Tuesday, March 17, 2026

Python Malware Targets Windows Systems Through Cloudflare Tunnels Exploited by Hackers

A new wave of cyberattacks, dubbed SERPENTINE#CLOUD, is leveraging Python, Cloudflare tunneling services, and deceptive file tactics to compromise Windows computers worldwide stealthily.

This evolving campaign, uncovered by Securonix researchers, exhibits a multi-layered infection chain that blends social engineering with advanced technical evasion, marking a concerning shift in how malware can bypass traditional security controls.

Initial Infection: Disguised Shortcuts and Phishing Lures

The attack begins with a well-orchestrated phishing campaign, where victims receive emails offering invoice or payment-related documents.

Attached or linked within are ZIP files containing malicious shortcut (.lnk) files made to look like harmless PDFs.

What sets this campaign apart is the use of customized icons and file names that conceal their true nature, even if users have file extensions visible in Windows Explorer.

Once executed, these .lnk files trigger a sophisticated sequence of events. Using built-in Windows utilities such as cmd.exe and robocopy, the malware silently downloads additional payloads via WebDAV over HTTPS from attacker-controlled Cloudflare Tunnel subdomains, such as flour-riding-merit-refers.trycloudflare.com.

Cloudflare Tunnels are intended for legitimate remote access and testing, but in this campaign, they provide a secure, encrypted channel for malware distribution, making network monitoring and attribution far more difficult.

Technical Sophistication: Obfuscated Payloads and Modular Execution

The next stage involves executing downloaded scripts typically Windows Script Files (WSF) or batch files, that further obfuscate and modularize the attack chain. For example, after the initial .lnk file executes, it retrieves a script like tank.wsf, which in turn downloads and runs a highly obfuscated batch file (kiki.bat).

These scripts employ advanced obfuscation techniques, including encoding and dynamic command construction, to evade detection by antivirus and endpoint protection platforms.

The batch scripts serve as primary delivery mechanisms, downloading compressed Python packages and additional malicious scripts.

These downloads and extractions take place in the user’s Contacts directory, an unconventional path that often goes unnoticed by security tools.

The scripts then establish persistence by dropping VBS and batch files into the Windows startup folder, ensuring continued execution upon system reboot.

Memory-Resident Malware and Remote Control

At the heart of this campaign are Python-based shellcode loaders, designed to decrypt and execute payloads entirely in memory. The main loader, run.py, uses XOR encryption and leverages native Windows APIs to inject shellcode into a legitimate process such as notepad.exe.

This Early Bird APC injection technique enables malicious code to execute before the process performs its intended functions, effectively hiding the malware from many endpoint detection and response (EDR) solutions.

The final payload, often packed with the open-source Donut loader, is decrypted and executed in memory, leaving minimal forensic evidence on disk.

Once activated, the malware beacons out to command and control (C2) servers hosted on both Cloudflare tunnel subdomains and custom domains, giving attackers full remote control over infected machines.

Commonly observed C2 infrastructure includes domains like nhvncpure.shop and dynamic DNS services such as duckdns.org.

Conclusion and Recommendations

The SERPENTINE#CLOUD campaign highlights the growing sophistication of cybercriminal tactics, blending social engineering, legitimate web services, and in-memory execution to evade detection.

Organizations are advised to implement strict email filtering, monitor unusual script execution in non-standard directories, and establish robust endpoint logging to detect and respond to advanced threats.

As attackers continue to innovate, vigilance and adaptive security measures remain the best defense against these evolving risks.

Indicator of Compromise

File NameSHA256
Online-wire-confirmation-receipt846752.zip193218243C54D7903C65F5E7BE9B865DDB286DA9005C69E6E955E31EC3EFA1A7
Online-wire-confirmation-receipt75857.zip3B97A79ED920A508B4CD91240D0795713C559C36862C75EC6C9A41B4EC05D279
wire-confirmation-55281762.url32253D3EA50927D0FD79F5BFDD6EE93C46AA26126CE4360D9915FABD2E5F562F
Emban.zip81C47E749E8A3376294DE8593C2387A0642080303BB17D902BABFF1DE561E743
bab.zip017FD2003F8EAA65FF85131322F5FAEC1E338511788328438020848EDF3DFD8D
22DE5FFC9BFFE49C4713113AC171B95E016ED0F09065BFEE1394A579174E8DD6
E78FF6F51A3FAECF4D20CD5B71B2396B7C2FEC74AF19122B1E1EEE432C13B773  
cam.zip100970B2EB83E3A80CB463126845619A05C979D235B07ECA4B1C2027772334EC
63FFC2B66E32111CD5BE311AD499BD15DA5D28EDC05B7F3DA43DFE77F3E2C7F8
F6B403D719D770FFB6CC310E2F97889998224A563A1A629BE5B7F8642B5F00BA
FTSP.zip0484DE293F2C125132CAA585229A8702AF00CB645AA27684C2EE6F9F4F3EDB6F
python.zipFCAD11819FCA303372182C881397E0B607C0DA64ECDA1CF9B2C87CF5F8F5957A
B57F591866A0D5A68B76382476087310A6F96C34B9449D070619DF6B763E6A1D

Recent News

Recent News