Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Oyster

148
Global rank
171 infographic chevron month
Month rank
167 infographic chevron week
Week rank
0
IOCs

Oyster (also seen in reporting as Broomstick or CleanUpLoader) is a Windows backdoor/loader actively used in multi-stage intrusion campaigns. Recent campaigns weaponize SEO-poisoning and malvertising to trick IT and dev users into downloading trojanized installers (PuTTY, WinSCP, Microsoft Teams, etc.), which then drop Oyster to establish a persistent foothold and load additional payloads (often leading to data theft or ransomware).

Backdoor
Type
Unknown
Origin
1 September, 2023
First seen
12 February, 2026
Last seen
Also known as
Broomstick
CleanUpLoader

How to analyze Oyster with ANY.RUN

Type
Unknown
Origin
1 September, 2023
First seen
12 February, 2026
Last seen

IOCs

IP addresses
185.208.159.102
51.222.96.108
135.125.241.45
85.239.53.66
185.28.119.217
45.86.230.184
46.183.25.6
185.196.8.217
51.195.232.46
162.19.237.181
168.100.10.165
206.166.251.114
193.43.104.208
139.99.221.140
23.227.196.123
95.169.180.141
46.183.25.224
144.217.207.26
64.52.80.96
67.217.228.225
Domains
myfirstfist.com
coretether.com
registrywave.com
wherehomebe.com
greensolutionshub.net
antifed.net
gumtreever.i-order.shop
futurepathlabs.com
cloudignitetech.com
retdirectyourman.eu
firstcountryours.eu
kisppy.net
aramex.o-blank.site
postmastersoriginals.com
gemen.asia
anumalisa.com
dotnetisforchildren.com
yourserenahelpcustom.uk
johnwest-cars.co.uk
jfhgfh.duckdns.org
Last Seen at

Recent blog posts

post image
Ready for macOS Threats: Expanding Your SOC’s...
watchers 1355
comments 0
post image
How to Reduce MTTR in Your SOC with Better Th...
watchers 554
comments 0
post image
Lazarus, AI, and Trust Abuse: Top Enterprise...
watchers 1608
comments 0

Unveiling the Oyster Backdoor: A Stealthy Threat in the Shadows of Malvertising

Key Takeaways

  1. Oyster = loader/backdoor: Often observed as Oyster/Broomstick/CleanUpLoader and used as an initial access/loader stage.
  2. Primary lure: Trojanized installers + SEO poisoning. Attackers target IT pros by faking downloads for PuTTY, WinSCP, Teams, etc.
  3. Persistence pattern to hunt: Look for scheduled tasks executing rundll32 and unusual DLLs (e.g., twain_96.dll) and short-interval tasks.
  4. Network detection: Monitor for suspicious HTTPS callbacks to newly registered domains; combine with proxy/DNS logs to spot trojanized download pages.
  5. Prevention wins: Reduce risk by enforcing download policies, restricting admin rights, using app allowlists, and practicing good backup hygiene.
  6. Use a sandbox for rapid triage: Detonate suspicious installers to capture behavior (scheduled tasks, DLL execution, C2) before allowing enterprise deployment. (Run these in isolated sandboxes.) ANY.RUN’s Interactive Sandbox provides safe environment, smart anti-evasion techniques, and full visibility of the attack chain.

View Oyster backdoor in action:.

Oyster Backdoor sandbox analysis Oyster Backdoor in the Sandbox: processes, connections, files, IOCs, and more

  1. Leverage TI Lookup for rapid threat validation: When suspicious downloads, domains, or file hashes are encountered, TI Lookup provides instant threat intelligence validation. Security teams can quickly determine whether indicators are associated with Oyster campaigns, enabling immediate defensive actions. Integrating TI Lookup into security workflows accelerates incident detection and response, reducing attacker dwell time and limiting damage.

domainName:"partycybertrap.com""

Domain tagged by TI Lookup as Oyster backdoor infrastructure Domain tagged by TI Lookup as Oyster backdoor infrastructure

What is Oyster Backdoor Malware?

Oyster Backdoor represents a modular, multistage threat designed for stealth and versatility in cybercriminal operations. First identified by IBM researchers in September 2023 (though samples date back to July) it functions as a loader and backdoor, allowing attackers to establish command-and-control (C2) communications while blending into normal system activity.

Its common behaviors include: creating persistence (scheduled tasks), executing a malicious DLL via rundll32 (DLL registration/export abuse), communicating with command-and-control (C2) over HTTPS, using string obfuscation and process injection to evade detection, and acting as a staging loader for follow-on payloads (credential stealers, Cobalt-like tools, ransomware). Analysts have observed operators using Oyster to perform reconnaissance and hands-on-keyboard activity after initial deployment.

Unlike more rudimentary malware, Oyster's lightweight design supports a range of post-exploitation activities, from reconnaissance to payload delivery, making it a favorite among ransomware affiliates. Its evolution includes updated variants in 2024 and 2025, incorporating encrypted C2 protocols and reduced obfuscation for faster deployment. Linked to groups like ITG23 (also known as Wizard Spider or Periwinkle Tempest), Oyster has been commoditized as Malware-as-a-Service (MaaS), lowering the barrier for less sophisticated actors to launch targeted intrusions.

By masquerading as trusted applications like Microsoft Teams, Google Chrome, PuTTY, and WinSCP, Oyster exploits user trust to gain initial access to corporate environments, making it a significant threat to organizations across all sectors.

Oyster infiltrates via social engineering, exploiting malvertising and SEO poisoning on search engines like Google and Bing. Users searching for "Teams download" or "PuTTY installer" encounter sponsored ads or top results leading to spoofed sites. These host signed EXEs mimicking legitimate installers (e.g., MSTeamsSetup.exe), which drop the DLL post-execution while launching the real app to avoid suspicion.

Spread occurs laterally via RCE: attackers scan RDP ports, create admin accounts, and deploy to connected endpoints. No self-propagation like worms; reliance on human error and network traversal amplifies its reach in enterprise

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Oyster Backdoor Victimology

Oyster primarily targets Windows users worldwide, with a focus on English-speaking regions such as the United States, United Kingdom, Germany, France, and Italy. Its campaigns disproportionately affect IT professionals and organizations in sectors vulnerable to ransomware, including healthcare, education, academia, legal services, and manufacturing. For instance, Rhysida ransomware operators known for hitting education (30% of victims) use Oyster to breach academic institutions.

Healthcare stands out due to targeted lures like fake PuTTY and WinSCP installers aimed at admins managing sensitive networks. Broader campaigns via fake Teams or Chrome downloads ensnare general users, but corporate endpoints provide the real value for lateral movement and extortion

How Oyster Backdoor Functions

Understanding Oyster's technical operation provides insights into detection and prevention strategies.

Initial Execution

The infection begins when a victim downloads and executes a trojanized installer from a malicious website. Upon execution, the installer extracts embedded resources, including malicious DLL files stored in the resource section of the executable.

Persistence Establishment

Oyster establishes persistence through scheduled tasks created with names like "CaptureService" or similar innocuous identifiers. Some variants use the DllRegisterServer export, while others leverage custom exports for execution. This ensures the malware remains active across system reboots and standard cleanup procedures.

Command and Control Communication

Once established, Oyster initiates communication with hard-coded C2 servers. The malware employs multiple C2 domains for redundancy, ensuring continued operation if one server is taken down. Communication protocols have evolved, with newer versions using substitution ciphers and custom encoding to obfuscate traffic and evade network monitoring.

System Reconnaissance

The malware performs comprehensive system profiling, collecting information about the operating system version, installed software and security products, user accounts and privileges, network configuration and domain membership, running processes and services, and available storage and file systems. This intelligence is transmitted to operators who use it to determine the value of the compromised system and plan subsequent attack stages.

Command Execution

The backdoor supports remote command execution, allowing operators to issue arbitrary commands through cmd.exe. This capability enables a wide range of malicious activities including file manipulation, credential harvesting, lateral movement preparation, security tool disablement, and additional payload deployment.

Payload Delivery

Oyster's modular architecture allows operators to download and execute additional tools based on attack objectives. Documented secondary payloads include Cobalt Strike beacons for hands-on-keyboard operations, PowerShell scripts (SILENTKILL) for defense evasion, credential theft tools, network scanning utilities, and ultimately, Rhysida ransomware binaries.

Oyster Backdoor Real-Time Analysis

By detonating an Oyster sample in ANY.RUN’s Interactive Sandbox one can observe it leverage invalid certificates, persistence mechanics and C2 communications.

View a sandbox analysis session of Oyster Backdoor.

Oyster Backdoor sandbox analysis Oyster Backdoor in the Sandbox: processes, connections, files, IOCs, and more

Attackers imitate legitimate software download pages to lure users into downloading a malicious app.

Fake Microsoft Teams page spreading Oyster Backdoor Fake Microsoft Teams page spreading Oyster Backdoor

The apps infected by Oyster usually have a compromised certificate, most often it’s expired, revoked or invalid due to modifications:

A certificate revoked by issuer A certificate revoked by issuer

After launching the application, a DLL library is created and executed, serving as the primary component of the backdoor. In this case, the file is disguised as WindowsCodecs.dll.

Malicious DLL library Malicious DLL library

Oyster's persistence is achieved through the Windows Task Scheduler. In our example, the task is configured to run every 18 minutes.

The malware sets up Windows Task Scheduler The malware sets up Windows Task Scheduler

Attention should be paid to the mutexes created by instances of this malicious software. They are hardcoded in the code, making them useful indicators of compromise.

Oyster Backdoor mutex An Oyster Backdoor mutex

Analysis reveals the backdoor's network activity, which is directed toward communication with C2 servers. This activity may vary depending on the state of the C2 server.

In this analysis, data is observed being downloaded with the MIME type application/x-x509-cert, indicating an attempt to exchange certificates or related data for authentication or further commands.

Oyster Backdoor downloads data Oyster Backdoor downloads data

Gathering Threat Intelligence on Oyster Backdoor Malware

Threat intelligence provides critical capabilities for detecting, preventing, and responding to Oyster backdoor threats. It helps enrich detection rules with specific indicators associated with Oyster.

SIEM systems incorporate IOCs to generate alerts when suspicious activity occurs. EDR platforms leverage threat intelligence to identify malicious processes and network connections. This intelligence-driven approach significantly improves detection accuracy and reduces false positives.

Threat intelligence feeds deliver timely information about emerging Oyster campaigns, including new C2 infrastructure, updated file hashes, malicious domains, and TTPs employed by attackers. Security teams can proactively block known malicious indicators before they impact the organization. Intelligence about typosquatted domains enables preemptive blocking or monitoring, preventing employee exposure to fake download sites.

Use ANY.RUN’s Threat Intelligence Lookup to search IOCs and behavior data linked to Oyster backdoor. Start from querying the threat name to find Oyster's samples that ANY.RUN’s community of 500K professionals and 15K SOC teams has already analyzed. Study TTPs and gather indicators:

threatName:"Oyster"

Oyster backdoor sample analyses found via TI Lookup Oyster backdoor sample analyses found via TI Lookup

Add an IOC to the search query to get a selection of indicators to use for monitoring, detection, and alerts:

threatName:"Oyster" and domainName:""

Oyster backdoor sample analyses found via TI Lookup Oyster backdoor sample analyses found via TI Lookup

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Oyster Backdoor represents a significant and evolving threat, serving as a critical tool for cybercriminals’ ransomware operations and targeted intrusions. Its distribution through malvertising and SEO poisoning, combined with its modular architecture and evasion capabilities, makes it a formidable challenge for organizations of all sizes and sectors.

Effective defense against Oyster requires comprehensive security strategies spanning multiple domains. Technical controls including endpoint protection, network security, and access management form the foundation. However, human factors remain critical: user education about malvertising threats and software download risks significantly reduces exposure.

Timely intelligence about new campaigns, IOCs, and attacker TTPs enables proactive defense, early detection, and rapid response. Organizations leveraging both commercial and open-source intelligence, integrated into security tools and processes, significantly improve their defensive posture.

Start gathering actionable threat intelligence on Oyster backdoor by signing up to ANY.RUN’s TI Lookup: protect your business with timely detection and response.

HAVE A LOOK AT

Prometei screenshot
Prometei
prometei
Prometei is a modular botnet malware family that silently infiltrates systems, hijacking their resources for illicit Monero (XMR) mining. Active since at least 2016, it combines stealth, persistence, and lateral movement capabilities. Notable for its global reach and opportunistic infection strategy, it is also used for credential theft.
Read More
X-Files screenshot
X-Files
xfiles
X-FILES Stealer is a sophisticated malware designed to infiltrate systems and steal sensitive information, targeting login credentials for email, social media, and other personal accounts. It captures data and transmits it back to the attacker’s command-and-control server. X-FILES Stealer employs advanced evasion techniques to avoid detection, making it a persistent threat in the cyber landscape.
Read More
Chaos Ransomware screenshot
Chaos ransomware is a malware family known for its destructive capabilities and diverse variants. It first appeared in 2021 as a ransomware builder and later acted as a wiper. Unlike most ransomware strains that encrypt data to extort payment, early Chaos variants permanently corrupted files, while later versions adopted more conventional encryption techniques.
Read More
Stealer screenshot
Stealer
stealer
Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.
Read More
Sneaky 2FA screenshot
Sneaky 2FA
sneaky2fa
Sneaky 2FA is an Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts. Distributed as a Phishing-as-a-Service (PhaaS) through a Telegram bot, this malware bypasses two-factor authentication (2FA) to steal credentials and session cookies, posing a significant threat to individuals and organizations.
Read More
Spyware screenshot
Spyware
spyware
Spyware is a stealth form of malware whose primary objective is to gather sensitive information, such as personal data, login credentials, and financial details, by monitoring user activities and exploiting system vulnerabilities. Spyware operates secretly in the background, evading detection while transmitting collected data to cybercriminals, who can then use it for malicious purposes like identity theft, financial fraud, or espionage.
Read More