PULSE NAME
Tracking MiniDionis: CozyCar's New Ride Is Related to Seaduke
WHITE CozyDuke AlienVault 2026-04-13 Modified: 2026-04-13
44
IOCs
MEDIUM VOLUME
A new campaign attributed to CozyDuke threat actors has been identified, utilizing malware called MiniDionis that appears related to Seaduke. The campaign began on July 7, 2015, targeting government organizations and think-tanks in democratic countries through spear phishing emails containing malicious links or attachments. The attack chain involves multi-stage droppers that deliver decoy media files while executing malicious payloads in the background. MiniDionis uses compromised legitimate websites for command and control, employs JSON-based configuration, and communicates over HTTPS using RC4 and AES encryption. The malware includes comprehensive command capabilities for system reconnaissance, file operations, and remote execution. The attackers demonstrate sophisticated techniques including manual HTTP redirection handling and cleanup mechanisms to evade forensic analysis.
MITRE ATT&CK & Malware Families
MALWARE FAMILIES
CloudDuke - S0054 MiniDionis CloudLook CozyCar - S0046 CozyDuke CozyBear Cozer EuroAPT SeaDuke - S0053 SeaDaddy SeaDesk Forkmeimfamous
Indicators of Compromise (1 / 44 total)
All CVE FileHash-MD5 IPv4 URL domain hostname
TYPEINDICATORDESCRIPTIONCREATED
URL https://www.illuminatistudios.net/mobile/viewer.php 2026-04-13