Preliminary entry dealer Storm-0249 has advanced from a mass phishing operation into a complicated menace actor weaponizing legit Endpoint Detection and Response (EDR) processes by sideloading methods to hide malicious exercise as routine safety operations.
This represents a major escalation within the group’s capabilities and poses a crucial danger to organizations counting on conventional protection mechanisms.
ReliaQuest researchers, in collaboration with SentinelOne, have documented how Storm-0249 exploits trusted signed executables particularly SentinelOne’s SentinelAgentWorker.exe to execute malicious payloads whereas evading detection.
The methods noticed are readily adaptable to different EDR platforms, making this a cross-industry menace requiring rapid consideration from safety groups.
Storm-0249’s current assault methodology begins with ClickFix assault, a social engineering method that manipulates customers into executing encoded instructions through the Home windows Run dialog. As soon as preliminary entry is established, the assault unfolds by three coordinated phases.
The primary section leverages curl.exe, a legit built-in Home windows utility generally utilized by IT directors for downloading updates and testing APIs.
As a result of curl.exe hardly ever triggers safety alerts, attackers pipe malicious PowerShell scripts straight into reminiscence from spoofed Microsoft domains.
The attackers host payloads on attacker-controlled infrastructure however prepend URLs with pretend /us.microsoft.com/ paths to impersonate legit Microsoft sources. This fileless execution method bypasses signature-based antivirus options totally, because the malicious code by no means touches disk.
The second section includes delivering a trojanized MSI bundle that exploits Home windows Installer’s SYSTEM-level privileges.
The bundle comprises a malicious DLL impersonating a legit SentinelOne EDR part, strategically positioned within the AppData folder a location typically excluded from rigorous safety monitoring to scale back alert noise.
When the legit SentinelOne executable launches, it masses the attacker’s malicious DLL as an alternative of the legit model, a method referred to as DLL sideloading that makes the assault seem as routine safety software program habits.
Safety Software program Into an Assault Vector
The implications of Storm-0249’s skill to abuse trusted EDR processes are profound. By hijacking digitally signed executables, the group transforms safety software program into an assault vector.
Community monitoring instruments observe the compromised SentinelAgentWorker.exe establishing command-and-control communications to newly registered domains, however belief the method as a result of it stays allowed and digitally signed.
The attackers encrypt C2 site visitors with TLS, rendering it invisible to deep packet inspection and SSL inspection home equipment.

This neutralizes a good portion of conventional perimeter defenses whereas permitting operators to transmit malware encryption keys and payload directions with out detection.
Following preliminary compromise, Storm-0249 conducts reconnaissance utilizing legit Home windows utilities like reg.exe and findstr.exe to extract system identifiers together with MachineGuid.
Protection Imperatives
This knowledge turns into crucial for ransomware associates, as teams like LockBit and ALPHV use MachineGuid to bind encryption keys to particular person sufferer techniques.
By securing this info, Storm-0249 delivers pre-profiled targets to ransomware clients, dramatically lowering time-to-ransom from weeks to days.
Organizations should implement behavioral analytics to detect anomalies corresponding to DLL sideloading, monitor DNS for newly registered domains (beneath 30-90 days previous), and implement strict controls on legit instruments like curl.exe and PowerShell.
Automated incident response playbooks that isolate compromised hosts, block malicious domains, and stop execution of recognized malicious hashes are important.
Storm-0249’s evolution demonstrates that conventional signature-based defenses are inadequate.
Safety groups should prioritize visibility into trusted processes, implement behavioral monitoring, and preserve community segmentation to disrupt these refined assaults earlier than ransomware deployment turns into inevitable.
IOCs
| Artifact | Sort | Particulars |
|---|---|---|
07c5599b9bb00feb70c2d5e43b4b76f228866930 |
SHA-1 Hash | Malicious DLL named “SentinelAgentCore” (used for DLL sideloading) |
423f2fcf7ed347ee57c1a3cffa14099ec16ad09c |
SHA-1 Hash | Spear.msi (Malicious Installer) |
krivomadogolyhp[.]com |
Area | C2 Area |
hristomasitomasdf[.]com |
Area | C2 Area |
hamcore[.]se2 |
File/Useful resource* | C2 Area (Probably a reference to SoftEther VPN configuration file or artifact)* |
sgcipl[.]com |
Area | C2 Area (Used for spoofed Microsoft domains) |
178.16.52[.]145 |
IP Deal with | Malicious IP Deal with |
172.67.206[.]124 |
IP Deal with | Malicious IP Deal with |
Observe us on Google Information, LinkedIn, and X to Get Immediate Updates and Set GBH as a Most popular Supply in Google.

