Home / Industry

An In-Depth Analysis of the Ashen Lepus AshTag-Enabled Attack

Palo Alto Networks’ Unit 42 tracked and monitored the most recent Ashen Lepus aka WIRTE APT campaign that leveraged a new malware suite they have dubbed “AshTag.” The group conducted espionage activities against Arabic-speaking government entities. This time, however, the researchers witnessed a tangible evolution in the group’s operational security and TTPs. The actors specifically enhanced their custom payload encryption, infrastructure obfuscation by using legitimate subdomains, and in-memory malware execution to minimize forensic artifacts.

That said, were we able to uncover more potentially connected artifacts using the 12 subdomains Unit 42 has identified as IoCs.

We extracted 10 unique domains from the 12 subdomains identified as IoCs, bringing our total number of IoCs to analyze to 22. Our in-depth analysis of the AshTag IoCs led to these discoveries:

  • 12 subdomains identified as IoCs tagged as malware distributors
  • 430 unique client IP addresses that communicated with one of the domains identified as IoCs
  • Two domains identified as IoCs deemed likely to turn malicious upon registration 75—752 days before being dubbed as such
  • 29 email-connected domains
  • One IP address, which turned out to be malicious
  • 50 string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

A Closer Look at the Subdomains Identified as AshTag IoCs

Queries for the 12 subdomains identified as IoCs on Jake AI showed that all of them have been flagged for malware distribution between 13 and 16 December 2025. While 11 of them could not be categorized, one—auth[.]onlinefieldtech[.]com—fell under several categories, including Technology & Computing, Internet, and Business & Finance, along with an unrelated category Style & Fashion.

Sample Jake AI result for the subdomain auth[.]onlinefieldtech[.]com

Further Analysis of the 10 Domains Identified as AshTag IoCs

We began our investigation by querying the 10 domains identified as IoCs on the WhoisXML API MCP Server, which revealed that none of them were owned by legitimate entities.

Sample IASC network traffic data for the 10 domains identified as IoCs showed that 430 unique client IP addresses under two distinct ASNs communicated with the domain IoC api[.]softmatictech[.]com via 1,687 DNS queries between 19 November and 18 December 2025.

In addition, the results of our First Watch Malicious Domains Data Feed queries showed that two domains identified as IoCs were deemed likely to turn malicious 75—752 days before being dubbed as such on 11 December 2025.

DOMAIN IoCFIRST WATCH DATENUMBER OF DAYS BEFORE REPORT DATE
healthylifefeed[.]com20 November 2023752
systemsync[.]info27 September 202575

We then queried the 10 domains identified as IoCs on WHOIS API and discovered that:

  • Nine of them were created in 2025 while one was created in 2024.
  • Namecheap was the top registrar, accounting for four of the domains. NameSilo accounted for two domains while Enom, InterNetX, Metaregistrar, and PDR administered one domain each.

  • Finally, four domains each were registered in Iceland and the U.S. while one each was registered in Canada and the Netherlands.

A DNS Chronicle API query for the 10 domains identified as IoCs, meanwhile, showed that they recorded 1,425 domain-to-IP resolutions over time. The domain technology-system[.]com posted the oldest resolution on 7 February 2017.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
technology-system[.]com7702/07/1708/30/25
healthylifefeed[.]com22504/28/1711/04/17
techtg[.]com29404/29/1705/30/25
widetechno[.]info55604/29/1708/14/25
techupinfo[.]com9507/09/1808/30/24

Next, we began our search for new artifacts by querying the 10 domains identified as IoCs on WHOIS History API and found out that six of them had email addresses in their historical WHOIS records. We uncovered 36 unique email addresses in all. Upon further scrutiny, we determined that nine were public email addresses.

According to the results of our Reverse WHOIS API queries for the nine public email addresses, none of them were present in any other domain’s current WHOIS records. All of them, meanwhile, appeared in the historical WHOIS records of 29 unique email-connected domains after those already identified as IoCs were filtered out.

Next, we queried the 10 domains identified as IoCs on DNS Lookup API, which showed that only one—techupinfo[.]com—actively resolved to a single IP address.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign