Muddled Libra also tracked as Scattered Spider and UNC3944 is a financially motivated threat group known for sophisticated social engineering and disciplined hands-on-keyboard operations. In a September 2025 incident documented by Unit 42, the group demonstrated a hallmark of their playbook: after obtaining access to a VMware vSphere environment, they created a rogue virtual machine named "New Virtual Machine" to serve as their operational base. By working entirely within the victim's own hypervisor infrastructure, they avoided deploying traditional malware and made their presence significantly harder to detect.
From the rogue VM, the actors moved with precision. Within minutes of VM creation, they downloaded the Chisel tunneling tool from an attacker-controlled AWS S3 bucket and established an encrypted C2 channel over TCP 443 that persisted for 15 hours. Approximately 15 minutes in, they powered down two virtualized domain controllers via the vSphere portal, then mounted their virtual disk (VMDK) files directly on the rogue VM to extract the NTDS.dit database and SYSTEM registry hive , obtaining all domain credential hashes offline without touching a live DC. ADRecon was executed to fully enumerate the Active Directory environment including forest trusts, site topology, SPNs, and password policy. Lateral movement used RDP and PsExec with compromised domain credentials. The actors also accessed the organization's Snowflake database, targeted Exchange mailboxes, and ultimately used the S3 Browser tool to upload PST files to an attacker-controlled S3 bucket.
Detection is primarily behavioral. The group's deliberate avoidance of novel malware means the strongest signals come from legitimate tools used in unusual contexts: ADRecon PowerShell execution, PsExec service installation events, and high-volume outbound RDP connections are all catchable through EDR telemetry. The vSphere-based DC power-down and disk mounting are rarely monitored but represent high-confidence signals when observed on hypervisor or ESXi logs. Snowflake session anomalies , particularly sessions appearing from an unexpected operating system provide an early indicator of database access from attacker-controlled infrastructure. High-volume email access in Office 365 and large outbound data transfers on firewall logs round out the detection surface across the full attack chain.
IOCs (9)
Scan your environment for IOCs →SHA256 FILE HASH 6
078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b996e68f2fe1c8bb091f34e9bf39fd34d95c3e21508def1f54098a1874bfb825e6784e652f304bf8e43b42c29ad8dd146dd384fa9536b9c6640dfbc370c3e78dee451287843b3927c6046eaabd3e22b929bc1f445eec23a73b1398b115d02e4fb088f2aced9ed60c2ce853b065f57691403459e1e0d167891d6849e1b582281736e2c39d0c00a6a8eef33f9670f941a88c957d3c1e9496392beedc98af14269a2IP ADDRESS 2
162.125.3.18104.16.100.29DOMAIN 1
sean-referrals-commissions-electricity.trycloudflare.comDetections
Enable detections →- Active Directory Enumeration via Unauthorized Tools
- Active Directory Recon Utilities Detected
- PSExec Execution
- Multiple RDP Connections from Single Device
- ESXi VM Force Kill Command Execution
- Snowflake Sessions Opened from Multiple Operating Systems
- Flag suspicious PowerShell execution — encoded commands, download cradles, or AMSI bypass
- Alert on domain account usage from unexpected hosts or concurrent sessions in different geolocations
- Alert on uploads to cloud storage services from servers or workstations that typically do not perform such transfers