Kaspersky’s GReAT team has pulled back the curtain on a deliberately targeted cyber‑espionage operation they call PassiveNeuron, a campaign that focuses on Windows Server hosts and employs a multi‑stage DLL loader chain, two previously undocumented implants (Neursite and NeuralExecutor) and Cobalt Strike to maintain persistent, stealthy access across government, financial and industrial networks in Asia, Africa and Latin America.
PassiveNeuron was first observed in 2024 and — after an apparent six‑month lull — revived activity from December 2024 through August 2025, according to Kaspersky’s public disclosure and accompanying Securelist technical write‑up. The operator(s) go after internet‑facing servers, especially Microsoft SQL and other server stacks, using web‑application and database abuse as an initial foothold before deploying a multi‑stage native/.NET implant ecosystem.
This is a server‑centric APT playbook: servers exposed to the internet give attackers high‑value pivot points and opportunities for long‑term C2, lateral movement and data collection. The campaign’s technical craftsmanship — large, purposefully padded DLLs, multi‑stage loaders, sandbox checks and selective activation windows — shows an operator that values stealth and narrow, long‑term access over noisy mass compromise.
The loader behavior includes:
Key operational takeaways for defenders are straightforward: minimize attack surface on internet‑facing servers, harden and monitor SQL/IIS stacks, invest in behavioral endpoint telemetry (Sysmon/EDR), and build hunt playbooks that look for inflated System32 DLLs, staged Base64/AES blobs, dead‑drop traffic to public repos and suspicious SQL activity. Attribution remains uncertain and probabilistic: technical response and containment must proceed based on validated artifacts and behaviors rather than on geopolitically charged inferences.
For immediate defensive action, prioritize: patching exposed database/web servers, hunting for anomalous DLLs in System32 and large overlay sections, scanning for web shells and lingering Cobalt Strike beacons, and capturing memory images from suspect hosts for offline analysis. These steps will materially reduce the chance that a PassiveNeuron‑style compromise becomes a long‑term espionage foothold.
Source: Securelist Cyberespionage campaign PassiveNeuron targets machines running Windows Server
Background / Overview
PassiveNeuron was first observed in 2024 and — after an apparent six‑month lull — revived activity from December 2024 through August 2025, according to Kaspersky’s public disclosure and accompanying Securelist technical write‑up. The operator(s) go after internet‑facing servers, especially Microsoft SQL and other server stacks, using web‑application and database abuse as an initial foothold before deploying a multi‑stage native/.NET implant ecosystem. This is a server‑centric APT playbook: servers exposed to the internet give attackers high‑value pivot points and opportunities for long‑term C2, lateral movement and data collection. The campaign’s technical craftsmanship — large, purposefully padded DLLs, multi‑stage loaders, sandbox checks and selective activation windows — shows an operator that values stealth and narrow, long‑term access over noisy mass compromise.
How initial access appears to happen
SQL servers and web shells: common initial vectors
Kaspersky’s telemetry highlights Microsoft SQL Server as a recurring initial vector in at least one well‑documented intrusion: attackers obtained remote command execution via SQL and used database tooling to execute OS commands and stage payloads. The vendor explicitly notes that the precise exploitation mechanism in the cases they observed is not fully visible; however, the usual avenues are:- exploitation of server software vulnerabilities,
- SQL injection in web applications that use the database,
- compromise of database administration credentials (brute force, credential stuffing or stolen secrets).
Web shell deployment attempts and detection evasion
The early web‑shell stage in the observed intrusions was noisy: Kaspersky reports repeated attempts to write a Base64‑encoded ASPX payload to disk using PowerShell and VBS decoder stagers, then variations (hex encoding, line‑by‑line writes, alternate interpreter) when detections blocked the initial tries. When these naïve attempts failed, the adversary escalated to the multi‑stage loader chain that ultimately delivered Neursite, NeuralExecutor or Cobalt Strike. This progression — from web shell attempt to more robust implants — is important for defenders: an early, noisy web shell is a realistic detection opportunity.The loader chain: design, tricks and why it matters
Multi‑stage DLL loaders and Phantom DLL hijacking
A defining technical hallmark of PassiveNeuron is a long DLL loader chain that ends in a final backdoor payload. The first‑stage artifacts are DLLs placed in System32 under names that mimic legitimate system libraries (for example, C:\Windows\System32\wlbsctrl.dll, TSMSISrv.dll, oci.dll). These malicious DLLs are intentionally large — often >100 MB — padded with junk overlay bytes to make signature detection and quick triage harder. Because those names are expected by core Windows services, placing a malicious DLL at those paths leverages a Phantom DLL hijacking effect: the OS or system services will load the attacker DLL on startup, allowing automatic persistence.The loader behavior includes:
- strong sandbox‑avoidance checks (per‑adapter MAC‑hashing against a configured list so the code only executes on intended victims),
- on‑disk second‑stage DLLs (also heavily inflated) that read AES‑encrypted, Base64‑encoded blobs from text files,
- a third DLL that creates a suspended process (WmiPrvSE.exe, msiexec.exe or similar), launches a shellcode loader, and finally maps the final PE payload converted to a custom container format into memory.
Why the file‑size inflation and MAC check matter
- Inflated file sizes (junk overlays) create unusual artifacts: defenders can hunt for abnormally large DLLs in System32 as a high‑value signal.
- MAC‑based whitelisting means attackers do not expect their code to run in sandboxes or wide scanning — the payload usually remains inert on non‑target systems, reducing false positives and telemetry exposure for the operator.
Final payloads: Neursite, NeuralExecutor and Cobalt Strike
Neursite — a modular C++ backdoor
Neursite is the most feature‑rich implant observed in PassiveNeuron intrusions. Kaspersky named it after a discovered source‑path string and details a flexible configuration containing:- lists of C2 addresses and ports,
- HTTP proxy and header lists,
- relative URL paths for HTTP(S) beaconing,
- beacon timing ranges,
- a time‑of‑week activation bitmap (hours/days) to restrict active windows,
- optional listening ports for inbound connections.
NeuralExecutor — a .NET loader/runner
NeuralExecutor is a .NET‑based implant designed to fetch and execute additional .NET assemblies from the network. Notable traits:- ConfuserEx obfuscation was used in earlier samples.
- Multiple comms channels are supported: TCP, HTTP(S), WebSockets and Windows named pipes.
- In 2025 variants the implant used a Dead Drop Resolver technique: fetching a GitHub file and extracting a delimited Base64/AES blob as configuration to retrieve C2 addresses instead of storing C2 directly in the binary.
Cobalt Strike — commoditized post‑exploitation
Alongside bespoke implants the operator also uses the Cobalt Strike commercial red‑team framework in some intrusions. Cobalt Strike is widely abused by nation‑state and criminal groups, and its presence indicates familiar post‑exploitation workflows (beaconing, lateral movement, privilege escalation). The coexistence of Cobalt Strike with custom implants is consistent with many recent APT campaigns: bespoke tools for stealth and durability, commodity tools for rapid operational tasks.Attribution: clues, pitfalls and the cautious conclusion
What the technical evidence shows
Kaspersky’s investigators examined two main hints used in attribution:- Earlier NeuralExecutor samples contained function names prefixed with the Russian phrase “Супер обфускатор” (“Super obfuscator”). Kaspersky treats that as a potential false flag because such strings can be deliberately inserted by operators when using obfuscators. The presence of Cyrillic‑prefixed strings therefore carries low evidential weight.
- Later NeuralExecutor samples used a GitHub dead‑drop resolver — a technique seen frequently in Chinese‑language campaigns such as EastWind/APT31/APT27 analyses. Kaspersky notes this pattern’s overlap with Chinese‑language actor TTPs.
- A discovered DLL named imjp14k.dll contained a PDB path (G:\Bee\Tree(pmrc)\Src\Dll_3F_imjp14k\Release\Dll.pdb) that matches strings Cisco Talos has observed in prior APT41‑linked campaigns. Talos documented imjp14k‑style loaders in incidents it assessed as likely APT41 activity, so that PDB path overlap is a data point worth noting — but it does not amount to conclusive proof.
Why attribution is low‑confidence and remains tentative
- Strings and PDB paths are easy to plant or reuse; they can be red herrings.
- Dead‑drop patterns (GitHub blobs with delimiters) are shared tradecraft and not exclusive to a single operator.
- Tooling overlaps (Cobalt Strike, DLL side‑loading) are common across many actors.
How PassiveNeuron compares to other server‑focused campaigns
PassiveNeuron’s server focus and use of native DLL loaders and web shells mirrors patterns seen in other recent campaigns that weaponize IIS/Windows servers for persistent infrastructure and monetizable abuse. For example, ESET’s GhostRedirector research documented native IIS modules and passive backdoors that manipulate search‑engine traffic and also relied on SQL injection and Potato family privilege escalation to register in‑process modules — a reminder that server‑side implants are increasingly used for both espionage and criminal monetization. These parallels reinforce that internet‑facing server hardening needs to be a top operational priority.Detection, hunting and remediation for Windows Server environments
The following technical guidance distills the observable artifacts and the most effective hunt vectors for defenders dealing with PassiveNeuron‑style intrusions.High‑value detection and hunting signals
- Search for unusually large DLLs in System32 (particularly files with names matching legitimate system libraries but with odd sizes or overlay sections).
- Identify recent additions to System32 with unexpected timestamps or large file overlay sections.
- Detect unusual DLLs loaded into svchost.exe and msdtc.exe (System service host processes that the loader names would attach to).
- Hunt for text files containing large Base64 blobs or AES‑like encrypted strings (second‑stage staging artifacts).
- Monitor SQL Server logs and extended events for unexpected calls that execute OS commands (sp_configure changes, xp_cmdshell usage, sp_executesql with suspicious payloads).
- Track abnormal PowerShell command lines and decoding operations that write ASPX/ASPXX files to web directories.
- Monitor network traffic for HTTP(S) patterns to dead‑drop services (GitHub raw content access, delimited blobs).
- Use Sysmon and EDR to look for:
- process creation of common hosts (WmiPrvSE.exe, msiexec.exe) in suspended mode followed by memory writes,
- named pipe activity consistent with ConfuserEx/.NET loader behaviors,
- CreateRemoteThread/WriteProcessMemory patterns and reflective loaders.
Quick containment checklist (triage)
- Isolate affected server(s) from the network (preserve forensic images and memory dumps before rebooting).
- Export SQL Server logs and relevant IIS logs; look for command injection or odd query patterns.
- Rotate/disable credentials that may have been used to access database service accounts and administrative portals.
- Hunt for the loader artifacts in System32 and common web document roots; remove suspicious DLLs only after obtaining images and verifying full cleanup plans.
- Where Cobalt Strike beacons or known IOCs are found, block the associated domains/IPs on perimeter devices and forward samples to a central analysis team.
Long‑term remediation and prevention
- Patch SQL Server and web application stacks vigorously; prioritize public‑facing database instances.
- Enforce least‑privilege for database service and admin accounts; disable features like xp_cmdshell unless explicitly required and audited.
- Deploy a WAF tuned for SQL injection patterns and monitor blocked events for escalation.
- Protect GitHub and other public cloud access patterns with allow‑lists and anomaly detection on raw content fetches.
- Harden server image baselines: restrict write access to System32, monitor for newly created DLLs under privileged folders and use file integrity monitoring.
- Implement application allowlisting and code‑signing verification enforcement for critical services.
- Instrument servers with Sysmon, EDR and centralized logging capable of detecting process hollowing, unusual process injection and long sleeping beacons.
Practical indicators and artefacts observed (actionable IOCs)
Kaspersky published a set of hashes and filenames that defenders can add to hunts. Two loader file hashes and the imjp14k DLL name appeared in the reporting; note that executable metadata and PDB strings were also observed in samples:- PassiveNeuron‑related loader file (example SHA‑2 truncated): 12ec42446db8039e2a2d8c22d7fd2946406db41215f7d333db2f2c9d60c3958b44a64331ec1c937a8385dfeeee6678fd8dcf258f66fa0cec1e4a800fa1f6c2a2d587724ade76218aa58c78523f6fa14ef806083c919e49aca3f301d082815b30.
- Malicious imjp14k.dll — DLL referenced in the investigation and connected via PDB strings to analysis by other vendors. Analysts should be cautious: imjp14k.dll also appears in separate incidents attributed to APT41 by Talos; the string overlap is useful for correlation but not definitive attribution.
Critical analysis: strengths, operator tradecraft and enterprise risks
Notable strengths of the attackers’ approach
- Precision targeting and sandbox evasion: MAC hashing and time‑window activation reduce accidental execution and analysis exposure.
- Layered persistence: Multiple loader stages, inflated DLLs, plugin capabilities and use of both bespoke and commodity tools create operational resilience.
- Stealthy configuration: Public‑cloud dead drops and flexible protocol support (HTTP/S, raw TCP, named pipes, WebSockets) minimize hardcoded infrastructure and blend with legitimate traffic.
Enterprise impact and risk calculus
- Servers as beachheads: Internet‑facing servers remain the highest‑leverage targets for espionage actors; a single compromised SQL/IIS host can yield domain access, credential theft and lateral movement.
- Detection blind spots: Server‑side native modules and in‑memory loaders often escape file‑based scanning. Relying solely on signature‑based detection is insufficient.
- Attribution noise: False flags (Cyrillic strings, reused PDB paths) complicate geopolitically motivated decisions. Technical containment should not wait on attribution.
Where defenders must be suspicious
- Rapid “surgical” removal of one artifact will often fail; the loader chain’s redundancy means full forensic rebuilds and reimaging are frequently the safest course.
- Partial remediation risks residual C2 channels via secondary loaders, misconfigured proxies or orphaned scheduled tasks.
Conclusion
PassiveNeuron is a timely reminder that modern APTs increasingly treat Windows servers as durable, monetizable infrastructure: they combine bespoke implants (Neursite, NeuralExecutor) and commodity tooling (Cobalt Strike) with robust evasion and persistence mechanisms to maintain low‑noise, long‑term access. Kaspersky’s disclosure provides concrete technical signatures and behavioral indicators that should be treated as high‑priority hunt items by server owners and SOC teams.Key operational takeaways for defenders are straightforward: minimize attack surface on internet‑facing servers, harden and monitor SQL/IIS stacks, invest in behavioral endpoint telemetry (Sysmon/EDR), and build hunt playbooks that look for inflated System32 DLLs, staged Base64/AES blobs, dead‑drop traffic to public repos and suspicious SQL activity. Attribution remains uncertain and probabilistic: technical response and containment must proceed based on validated artifacts and behaviors rather than on geopolitically charged inferences.
For immediate defensive action, prioritize: patching exposed database/web servers, hunting for anomalous DLLs in System32 and large overlay sections, scanning for web shells and lingering Cobalt Strike beacons, and capturing memory images from suspect hosts for offline analysis. These steps will materially reduce the chance that a PassiveNeuron‑style compromise becomes a long‑term espionage foothold.
Source: Securelist Cyberespionage campaign PassiveNeuron targets machines running Windows Server