Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1059.003
Command and Scripting Interpreter: Windows Command Shell
T1059.001
Command and Scripting Interpreter: PowerShell
T1132.001
Data Encoding: Standard Encoding
T1071.001
Application Layer Protocol: Web Protocols
T1204.002
User Execution: Malicious File
CVE Profile
N/A (Social Engineering)
CISA KEV Status: Inactive
Telemetry
IPs
94.156.170[.]255
144[.]31[.]165[.]173
Domains
happyglamper[.]ro
cloudflare.report/forever/e/
Files
WorkFlowy[.]exe (v1.4.1050)
update.cmd
%APPDATA%\id.txt
flowy.zip
Constraint
The structure suggests the payload executes heavily obfuscated Node.js JavaScript directly within the V8 engine, bypassing the Chromium sandbox.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Initiate incident response protocols for potential C2 beaconing and unauthorized software execution.
DETECT (DE) – Monitoring & Analysis
Command
Query EDR/SIEM for process executions of cmd[.]exe /c net use Z: https://94.156.170[.]255/webdav.
Command
Hunt for network connections to 144[.]31[.]165[.]173 or DNS requests for cloudflare.report.
Command
Scan file systems for the presence of %LOCALAPPDATA%\MyApp\WorkFlowy.exe and %APPDATA%\id.txt.
RESPOND (RS) – Mitigation & Containment
Command
Isolate affected endpoints from the corporate network immediately.
Command
Terminate any active WorkFlowy[.]exe and powershell[.]exe child processes associated with the attack chain.
RECOVER (RC) – Restoration & Trust
Command
Remove the %LOCALAPPDATA%\MyApp directory, %TEMP%\dl.zip, %APPDATA%\id.txt, and any dynamic staging directories in %TEMP%.
Command
Validate clean state via full-system anti-malware scans.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Implement Web Content Filtering blocks for happyglamper[.]ro and cloudflare.report.
Command
Restrict outbound WebDAV traffic to untrusted external IP addresses.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G).
Priority 3: Persistence
Command
Check Scheduled Tasks, Startup Folders, and Browser Extensions.
Command
Manually delete the %LOCALAPPDATA%\MyApp folder and the %APPDATA%\id.txt tracking file if present.
Hardening & References
Baseline
CIS Benchmarks for Windows 10/11 (Disable outbound WebDAV/SMB and Windows Script Host where not explicitly required).
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
The Hacker News