{"id":429,"date":"2026-03-30T11:05:55","date_gmt":"2026-03-30T11:05:55","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=429"},"modified":"2026-03-30T11:05:55","modified_gmt":"2026-03-30T11:05:55","slug":"russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=429","title":{"rendered":"Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Mar 30, 2026<\/span><\/span><span class=\"p-tags\">Malware \/ Network Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh05CEOtp0cIlsi1qDK4HRH2PPOFyvB5jca65pAQVsnCfBHZ-wRGt0s8VhvzO_l-4Q9H_xGKQsO_efVGzJ46ElLQNaq_FEp6wPUou4aqTvEKMPlEEGOTyEtISTj0VkC5QmO38HuxWehNDTUkdvCVCCp-GrIPWJyFt4dTLp1TIbqW8hAiVEJ-vxnoKUexR6-\/s1700-e365\/ctrl-ctrl.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that&#8217;s distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders.<\/p>\n<p>The <strong>CTRL<\/strong> toolkit, according to Censys, is custom-built using .NET and includes various executables\u00bb to facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling via Fast Reverse Proxy (FRP).<\/p>\n<p>\u00abThe executables provide encrypted payload loading, credential harvesting via a polished Windows Hello phishing UI, keylogging, RDP session hijacking, and reverse proxy tunneling through FRP,\u00bb Censys security researcher Andrew Northern <a href=\"https:\/\/censys.com\/blog\/under-ctrl-dissecting-a-previously-undocumented-russian-net-access-framework\/\" rel=\"noopener\" target=\"_blank\">said<\/a>.<\/p>\n<p>The attack surface management platform said it recovered CTRL from an open directory at 146.19.213[.]155 in February 2026. Attack chains distributing the toolkit rely on a weaponized LNK file (\u00abPrivate Key #kfxm7p9q_yek.lnk\u00bb) with a folder icon to trick users into double-clicking it.<\/p>\n<p>This triggers a multi-stage process, with each stage decrypting or decompressing the next, until it leads to the deployment of the toolkit. The LNK file dropper is designed to launch a hidden PowerShell command, which then wipes existing persistence mechanisms from the victim&#8217;s Windows Startup folder.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/not-fast-enough-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhlXM830ruQd2xT6M7JNeNRjaFa1onD12WjSCHihTFMTzbyfT9h-irPmXy_h3E1HGSs6sdv7FTmnyNVTM5kmSb7BuUtZe8gKoTQt99P1sSzRcqqXpOJP6eoAOhR3DGb6qHx9kOZ_HBZUMmVnsnd0DM7QfUp81bgzTvvgLww6oqB-EhnDfWXH5pWCYhAsyLs\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>It also decodes a Base64-encoded blob and runs it in memory. The stager, for its part, tests TCP connectivity to hui228[.]ru:7000 and downloads next-stage payloads from the server. Furthermore, it modifies firewall rules, sets up persistence using scheduled tasks, creates backdoor local users, and spawns a cmd.exe shell server on port 5267 that&#8217;s accessible through the FRP tunnel.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>One of the downloaded payloads, \u00abctrl.exe,\u00bb functions as a .NET loader for launching an embedded payload, the CTRL Management Platform, which can serve either as a server or a client depending on the command-line arguments. Communication occurs over a Windows named pipe.<\/p>\n<p>\u00abThe dual-mode design means the operator deploys ctrl.exe once on the victim (via the stager), then interacts with it by running ctrl.exe client through the FRP-tunneled RDP session,\u00bb Censys said. \u00abThe named pipe architecture keeps all C2 command traffic local to the victim machine \u2014 nothing traverses the network except the RDP session itself.\u00bb<\/p>\n<p>The supported commands allow the malware to gather system information, launch a module designed for credential harvesting, and start a keylogger as a background service (if configured as a server) to capture all keystrokes to a file named \u00abC:\\Temp\\keylog.txt\u00bb by installing a keyboard hook, and exfiltrate the results.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYj6OjS1oR64ByDgk4vLMP8990lF5dvAb0ZvA_oU33CsC_i_fqE95S2fyYpqrAUfzvHG67-1P8mc_fA-5DnSgCVLvwzFu5df_qvttbj7m2CbgaGR6lNW5DUxWRilmUxn5XY_nzsjh5lbM3W4Alzga-6H3gYlZyIKeIiQMh1C0EHCBwkmEGPcVoNU1vi7TN\/s1700-e365\/ctrl.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYj6OjS1oR64ByDgk4vLMP8990lF5dvAb0ZvA_oU33CsC_i_fqE95S2fyYpqrAUfzvHG67-1P8mc_fA-5DnSgCVLvwzFu5df_qvttbj7m2CbgaGR6lNW5DUxWRilmUxn5XY_nzsjh5lbM3W4Alzga-6H3gYlZyIKeIiQMh1C0EHCBwkmEGPcVoNU1vi7TN\/s1700-e365\/ctrl.jpg\" alt=\"\" border=\"0\" data-original-height=\"709\" data-original-width=\"900\"\/><\/a><\/div>\n<p>The credential harvesting component is launched as a Windows Presentation Foundation (WPF) application that mimics a real Windows PIN verification prompt to capture the system PIN. The module, besides blocking attempts to escape the phishing window via keyboard shortcuts like Alt+Tab, Alt+F4, or F4, validates the entered PIN against the real Windows credential prompt via UI automation by using the <a href=\"https:\/\/learn.microsoft.com\/en-us\/dotnet\/api\/system.windows.forms.sendkeys\" rel=\"noopener\" target=\"_blank\">SendKeys()<\/a> method.<\/p>\n<p>\u00abIf the PIN is rejected, the victim is looped back with an error message,\u00bb Northern explained. \u00abThe window remains open even if the PIN successfully validates against the actual Windows authentication system. The captured PIN is logged with the prefix [STEALUSER PIN CAPTURED] to the same keylog file used by the background keylogger.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ciso-risk-comm-cert-li-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjoqpwvMkmQTpI6oFBcM5sjZJ4sJ2YplYYhb-ceY5aPYSXjkfcX-xHTDS-SMK3wzNy_kFuH4yN1umKPloMnloAmmRc5nXo64laMkM5neZzco95ZJXnRH-iV-6vAXRDv8vCSgWdcloM_rsNLykF6rlZbcXQ2n2fT-No23La_8rS67S8terJhozZU9JPmB9kO\/s728-e100\/ciso-light-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>One of the commands built into the toolkit allows it to send toast notifications impersonating web browsers like Google Chrome, Microsoft Edge, Brave, Opera, Opera GX, Vivaldi, Yandex, and Iron to conduct additional credential theft or deliver other payloads. The two other payloads dropped as part of the attack are listed below &#8211;<\/p>\n<ul>\n<li>FRPWrapper.exe, which is a Go DLL that&#8217;s <a href=\"https:\/\/github.com\/schellingb\/DLLFromMemory-net\" rel=\"noopener\" target=\"_blank\">loaded in memory<\/a> to establish reverse tunnels for RDP and a raw TCP shell through the operator&#8217;s FRP server.<\/li>\n<li>RDPWrapper.exe, which enables unlimited concurrent RDP sessions.<\/li>\n<\/ul>\n<p>\u00abThe toolkit demonstrates deliberate operational security. None of the three hosted binaries contain hard-coded C2 addresses,\u00bb Censys said. \u00abAll data exfiltration occurs through the FRP tunnel via RDP \u2014 the operator connects to the victim\u2019s desktop and reads keylog data through the ctrl named pipe. This architecture leaves minimal network forensic artifacts compared to traditional C2 beacon patterns.\u00bb<\/p>\n<p>\u00abThe CTRL toolkit demonstrates a trend toward purpose-built, single-operator toolkits that prioritize operational security over feature breadth. By routing all interaction through FRP reverse tunnels to RDP sessions, the operator avoids the network-detectable beacon patterns that characterize commodity RATs.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Mar 30, 2026Malware \/ Network Security Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that&#8217;s distributed via malicious Windows shortcut (LNK) files that are disguised as private&hellip;<\/p>\n","protected":false},"author":1,"featured_media":430,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[957,959,236,962,774,960,33,961,54,958,963],"class_list":["post-429","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-ctrl","tag-delivered","tag-files","tag-frp","tag-hijacks","tag-lnk","tag-malicious","tag-rdp","tag-russian","tag-toolkit","tag-tunnels"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=429"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/429\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/430"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}