Skip to content
.ca
6 minhigh

Donuts and Beagles: Fake Claude site spreads backdoor

A malvertising campaign is leveraging a fake Claude AI website to distribute a malicious MSI installer. The infection chain employs DLL sideloading via a legitimate G DATA executable to execute DonutLoader, which ultimately deploys a novel backdoor dubbed 'Beagle' for remote command execution and file manipulation.

Sens:ImmediateConf:highAnalyzed:2026-05-07Google

Authors: Chaitanya Ghorpade

ActorsPlugXShadowPadSTAC4713AdaptixC2

Source:Sophos

IOCs · 13

Detection / HunterGoogle

What Happened

Cybercriminals have created a fake website that looks like the legitimate Claude AI tool to trick people into downloading malware. Anyone who downloads and installs the fake 'Claude-Pro' software on a Windows computer is affected. This matters because the malware installs a hidden 'backdoor' that allows attackers to steal files, delete data, and take control of the infected computer. To stay safe, users should only download software from official websites and be cautious of sponsored links in search engine results.

Key Takeaways

  • Threat actors are using a fake Claude AI website to distribute malware via malvertising and SEO poisoning.
  • The attack chain utilizes DLL sideloading via a legitimate G DATA updater (NOVupdate.exe) to execute malicious code.
  • The first-stage payload is DonutLoader, which subsequently loads a previously undocumented backdoor named Beagle.
  • Beagle communicates with its C2 server over TCP (443) or UDP (8080) using AES encryption with a hardcoded key.
  • Related samples suggest the threat actors are experimenting with different payloads, including AdaptixC2, while reusing the same XOR decryption key.

Affected Systems

  • Windows

Attack Chain

The attack begins when a user downloads a malicious ZIP archive (Claude-Pro-windows-x64.zip) from a fake Claude AI website. Extracting and running the contained MSI installer drops a legitimate G DATA updater (NOVupdate.exe), a malicious DLL (avk.dll), and an encrypted payload (NOVupdate.exe.dat) into the user's startup folder. When the legitimate executable runs, it sideloads the malicious DLL, which decrypts the payload using a hardcoded XOR key and executes Donut shellcode in memory via EtwpCreateEtwThread. Finally, Donut loads the Beagle backdoor, which establishes C2 communication over TCP or UDP using AES encryption.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No
  • Platforms: Sophos

Sophos provides endpoint protection signatures (e.g., ATK/DonutLdr-B, Troj/Beagldr-A) for the malicious components, and IOCs are available on their GitHub repository.

Detection Engineering Assessment

EDR Visibility: High — The attack relies on dropping files to the startup folder, DLL sideloading by a known executable, and in-memory execution via EtwpCreateEtwThread, all of which are highly visible to modern EDRs. Network Visibility: Medium — C2 traffic uses custom AES encryption over standard ports (TCP 443, UDP 8080), which may blend in with normal traffic, though the specific packet structure and hardcoded keys can be fingerprinted. Detection Difficulty: Moderate — While the initial DLL sideloading and startup folder persistence are common and detectable, the in-memory execution of Donut and the custom encrypted C2 protocol of Beagle require behavioral analysis and network traffic inspection.

Required Log Sources

  • Process Creation (Event ID 4688 / Sysmon 1)
  • File Creation (Sysmon 11)
  • Network Connections (Sysmon 3)
  • Image Load (Sysmon 7)

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Look for instances of NOVupdate.exe executing from unusual directories, particularly the user's Startup folder, followed by network connections to unknown external IPs.Process Creation, Network ConnectionsExecution / PersistenceLow
Search for the creation of files named avk.dll or NOVupdate.exe.dat in the same directory as NOVupdate.exe, especially outside of standard G DATA installation paths.File CreationDefense Evasion / PersistenceLow
Identify processes utilizing EtwpCreateEtwThread for execution, which is commonly abused by loaders like Donut to execute shellcode in memory.API Calls / Process InjectionDefense Evasion / ExecutionMedium

Control Gaps

  • Lack of strict application control allowing execution of arbitrary MSIs from the internet
  • Insufficient network egress filtering allowing custom UDP traffic on port 8080

Key Behavioral Indicators

  • NOVupdate.exe running from Startup folder
  • EtwpCreateEtwThread API call
  • TCP/UDP traffic with 16-byte random IVs preceding AES-encrypted data

False Positive Assessment

  • Low. The specific combination of the fake Claude domain, the G DATA updater sideloading a malicious avk.dll, and the Beagle C2 traffic patterns are highly indicative of this specific threat.

Recommendations

Immediate Mitigation

  • Block access to claude-pro[.]com and license[.]claude-pro[.]com.
  • Search endpoints for the presence of NOVupdate.exe, avk.dll, and NOVupdate.exe.dat in startup folders and remove them.
  • Isolate any hosts communicating with 8[.]217[.]190[.]58.

Infrastructure Hardening

  • Implement strict application control to prevent the execution of unapproved MSI installers.
  • Restrict outbound UDP traffic on non-standard ports like 8080 to known good destinations.

User Protection

  • Deploy EDR solutions configured to detect and block DLL sideloading attempts and in-memory shellcode execution.
  • Ensure web filtering is active to block newly registered domains and known malvertising infrastructure.

Security Awareness

  • Educate users on the risks of downloading software from sponsored search results or unofficial websites.
  • Train employees to verify the authenticity of AI tool websites before downloading clients or extensions.

MITRE ATT&CK Mapping

  • T1566.002 - Phishing: Spearphishing Link
  • T1574.002 - Hijack Execution Flow: DLL Side-Loading
  • T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
  • T1140 - Deobfuscate/Decode Files or Information
  • T1055 - Process Injection
  • T1071.001 - Application Layer Protocol: Web Protocols

Additional IOCs

  • Ips:
    • 209[[.]]189[[.]]190[[.]]206 - Possible hosting server for the fake Claude site (Cloudflare origin)
    • 178[[.]]128[[.]]108[[.]]89 - Hosting server associated with Vertex Trust Advisors
    • 192[[.]]252[[.]]186[[.]]62 - IP hosting related update-* domains
  • Domains:
    • vertextrust-advisors[[.]]com - Domain linked to the threat actor's hosting server
    • update-trellix[[.]]com - Domain associated with a related April sample
    • update-crowdstrike[[.]]com - Domain hosted on the same IP as update-trellix[.]com
    • update-sentinelone[[.]]com - Domain hosted on the same IP as update-trellix[.]com
  • Other:
    • SGkGIHumNrDlbt1OEHV3y2dVh5bQby2R - XOR decryption key used to decrypt the DonutLoader payload
    • beagle_default_secret_key_12345! - Hardcoded AES key used by the Beagle backdoor for C2 communication
    • Claude-Pro-windows-x64.zip - Malicious ZIP archive downloaded from the fake site
    • Claude.msi - MSI installer contained within the malicious ZIP
    • NOVupdate.exe - Legitimate G DATA updater abused for DLL sideloading