Iran-Linked Campaign Deploying SPLITDROP and GHOSTFORM Malware Against Iraqi Officials

Summary:

campaign targeting Iraqi government officials by impersonating the Iraqi Ministry of Foreign Affairs. The campaign leveraged targeted social engineering techniques and malicious archives to deliver previously undocumented malware families, SPLITDROP and GHOSTFORM. SPLITDROP acts as the initial dropper responsible for deploying additional components and establishing persistence within compromised environments. The secondary payload, GHOSTFORM, executes PowerShell commands directly in memory to evade detection and minimize forensic artifacts. The attackers also employ DLL sideloading, geofencing controls, and covert command-and-control communications to maintain long-term access while bypassing conventional security monitoring mechanisms.

Technical Description:

The campaign begins with the delivery of a password-protected RAR archive containing SPLITDROP, a . NET-based dropper responsible for initiating the infection chain and deploying additional malicious modules. During execution, SPLITDROP extracts legitimate applications such as VLC media player and WingetUI, which are then abused to perform DLL sideloading operations.

Through this mechanism, SPLITDROP loads malicious components identified as TWINTASK and TWINTALK. TWINTASK operates as a worker module that periodically reads commands stored within a local file and executes them using PowerShell, while also maintaining persistence through modifications to the Windows Registry.

The TWINTALK component functions as the command-and-control (C2) orchestrator, coordinating tasks with TWINTASK while enabling file upload and download capabilities. Communication with the attacker infrastructure is conducted using arbitrary URI paths to evade detection. In later phases of the campaign, operators introduced GHOSTFORM, which consolidates multiple functions into a single binary capable of executing PowerShell instructions directly in memory. This fileless approach significantly reduces disk artifacts and enhances operational stealth. The details and technicalities of the attack campaign are discussed further,

Delivery and Infection Chain:

The campaign begins with targeted social engineering operations in which attackers impersonate Iraq’s Ministry of Foreign Affairs to persuade government officials to open a password-protected RAR archive. The archive contains SPLITDROP, a malicious .NET dropper disguised alongside legitimate software components. In certain cases, attackers also distributed fraudulent meeting invitations hosted on attacker-controlled infrastructure that mimicked legitimate collaboration platforms. These invitations prompted victims to execute PowerShell commands, enabling the download of additional malicious payloads. These delivery techniques heavily rely on user interaction and trusted institutional branding to bypass early-stage security controls. The Infection chain was identified as follows,

  • The attack begins when the victim opens a password-protected RAR archive delivered through social engineering, which contains SPLITDROP, a malicious .NET dropper disguised alongside legitimate software files.
  • After execution, SPLITDROP extracts legitimate binaries such as VLC and WingetUI and places additional malicious DLL files on the system to prepare for DLL sideloading.
  • The legitimate vlc.exe binary loads the malicious TWINTASK (libvlc.dll) through DLL sideloading, allowing attacker-controlled code to execute while appearing as a trusted application.
  • TWINTASK periodically checks a local file for commands and executes them using PowerShell while also launching WingetUI.exe, which sideloads the TWINTALK (hostfxr.dll) component responsible for communicating with the command-and-control server.
  • In later variants, attackers deploy GHOSTFORM, which consolidates these functions into a single binary capable of retrieving commands from the C2 server and executing them directly in memory, reducing disk artifacts and improving stealth.

Technical Capabilities:

The malware toolkit used in this campaign provides attackers with multiple capabilities designed to maintain persistent access and enable remote command execution on compromised systems. The initial dropper, SPLITDROP, deploys additional components that abuse DLL sideloading techniques through trusted applications such as VLC and WingetUI, allowing malicious code to execute under the guise of legitimate software.

The TWINTASK module functions as a worker component that periodically reads instructions from a local file and executes commands via PowerShell. The module also establishes persistence by modifying Windows Registry keys, allowing the malware to survive system reboots and maintain long-term access. This mechanism enables attackers to interact with the compromised host, execute commands, and collect system information while minimizing detection by traditional security tools.

The TWINTALK module handles communication with the command-and-control infrastructure, facilitating file uploads, downloads, and task coordination. The malware incorporates randomized URI paths and checksum validation to ensure that requests originate from legitimate infected systems. Additionally, geofencing mechanisms and User-Agent verification help restrict unauthorized access to attacker infrastructure and reduce exposure to security researchers.

In later campaign variants, attackers introduced GHOSTFORM, which consolidates the functionality of earlier modules into a single binary capable of executing PowerShell commands directly in memory. This fileless execution technique significantly reduces disk artifacts, improves stealth, and complicates detection by traditional security monitoring tools.

Attribution and Evolution:

The campaign has been linked to the Iran-affiliated threat cluster Dust Specter, based on operational patterns and malware development techniques commonly associated with Iranian cyber operations. Indicators supporting this attribution include the use of compromised regional infrastructure, lightweight custom .NET backdoors, and tradecraft previously observed in OilRig-related operations.

The evolution from the modular TWINTASK/TWINTALK architecture toward the consolidated GHOSTFORM binary indicates ongoing improvements in operational efficiency, stealth, and attacker control.

Active Campaign and Geographic Spread:

The campaign was observed targeting Iraqi government officials and associated organizations in early 2026. Attackers utilized compromised Iraqi infrastructure to host malware payloads, increasing the credibility of the attack and improving delivery success rates. Although Iraq appears to be the primary target, the techniques and infrastructure used in this operation suggest potential expansion toward broader Middle Eastern government agencies or diplomatic institutions.

Conclusion:

This campaign demonstrates how Iran-aligned cyber operators continue to combine custom malware development, targeted social engineering, and covert execution techniques to conduct espionage operations. By leveraging trusted software binaries, in-memory execution techniques, and controlled command-and-control communications, the attackers were able to maintain persistence while minimizing the likelihood of detection.

Impact:

Successful exploitation enables attackers to obtain long-term remote access to compromised systems, allowing for data exfiltration, surveillance, and potential lateral movement across government networks. Access to sensitive systems may expose diplomatic communications, internal policy discussions, and strategic intelligence information.

Consequently, the campaign presents a significant espionage risk for government institutions and highlights the importance of enhanced monitoring of PowerShell activity, DLL sideloading behavior, and suspicious outbound network communications.

IOC and Context Details :

Topics Details
Tactic Name Initial Access, Execution, Persistence, Command and Control, Defense Evasion
Technique Name Spearphishing Attachment
DLL Sideloading
PowerShell Execution
Scheduled Task / Registry Persistence
Web-based C2 Communication
Sub Technique Name Spearphishing Attachment
DLL Search Order Hijacking
PowerShell
Registry Run Keys / Startup Folder
Attack Type Malware
Targeted Applications VLC Media Player, WingetUI, PowerShell, Web browsers
Region Impacted Middle East
Industry Impacted Government, Public Sector, Diplomatic Institutions
IOC’s Domains
lecturegenieltd[.]pro
meetingapp[.]site
afterworld[.]store
girlsbags[.]shop
onlinepettools[.]shop
web14[.]info
web27[.]info

URLs
hxxps://ca[.]iq/packages/mofaSurvey_20_30_oct.zip

SHA-256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 NA

Recommended Actions:

  • Enforce strict email and attachment scanning policies to detect password-protected archives and suspicious RAR files.
  • Monitor and restrict the execution of unauthorized PowerShell scripts, particularly those launched from unusual directories.
  • Implement DLL integrity monitoring to detect and prevent malicious sideloading of DLL files alongside legitimate binaries.
  • Audit and restrict scheduled tasks and Windows Registry startup keys to prevent persistence mechanisms from being abused.
  • Monitor outbound network traffic for connections to suspicious domains or unusual geofenced command-and-control patterns.
  • Deploy Endpoint Detection and Response (EDR) solutions capable of detecting fileless malware and in-memory execution techniques.
  • Conduct regular user awareness training focusing on spear-phishing attacks, social engineering tactics, and fake government communications.
  • Segment sensitive government networks to limit lateral movement in the event of a compromise.

Reference:

https://malware.news/t/dust-specter-apt-targets-government-officials-in-iraq/104524