Security researchers have uncovered a targeted cyberespionage campaign deploying a new .NET-based malware, dubbed CAPI Backdoor. The campaign, detailed by Seqrite Labs, is specifically targeting organizations within the Russian automobile and e-commerce industries. The initial access vector is a phishing email carrying a ZIP archive. This archive contains a malicious Windows shortcut (LNK) file that executes the backdoor. The malware employs living-off-the-land (LotL) techniques for execution, establishes persistence via multiple methods, and communicates with a command-and-control (C2) server to exfiltrate data and receive further instructions.
The attack begins with a classic phishing email sent to targets in the specified Russian sectors. The email contains a ZIP attachment which, when opened, reveals a decoy document and a malicious LNK file.
rundll32.exe, a legitimate and signed Microsoft binary, to load and execute a malicious DLL named adobe.dll. This use of a trusted system utility is a LotL technique (T1218.011 - System Binary Proxy Execution: Rundll32) designed to bypass basic application whitelisting and security controls.T1518.001 - Software Discovery: Security Software Discovery). To appear legitimate, it opens the benign decoy document (related to Russian income tax law) to distract the user.91.223.75[.]96 to await commands.T1053.005 - Scheduled Task/Job: Scheduled Task) and placing an LNK file in the Windows Startup folder (T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder).Researchers linked the campaign to the Russian auto sector through the discovery of a typosquatted domain, carprlce[.]ru, which impersonates the legitimate Russian car sales site carprice.ru.
| Type | Value | Description |
|---|---|---|
| ip_address_v4 | 91.223.75.96 |
C2 server for CAPI Backdoor |
| domain | carprlce.ru |
Typosquatted domain used in the campaign |
| file_name | adobe.dll |
Malicious .NET implant (CAPI Backdoor) |
rundll32.exe executing DLLs from unusual locations (e.g., AppData, Temp folders) or executing DLLs with suspicious names like adobe.dll. Correlate this with a parent process of explorer.exe (if a user clicked an LNK file). This is a form of Process Analysis (D3-PA).91.223.75[.]96. Monitor for DNS requests to the typosquatted domain carprlce[.]ru. This is a form of Network Traffic Analysis (D3-NTA)..lnk rather than a document. Consider blocking LNK files arriving as email attachments at the mail gateway.rundll32.exe. This is a form of Executable Allowlisting (D3-EAL).Training users to be suspicious of unexpected ZIP attachments and LNK files is the first line of defense against this phishing vector.
Using application control to prevent the execution of untrusted DLLs can block the malware payload, even when initiated by a trusted binary like rundll32.exe.
Mapped D3FEND Techniques:
To detect the CAPI Backdoor's living-off-the-land technique, organizations should use an EDR solution to perform advanced process analysis. Specifically, security teams should create detection rules that look for the legitimate Windows binary rundll32.exe being used to load and execute unsigned or unknown DLLs (like adobe.dll) from non-standard user directories such as %APPDATA% or %TEMP%. Correlating this process execution with its parent process (e.g., explorer.exe from a user clicking an LNK file) can provide high-fidelity alerts. Monitoring the command-line arguments passed to rundll32.exe is essential for identifying this type of malicious activity, which is designed to blend in with normal system operations.
Email security gateways should be configured with content filtering rules to specifically target the initial delivery vector of this campaign. This includes creating a rule to block or quarantine all incoming emails that contain ZIP archives which, in turn, contain LNK files. Since LNK files are a common vector for malware delivery but have few legitimate use cases as email attachments, this is a highly effective, low-impact rule. This preventative measure stops the CAPI Backdoor campaign at the perimeter, before it ever reaches a user's inbox, effectively neutralizing the threat.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats