CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence

A Peek Into Muddled Libra’s Operational Playbook

Palo Alto Unit 42 Archived Mar 16, 2026 ✓ Full text saved

Explore the tools Unit 42 found on a Muddled Libra rogue host. Learn how they target domain controllers and use search engines to aid their attacks. The post A Peek Into Muddled Libra’s Operational Playbook appeared first on Unit 42 .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Executive Summary During a September 2025 incident response investigation, Unit 42 discovered a rogue virtual machine (VM) which we believe with high confidence to be used by the cybercrime group Muddled Libra (aka Scattered Spider, UNC3944). The contents of this rogue VM and activity from the attack provide valuable insight into the operational playbook of this threat actor. Muddled Libra created the VM after the group successfully gained unauthorized access to the target's VMware vSphere environment. Activities during the attack include: Performing reconnaissance Downloading tools Establishing persistence via a command and control (C2) channel Using stolen certificates Copying files from the rogue VM to the target's domain controller (DC) Interacting with the target’s Snowflake infrastructure Based on the characteristics of the attack, we assess with high confidence that Muddled Libra conducted it. This article provides a detailed analysis of our observations to shed further light on the threat actor’s tactics, techniques and procedures (TTPs). Palo Alto Networks are better protected from the threats discussed in this article through the following products and services: Advanced WildFire Cortex Cloud Cortex XDR and XSIAM If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team. Related Unit 42 Topics Muddled Libra, Cybercrime Who Is Muddled Libra? As previously documented, threat actors affiliated with Muddled Libra use various social engineering tactics (e.g., smishing, vishing) to gain initial access to targeted organizations. Activities can include targeting call centers operated by potential victims, as well as those outsourced to third-party firms. These third-party firms include business process outsourcing (BPOs) and managed service providers (MSPs). This expands the group’s range of potential targets. Threat actors affiliated with Muddled Libra are highly proficient at exploiting human psychology by impersonating employees to attempt password and multi-factor authentication (MFA) resets. Figure 1 illustrates the composition of Muddled Libra in terms of their demographics, tradecraft, victim targeting and actions on objectives. Figure 1. Muddled Libra threat profile. While their tradecraft has evolved, threat actors affiliated with Muddled Libra continue to minimize their use of malware throughout the attack chain. Whenever possible, they prefer to use their targets' own assets against them. Threat actors often abuse, take advantage of or subvert legitimate products for malicious purposes. This does not imply that the legitimate product is flawed or malicious. Background on the Attack Chain We assisted a client with an incident response engagement in September 2025. Throughout our investigation, we identified and recovered a VM created and leveraged by the threat actor to conduct the early stages of its attack. Attackers were unable to delete this VM before their access was cut off. We often observe threat actors creating VMs within targeted environments to avoid detection from endpoint tools like endpoint detection and response (EDR) or extended detection and response (XDR). By examining this VM, we discovered the tools the attackers leveraged and the basic troubleshooting they conducted during their unauthorized access. This provided insights into their operational methods. Using forensic artifacts and logs, we uncovered a large amount of activity conducted from this VM, including lateral movement and tools used. Figure 2 further illustrates our observations during the investigation. Note that the analysis below is of a single system and does not cover the entire incident observed by Unit 42. Figure 2. High-level chain of events in the attack investigated by Unit 42. A Peek Into Muddled Libra Tactics Approximately two hours after gaining initial access to the target’s environment, we observed the attackers accessing the target’s vSphere portal and creating a new VM named “New Virtual Machine.” The attackers then leveraged this VM for the early stages of the incident as a beachhead host using the local Administrator account. Shortly after logging into the newly created VM, attackers downloaded stolen certificates from the targeted environment. They leveraged these certificates to forge tickets throughout their attack chain. Within three minutes, attackers established additional persistence in the target’s environment using an SSH tunnel through the Chisel tool. This tool was contained in a ZIP archive named goon.zip that was hosted on an AWS S3 bucket under the attackers' control. Nearly one minute after they downloaded the ZIP archive containing Chisel, we observed malicious network connections to an attacker-controlled IP address over TCP port 443 (HTTPS). We observed this connection for a total of 15 hours. Figures 3-5 illustrate these observations. Figure 3. URL hosting archive containing the Chisel tool. Figure 4. The downloaded tool, goon.zip. Figure 5. The SSH tunneling tool, chisel.exe, extracted from goon.zip. A minute later, we observed them logging in interactively with a new local user account named gooner. Approximately 15 minutes after creating the VM, the attackers began using vSphere to power down two of the target's virtualized DCs. They then mounted the virtual machine disks (VMDKs) of the powered-down DCs. This allowed them to copy the NTDS.dit and SYSTEM registry hive files from these two DCs and place them on the desktop of the Administrator account on their newly created VM. Approximately two minutes later, they wrote two files, result and result.kerb, to the local Administrator account’s desktop. We retrieved these files and determined that these were decrypted versions of the target’s NTDS.dit Active Directory database, which contained hashes of all users. Figures 6 and 7 illustrate these observations. Figure 6. VMware logs of the shutdown activities of the DC. Figure 7. List of files discovered for credential dump, NTML hash and Kerberos hash. At nearly 30 minutes of access to this newly created VM, the attackers began executing the Active Directory enumeration tool ADRecon. We observed and retrieved dozens of files associated with ADRecon, including a PowerShell script and output files. These files contained information such as: Domain details Forest Trusts Sites Subnets Schema Password policy DCs Service Principal Names (SPNs) Users Group Policy Objects (GPOs) The output of the ADRecon tool would then be placed in a ZIP archive named <VICTIM ORGANIZATION>.zip (where <victim organization> represents the name of the victim, redacted for this report). We also observed the attackers downloading the tool ADExplorer64.exe directly from the Microsoft SysInternals domain. Figure 8 illustrates these observations. Figure 8. List of ADRecon output files discovered during our investigation. Within the ADRecon output, the threat actors only opened the CSV file ComputerSPNs.csv. This file contained all available service principal names (SPNs) associated with hosts in the environment. Attackers gather this information to help identify critical services running that they are interested in targeting. These critical services include: Veeam Terminal services Hyper-V MSSQL Exchange Other similar systems as shown in Figure 9 Figure 9. List of targeted services discovered during our investigation. One hour later, attackers began searching the web for various acronyms associated with the targeted organization, likely to determine what data could be sensitive and interesting for exfiltration. This included searches such as “what is NAIC code” and “NAICS code lookup,” as shown in Figure 10. A North American Industry Classification System (NAICS) code is a six-digit number that classifies businesses by their primary economic activity. By looking up this code, attackers might have been trying to understand the business category of the target organization. Figure 10. Example of web searches. Thirty minutes after their web searches, attackers began interacting with significant data from the target’s Snowflake database, which they also downloaded to their VM. For the next few hours, attackers began interacting with the data and attempting to identify ways to send the data from their VM to a file-sharing site. However, we observed them having difficulties finding a file-sharing site that the targeted organization had not already blocked. After trying several common file-sharing sites, they began using Bing to search on the phrases “upload files” and “upload files no registration” to identify a file-sharing site that was not blocked. We observed attempts at accessing sites such as: LimeWire upload[.]ee uploadnow[.]io filetransfer[.]io filebin[.]io Dropbox Figures 11-13 illustrate these observations. Figure 11. List of Snowflake web browsing activities documented from our investigation. Figure 12. Web searches for cloud storage services discovered during our investigation. Figure 13. Web browsing activities to cloud storage services discovered during our investigation. Shortly after interacting with the data, the attackers began lateral movement using multiple then-compromised accounts with their SSH tunnel, RDP and PsExec. They downloaded the PsExec tool directly from the Microsoft SysInternals domain. Approximately four hours after the creation of their VM, the attackers began looking for additional sensitive data. At that time, we observed them having compromised a handful of accounts, one of which they used to access the mailboxes of other accounts to download a Personal Storage Table (PST) file. However, based on Bing search history, they had difficulty accessing the mailbox via Office. The attackers then searched the web for “office[.]com old setup download” and “is there a place to download an older version of Outlook?” Attackers also reviewed various Reddit posts related to this query. Shortly after, they downloaded and ran OfficeSetup.exe from Microsoft. They then began troubleshooting items such as “Outlook slow downloading emails” and performed several internet speed checks using the site fast[.]com. Figures 14-17 illustrate these observations. Figure 14. Online Outlook login activities discovered during our investigation. Figure 15. Web searches for Outlook agents discovered during our investigation. Figure 16. Web searches for older Outlook versions discovered during our investigation. Figure 17. Web searches to troubleshoot slow email download issues and perform a speed test. In addition to troubleshooting their download speeds, attackers used Bing to identify the location of the Outlook ODT file. Figure 18 illustrates this observation. Figure 18. Web search for the Outlook ODT file location discovered during our investigation. Additionally, we observed Microsoft Defender, presumably installed on the VM by default, taking action on multiple malicious files on this VM. This included ADRecon, Chisel and GoSecretsDump. Figure 19 lists these detections. Figure 19. Microsoft Defender detections on tools discovered during our investigation. After some time, the attackers then began attempting to exfiltrate the Outlook PST file. They first searched for the S3 Browser tool. Once they downloaded the tool from the S3 Browser website, attackers then attempted to exfiltrate the PST file by uploading it to their S3 bucket. Figures 20 and 21 illustrate these observations. Figure 20. Downloaded S3 browser executable discovered during our investigation. Figure 21. S3 Browser logs of PST file upload. After approximately 15 hours of access to their VM, attackers began browsing various VMware ESXi hosts. They continued to pivot through the network, leveraging access to multiple compromised accounts before their access was terminated by the targeted organization’s security team. Figure 22 illustrates this observation. Figure 22. Browsing activities to the target’s VMware ESXi hosts discovered during our investigation. Conclusion Intrusion operations Muddled Libra conducts have affected the business operations of many organizations across the globe. This is not because they use advanced malware or novel exploits, but because they exploit the weakest link: humans. While focusing on identity compromise and social engineering, this threat actor leverages legitimate tools and existing infrastructure to blend in. They operate quietly and maintain persistence. This incident offers a rare window into an operational playbook used by Muddled Libra, revealing how a single rogue VM can serve as a powerful foothold for lateral movement and data theft. The threat actor's methods underscore the importance of: Strengthening identity security Enforcing strict access controls Continuously monitoring for anomalous use of administrative tools and cloud environments Organizations should adopt a defense-in-depth strategy centered on: Protecting identity Maintaining least-privileged access Detecting living-off-the-land behaviors While Muddled Libra’s tactics may appear simple, their effectiveness reminds us that cybersecurity resilience begins not with complexity, but with vigilance, visibility and disciplined access management. Palo Alto Networks customers are better protected from the threats discussed above through the following products: The Advanced WildFire machine-learning models and analysis techniques have been reviewed and updated in light of the indicators shared in this research. Cortex Cloud customers can better protect their cloud infrastructure from the topics discussed within this article through the proper placement of Cortex Cloud XDR endpoint agent and serverless agents within their cloud environment. Designed to protect a cloud’s posture and runtime operations against these threats, Cortex Cloud helps detect and prevent the malicious operations or configuration alterations or exploitations discussed within this article. Cortex XDR and XSIAM help to prevent the threats described in this blog, by employing the Malware Prevention Engine. This approach combines several layers of protection, including WildFire, Behavioral Threat Protection and the Local Analysis module, designed to prevent both known and unknown malware from causing harm to endpoints. If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: North America: Toll Free: +1 (866) 486-4842 (866.4.UNIT42) UK: +44.20.3743.3660 Europe and Middle East: +31.20.299.3130 Asia: +65.6983.8730 Japan: +81.50.1790.0200 Australia: +61.2.4062.7950 India: 000 800 050 45107 South Korea: +82.080.467.8774 Palo Alto Networks has shared these findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance. Indicators of Compromise Host Based Important note: The following files are not malicious, but they are indicators because they were used during the attack. SHA256 hash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b Filename: psexec.exe File description: Sysinternals PsExec — remote execution / lateral movement tool (observed downloaded from Sysinternals). SHA256 hash: 996e68f2fe1c8bb091f34e9bf39fd34d95c3e21508def1f54098a1874bfb825e Filename: chisel.exe File description: Chisel — SSH/HTTPS tunneling tool (persistence via SSH tunnel observed). SHA256 hash: 6784e652f304bf8e43b42c29ad8dd146dd384fa9536b9c6640dfbc370c3e78de Filename: s3browser-12-6-1.exe File description: S3 Browser client — used to upload files to S3 (used for exfiltration attempts). SHA256 hash: e451287843b3927c6046eaabd3e22b929bc1f445eec23a73b1398b115d02e4fb Filename: ADExplorer64.exe File description: ADExplorer (Sysinternals) — Active Directory data browsing tool. SHA256 hash: 088f2aced9ed60c2ce853b065f57691403459e1e0d167891d6849e1b58228173 Filename: goon.zip File description: Archive containing attacker tools (observed in S3 bucket). SHA256 hash: 6e2c39d0c00a6a8eef33f9670f941a88c957d3c1e9496392beedc98af14269a2 Filename: OfficeSetup.exe File description: Microsoft Office installer/setup executable (observed use by the attackers while attempting to access mailboxes/PSTs). Network Based IP Address or Domain Description 162.125.3[.]18 Associated with Dropbox — destination IP address observed in firewall logs from the attackers' VM 104.16.100[.]29 Associated with Dropbox — destination IP address observed in firewall logs from the attackers' VM upload[.]ee Online cloud storage uploadnow[.]io Online cloud storage limewire[.]com Online cloud storage we[.]tl Online cloud storage s3browser[.]com S3 browser, used for exfiltration sean-referrals-commissions-electricity.trycloudflare[.]com Online cloud storage fast[.]com Used by attackers to check the internet speed filetransfer[.]io Online cloud storage filebin[.]io Online cloud storage Additional Resources Muddled Libra Threat Assessment: Further-Reaching, Faster, More Impactful – Unit 42, Palo Alto Networks Back to top TAGS Muddled Libra PowerShell Scattered Spider UNC3944 Virtual machines Threat Research Center Next: Novel Technique to Detect Cloud Threat Actor Operations TABLE OF CONTENTS Executive Summary Who Is Muddled Libra? Background on the Attack Chain A Peek Into Muddled Libra Tactics Conclusion Indicators of Compromise Host Based Network Based Additional Resources RELATED ARTICLES VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) Novel Technique to Detect Cloud Threat Actor Operations The Golden Scale: Notable Threat Updates and Looking Ahead Related Cybercrime Resources THREAT RESEARCH October 22, 2025 Jingle Thief: Inside a Cloud-Based Gift Card Fraud Campaign CL‑CRI‑1032 Microsoft Phishing Read now THREAT ACTOR GROUPS August 1, 2025 Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Updated Aug. 1, 2025) Academic Serpens Agent Serpens Agonizing Serpens Read now THREAT ACTOR GROUPS July 31, 2025 Introducing Unit 42’s Attribution Framework Advanced Persistent Threat Bookworm Nomenclature Read now THREAT RESEARCH March 16, 2026 Boggy Serpens Threat Assessment Advanced Persistent Threat Boggy Serpens C2 Read now INSIGHTS February 3, 2026 Why Smart People Fall For Phishing Attacks AI Phishing Read now INSIGHTS January 29, 2026 Understanding the Russian Cyberthreat to the 2026 Winter Olympics AI IoT Russia Read now THREAT RESEARCH December 10, 2025 01flip: Multi-Platform Ransomware Written in Rust Bitcoin CL-CRI-103 Cryptocurrency Read now THREAT RESEARCH November 25, 2025 The Dual-Use Dilemma of AI: Malicious LLMs Credential Harvesting Data exfiltration LLM Read now THREAT RESEARCH November 14, 2025 Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT DLL Sideloading Gh0st Rat PDNS Read now THREAT RESEARCH October 22, 2025 Jingle Thief: Inside a Cloud-Based Gift Card Fraud Campaign CL‑CRI‑1032 Microsoft Phishing Read now THREAT ACTOR GROUPS August 1, 2025 Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Updated Aug. 1, 2025) Academic Serpens Agent Serpens Agonizing Serpens Read now THREAT ACTOR GROUPS July 31, 2025 Introducing Unit 42’s Attribution Framework Advanced Persistent Threat Bookworm Nomenclature Read now THREAT RESEARCH March 16, 2026 Boggy Serpens Threat Assessment Advanced Persistent Threat Boggy Serpens C2 Read now INSIGHTS February 3, 2026 Why Smart People Fall For Phishing Attacks AI Phishing Read now INSIGHTS January 29, 2026 Understanding the Russian Cyberthreat to the 2026 Winter Olympics AI IoT Russia Read now THREAT RESEARCH December 10, 2025 01flip: Multi-Platform Ransomware Written in Rust Bitcoin CL-CRI-103 Cryptocurrency Read now THREAT RESEARCH November 25, 2025 The Dual-Use Dilemma of AI: Malicious LLMs Credential Harvesting Data exfiltration LLM Read now THREAT RESEARCH November 14, 2025 Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT DLL Sideloading Gh0st Rat PDNS Read now THREAT RESEARCH October 22, 2025 Jingle Thief: Inside a Cloud-Based Gift Card Fraud Campaign CL‑CRI‑1032 Microsoft Phishing Read now THREAT ACTOR GROUPS August 1, 2025 Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Updated Aug. 1, 2025) Academic Serpens Agent Serpens Agonizing Serpens Read now THREAT ACTOR GROUPS July 31, 2025 Introducing Unit 42’s Attribution Framework Advanced Persistent Threat Bookworm Nomenclature Read now
    💬 Team Notes
    Article Info
    Source
    Palo Alto Unit 42
    Category
    ◉ Threat Intelligence
    Published
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗