PULSE NAME
REFUNDEE: Inside a Shadow Panel Phishing-as-a-Service Operation
WHITE AlienVault 2026-04-13 Modified: 2026-04-13
37
IOCs
MEDIUM VOLUME
An open directory discovery at refundonex[.]com exposed a complete Phishing-as-a-Service and RAT-as-a-Service platform targeting Spanish and Portuguese-speaking victims. The investigation uncovered 3,788 files including weaponized LNK, VBS, and AES-encrypted PowerShell payloads delivering a remote access trojan. The platform, called Shadow Panel, operates from Bulgarian infrastructure and offers capabilities including remote shell execution, screenshot capture, file management, browser credential theft, clipboard hijacking for cryptocurrency wallets, and multi-operator support. The C2 panel's frontend JavaScript was publicly accessible, revealing 29 API endpoints and the complete architecture. Infrastructure analysis linked the operation to nikola4010@proton[.]me through WHOIS data and historical malicious domain associations dating back to 2021, indicating a long-running cybercriminal operation with minimal detection coverage.
Indicators of Compromise (5 / 37 total)
All FileHash-MD5 FileHash-SHA1 FileHash-SHA256 IPv4 URL YARA domain email hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 1009fac37240f16e01e552cf87e61dde 2026-04-13
FileHash-MD5 4fd2128e4b4549c46e2c112e7dc34096 2026-04-13
FileHash-MD5 88e5c48cd7d0ba596c136967b28803aa 2026-04-13
FileHash-MD5 db2fefe7fa768504ac64b8ef6942738b 2026-04-13
FileHash-MD5 f5847ed553b087a7a684de6d4dee3df1 2026-04-13