MuddyWater Launches Operation Olalampo Targeting MENA with New Malware


Iran-linked MuddyWater (aka Earth Vetala, Mango Sandstorm) started Operation Olalampo on January 26, 2026. It hits MENA organizations using phishing and new tools like GhostFetch, CHAR, HTTP_VIP, and GhostBackDoor.

Attacks begin with Excel docs prompting macro enablement. Macros decode payloads for remote access. Lures include flight tickets, reports, or fake energy firms.

One chain drops Rust backdoor CHAR via Telegram bot “stager_51_bot” (named Olalampo). Another uses GhostFetch downloader for GhostBackDoor. HTTP_VIP fetches AnyDesk from codefusiontech[.]org.

CHAR executes cmd/PowerShell for SOCKS5 proxies, Kalim backdoor, browser theft, and binaries like sh.exe. Group-IB notes AI-assisted code from emojis in strings.

Malware Toolset Breakdown

GhostFetch profiles systems, evades sandboxes, loads payloads in memory. GhostBackDoor offers shell, file ops, re-runs GhostFetch.

HTTP_VIP reconnoiters, authenticates, deploys AnyDesk. New variants add shells, file transfer, clipboard grabs.

CHAR uses Telegram C2 for flexible commands. Shares Rust style with BlackBeard RAT.

Attack Chain Table

StageMalwareKey Features
Initial AccessMalicious ExcelMacro drops loader
DownloaderGhostFetchAnti-VM/debug, memory exec
DownloaderHTTP_VIPAnyDesk deploy, C2 auth
BackdoorGhostBackDoorShell, file R/W
BackdoorCHARTelegram bot C2, PowerShell

MuddyWater exploits public servers too. This keeps options open beyond phishing.

Campaign Insights

Targets focus on MENA governments, corporates. Tools show maturity with memory loads, Telegram C2, AI dev hints.

Diversified C2 blends malicious and legit traffic. Rust use boosts cross-platform evasion.

Group-IB warns of expansion. MuddyWater persists in META region with custom tools.

FAQ

What is Operation Olalampo?

MuddyWater’s MENA campaign since Jan 26, 2026. Uses GhostFetch, CHAR, etc., for espionage.

How does infection start?

Phishing Excel with macros. Drops downloaders leading to backdoors.

What makes CHAR unique?

Rust-based, Telegram C2 bot “stager_51_bot”. Runs proxies, stealers.

Targets and region?

MENA organizations, mainly META area. Geopolitical focus.

AI role in malware?

Emojis in CHAR code suggest LLM help, per Group-IB analysis.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages