2025 and active operations commencing in July 2025, demonstrating careful campaign planning rather than opportunistic targeting

Arctic Wolf Labs has implemented new detections in its Aurora Platform to protect customers against this evolving threat.

Indicators of Compromise (IOCs)

File Indicators

NameSHA-256
Unmanned_Vehicle_Systems_Conference_2025_In_Istanbul.lnk341f27419becc456b52d6fbe2d223e8598065ac596fa8dec23cc722726a28f62
Unmanned_Vehicle_Systems_Conference_2025_In_Istanbul.pdf588021b5553838fae5498de40172d045b5168c8e608b8929a7309fd08abfaa93
lake (libvlc.dll)2cd2a4f1fc7e4b621b29d41e42789c1365e5689b4e3e8686b80f80268e2c0d8d
vlc.log89ec9f19958a442e9e3dd5c96562c61229132f3acb539a6b919c15830f403553

Recent News

Recent News