Home / Industry

Deep Dive: 3 Lazarus RATs Caught in Our DNS Trap

Fox-IT and the NCC Group have conducted multiple incident response cases involving a Lazarus subgroup specifically targeting organizations in the financial and cryptocurrency sectors. The subgroup has been linked to AppleJeus, Citrine Sleet, UNC47363, and Gleaming Pisces and uses different remote access Trojans (RATs) known as “PondRAT5,” “ThemeForestRAT,” and “RemotePE.”

The researchers analyzed the three RATs in great depth in “Three Lazarus RATs Coming for Your Cheese.” They also identified 19 domains and two IP addresses as indicators of compromise (IoCs) in the process.

WhoisXML API dug deeper into the three RATs’ DNS infrastructure, which led to these discoveries:

One unique client IP address communicated with one distinct domain IoC based on sample traffic data from the Internet Abuse Signal Collective (IASC)

Two unique alleged victim IP addresses communicated with two distinct IP IoCs according to sample IASC traffic data

  • One of the domain IoCs was dubbed likely to turn malicious 189 days before being tagged as such
  • One email-connected domain
  • Nine additional IP addresses, eight were malicious
  • 57 IP-connected domains
  • 259 string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

More Insights into the IoCs

Facts about the IASC Data

Sample network traffic data from IASC showed that one unique client IP address under one distinct Autonomous System number (ASN) queried one unique domain IoC via 21 DNS queries between 18 and 20 August 2025.

Sample network traffic IASC data also revealed that two unique alleged victim IP addresses communicated with two distinct IP IoCs under two unique ASNs based on the results of a Bulk IP Geolocation Lookup query.

More Information from Our Tools

The First Watch Malicious Domains Data Feed query results for the 19 domains tagged as IoCs showed that one domain IoC—keondigital[.]com—was dubbed likely to turn malicious 189 days before it was identified as such on 1 September 2025. It was specifically added to First Watch on 24 February 2025.

We then queried the 19 domains tagged as IoCs on WHOIS API and discovered that only eight had current WHOIS records. Of these:

  • The domain IoC pypilibrary[.]com had the earliest creation date—18 August 2023—while arcashop[.]org had the latest—18 July 2025. All in all, the eight active domain IoCs were created between 2023 and 2025. Interestingly, two (aes-secure[.]net and azureglobalaccelerator[.]com) had the same creation date (18 September 2023). In addition, another (jdkgradle[.]com) was created within a week as the first two, on 22 September 2023. This could indicate use for the same malicious campaign.
  • They were administered by three different registrars led by Namecheap, which accounted for five domain IoCs. Hostinger Operations took the second spot with two domains, followed by Tucows Domains with one domain in third place.

  • While two domain IoCs did not have registrant countries on record, the remaining six were registered in two countries. Five were registered in Iceland while one was registered in the U.S.

A query for the 19 domains tagged as IoCs on DNS Chronicle API revealed that all had rich DNS histories. They had 665 domain-to-IP resolutions over time since 5 February 2017. This indicates possible use for malicious campaigns between 2017 and 2025. Take a look at specific examples below.

DOMAIN IoCTOTAL NUMBER OF DOMAIN-TO-IP RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE(prior to data gathering)
arcashop[.]org1255 February 201723 July 2025
plexisco[.]com926 February 20179 January 2023
oncehub[.]co1307 May 20202 September 2024
lmaxtrd[.]com825 November 202013 August 2021
calendly[.]live745 March 202118 May 2025

From the table above, we can discern that while the domain IoCs lmaxtrd[.]com, oncehub[.]co, and plexisco[.]com may not be in active use as of this writing, they were certainly so between 2020 and 2021, 2020 and 2024, and 2017 and 2023, respectively. These dates could potentially be connected to their weaponization for attacks.

Next, we queried the two IP addresses tagged as IoCs on Bulk IP Geolocation Lookup and found out that while they were both geolocated in the U.S. (consistent with the list of registrant countries), only one had an ISP on record—GWY IT.

A DNS Chronicle API query for the two IP addresses tagged as IoCs showed that both had DNS histories. Together, they had 685 IP-to-domain resolutions over time. Specifically, the IP address 192[.]52[.]166[.]253 posted 682 resolutions from 6 February 2017 to 4 September 2025. Note the similarity in timing, spanning 2017 to 2025, with some of the domain IoCs.

Unearthing New Artifacts

We began our search for new artifacts by querying the 19 domains tagged as IoCs on WHOIS History API. We found out that 14 had 24 unique email addresses in their historical WHOIS records. Only one of the email addresses was public.

We then queried the public email address on Reverse WHOIS API and discovered that while it did not appear in any other domain’s current WHOIS record, it was found in the historical WHOIS record of one email-connected domain—kmc-ksa[.]com—after duplicates and those already identified as IoCs were filtered out.

Next, a DNS Lookup API query for the 19 domains tagged as IoCs revealed that nine actively resolved to nine unique additional IP addresses after duplicates and those already identified as IoCs were filtered out.

A Threat Intelligence API query for the nine additional IP addresses showed that eight have already been flagged as malicious in connection to various threats.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign