Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

Peaklight malware deep dive, peaklight, emmenhtal, in-memory malware, lnk, mshta, powershell, bunnycdn, webdav, cryptbot, lumma, shadowladder, hijackloader, threat hunting, incident response, mitre att&ck


1. Executive Summary

Peaklight (also tracked as PEAKLIGHT by Mandiant) is best understood as the PowerShell downloader stage within a broader, multi-stage loader ecosystem that often begins with malicious Windows Shortcut (LNK) files masquerading as media or document content. In Mandiant’s reporting, the infection chain uses mshta.exe as a signed-binary proxy to execute remote script content hosted on a CDN, followed by heavily obfuscated JavaScript and PowerShell that ultimately delivers commodity payloads such as LUMMAC.V2 (Lumma Stealer), CRYPTBOT, and SHADOWLADDER. (Google Cloud)

Multiple independent research teams connect this activity to the Emmenhtal loader family (also referred to as PEAKLIGHT in some contexts), highlighting a crimeware-style ecosystem used by multiple financially motivated actors and, in later campaigns, activity consistent with malware-as-a-service or infrastructure-as-a-service models. (orangecyberdefense.com)


2. Contextual Background

2.1 Nature of the threat

What is “Peaklight”?

  • In Mandiant’s public analysis, PEAKLIGHT is the obfuscated PowerShell-based downloader that checks for ZIP archives in hard-coded paths and, if missing, pulls archives from a CDN and writes them to disk before extracting and chaining into additional payload execution. (Google Cloud)
  • In parallel reporting, Orange Cyberdefense tracks a closely aligned multi-stage loader it dubbed Emmenhtal, involving HTA, JavaScript, and PowerShell layers, with some variants distributed via ZIP archives containing LNKs and others via WebDAV-hosted LNKs. (orangecyberdefense.com)
  • Sekoia.io explicitly states that Emmenhtal is also known as PeakLight, and documents WebDAV-backed distribution infrastructure used to host weaponised LNK files that invoke mshta.exe. (Sekoia.io Blog)

Key takeaway: Peaklight is not a single “fileless stealer” but a delivery chain where early stages can execute in memory and evade disk-based controls, while later stages commonly download archives/payloads and execute commodity malware. (Google Cloud)

2.2 Threat-actor attribution

No reputable public source conclusively attributes Peaklight/Emmenhtal to a single named threat actor. Orange Cyberdefense assesses the loader is highly likely used by multiple financially motivated threat actors (Admiralty/NATO-style confidence: Likely) based on the variety of distribution clusters and payloads observed. (orangecyberdefense.com)

Sekoia.io further supports a shared-service hypothesis, suggesting the supporting WebDAV infrastructure may be offered “as-a-service” to multiple actors due to payload diversity and repeated “test” artefacts. Confidence: Possible (hypothesis explicitly presented as such). (Sekoia.io Blog)

2.3 Sector and geographic targeting

Observed targeting is broad and opportunistic, consistent with crimeware distribution:

  • Orange Cyberdefense reports incidents affecting clients in France and describes multiple clusters with inferred targeting signals including Russia, South Africa, Malaysia, and North America, derived from infrastructure geolocation and lure language/filenames. (orangecyberdefense.com)
  • Later reporting by Talos links Emmenhtal use to phishing activity appearing to target Ukrainian entities (billing/invoice-themed lures). (Cisco Talos Blog)

3. Technical Analysis

3.1 Attack chain and observed TTPs (with MITRE ATT&CK mapping)

This section synthesises the most repeatable elements described by Mandiant, Orange Cyberdefense, and Sekoia.io.

Stage 0: Initial access and lure delivery

Common entry points include:

  • Malicious ZIP archives containing LNK files (often disguised as video content). (orangecyberdefense.com)
  • WebDAV-hosted LNK delivery, sometimes preceded by browser redirection that opens an Explorer window pointing at the remote WebDAV share. (orangecyberdefense.com)

MITRE mapping:

  • User execution of malicious shortcuts: T1204.002
  • Masquerading (lures presented as videos/docs): T1036 (behaviour described across sources)

Stage 1: LNK execution and “living off the land” bootstrap

Mandiant observed LNK parameters that:

  • Use forfiles.exe to trigger PowerShell and then invoke mshta.exe to execute remote content from Bunny CDN subdomains. (Google Cloud)
  • In another variation, use PowerShell wildcards and registry querying to resolve mshta execution more stealthily before retrieving remote payload content. (Google Cloud)

MITRE mapping:

Stage 2: Remote script retrieval via CDN and in-memory JavaScript dropper

Mandiant describes a cached/hosted obfuscated JavaScript dropper on CDN infrastructure, using decimal-encoded ASCII and runtime decoding to reveal embedded payload logic. (Google Cloud)

MITRE mapping:

  • Obfuscated files or information: T1027
  • Ingress tool transfer (download of staged content): T1105
  • Use of web protocols: T1071.001

Stage 3: PEAKLIGHT downloader retrieves archives and chains payload execution

Mandiant’s PEAKLIGHT stage:

  • Checks for specific ZIP archives in hard-coded locations, downloads them if missing, writes to disk, and extracts. (Google Cloud)
  • Delivers and enables execution of payloads including LUMMAC.V2, CRYPTBOT, and SHADOWLADDER. (Google Cloud)
  • Includes a “cover” behaviour: after LNK execution, a benign-looking video may play to reduce user suspicion. (Google Cloud)

MITRE mapping:

  • Ingress tool transfer: T1105
  • Defence evasion via cover content (inferred from described cover video): T1036 (behavioural inference)

Stage 4: Side-loading and follow-on execution patterns

In one Mandiant-described variation:

  • A renamed legitimate executable loads a malicious DLL (side-loading), and built-in utilities are used to drop additional components associated with payload execution. (Google Cloud)

MITRE mapping:

  • DLL search order hijacking / side-loading: T1574.001 (supported by the described “legitimate EXE loads malicious DLL” pattern)

Payload ecosystem notes

Several sources highlight overlapping naming around SHADOWLADDER and Hijack Loader:

  • SCWorld summarises Mandiant’s reporting that PEAKLIGHT enables retrieval of Hijack Loader, also referred to as SHADOWLADDER (and other aliases), alongside Lumma and CryptBot. (SC Media)

3.2 Exploitation status and PoCs

Active use:

  • Orange Cyberdefense reported some campaigns were still active as of their analysis cut-off (7 August 2024) and described an ongoing iteration beginning mid-July 2024. (orangecyberdefense.com)
  • Subsequent reporting through 2025 indicates continued evolution and reuse of Emmenhtal/PEAKLIGHT components in additional campaigns, including those involving SmokeLoader and MaaS-style distribution. (Cisco Talos Blog)

CVE exploitation

In the core public technical write-ups by Mandiant, Orange Cyberdefense, and Sekoia.io that describe Peaklight/Emmenhtal infection chains, no CVE-dependent exploitation is required to execute the described LNK → mshta → script chain (Google Cloud)

Well-known Office-related RCE vectors:

4. Impact Assessment

4.1 Severity and scope

Peaklight’s practical risk is driven by two factors:

  1. Stealth and evasion: early script stages may execute in memory, and the chain heavily relies on trusted Windows binaries (notably mshta) and reputable infrastructure (CDN), complicating simple blocklists and basic static file scanning. (Google Cloud)
  2. Downstream payload impact: delivered payloads include information stealers (credential, browser session, and financial data theft) and loaders that can enable further compromise. Mandiant explicitly observed Lumma, CryptBot, and SHADOWLADDER delivered via this chain. (Google Cloud)

Because this is malware and not a single vulnerability, CVSS scoring is not applicable to Peaklight itself. Risk prioritisation should be based on exposure to user-executed lures (downloads, phishing), control strength around PowerShell/mshta, and the business impact of credential theft.

4.2 Victim profile

Public reporting indicates:

  • Windows endpoints are the primary target platform. (Google Cloud)
  • Victims range from general organisations (opportunistic “fake video” lures) to geographically inferred targeting clusters (including Ukraine-linked phishing activity in 2025 reporting). (orangecyberdefense.com)

5. Indicators of Compromise (IOCs)

5.1 IOC table

Note: Values are shown in an intentionally non-clickable, defanged format (hxxp/hxxps and [.]).

TypeValueContext/NotesSource
URLhxxps://nextomax.b-cdn[.]net/nextoCDN-hosted stage referenced in LNK variationMandiant PEAKLIGHT analysis (Google Cloud)
URLhxxps://potexo.b-cdn[.]net/potexoCDN-hosted stage referenced in LNK variationMandiant PEAKLIGHT analysis (Google Cloud)
URLhxxps://fatodex.b-cdn[.]net/fatodexNetwork-based IOC listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
URLhxxps://matodown.b-cdn[.]net/matodownNetwork-based IOC listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
URLhxxps://potexo.b-cdn[.]net/potexoNetwork-based IOC listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
URLhxxp://62.133.61[.]56/Downloads/Full%20Video%20HD%20(1080p).lnkWebDAV directory and LNK retrieval exampleMandiant PEAKLIGHT analysis (Google Cloud)
Domainstreamvideoz.b-cdn[.]netCluster indicators reported by Orange CyberdefenseOrange Cyberdefense Emmenhtal report (orangecyberdefense.com)
Domainnextomax.b-cdn[.]netCluster indicator reported by Orange CyberdefenseOrange Cyberdefense Emmenhtal report (orangecyberdefense.com)
Domainmatodown.b-cdn[.]netCluster indicator reported by Orange CyberdefenseOrange Cyberdefense Emmenhtal report (orangecyberdefense.com)
Domainfatodex.b-cdn[.]netCluster indicator reported by Orange CyberdefenseOrange Cyberdefense Emmenhtal report (orangecyberdefense.com)
Domainrelaxtionflouwerwi[.]shopLumma C2 domain listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
Domainmesstimetabledkolvk[.]shopLumma C2 domain listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
URLhxxp://gceight8vt[.]top/upload.phpCryptBot C2 path listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
URLhxxps://brewdogebar[.]com/code.vueCryptBot C2 path listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
URLhxxps://fatodex.b-cdn[.]net/K1.zipShadowladder-related download listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
URLhxxps://fatodex.b-cdn[.]net/K2.zipShadowladder-related download listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
File (MD5)62f20122a70c0f86a98ff14e84bcc999LNK sample hash (Full Video HD (1080p).lnk)Mandiant PEAKLIGHT analysis (Google Cloud)
File (MD5)91423dd4f34f759aaf82aa73fa202120Cover “video.mp4” hash referenced by MandiantMandiant PEAKLIGHT analysis (Google Cloud)
File (MD5)95361f5f264e58d6ca4538e7b436ab67PEAKLIGHT downloader hash listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
File (MD5)b716a1d24c05c6adee11ca7388b728d3PEAKLIGHT downloader hash listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
File (MD5)58c4ba9385139785e9700898cb097538WebView2Loader.dll hash listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
File (MD5)43939986a671821203bf9b6ba52a51b4Lumma payload file hash listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
File (MD5)d6ea5dcdb2f88a65399f87809f43f83cCryptBot-associated file hash listed by MandiantMandiant PEAKLIGHT IOCs (Google Cloud)
IP91[.]92[.]251[.]35Example WebDAV-hosted LNK infrastructure observed by Sekoia.ioSekoia.io WebDAV infrastructure report (Sekoia.io Blog)
IP206[.]188[.]196[.]28Example WebDAV-hosted LNK infrastructure observed by Sekoia.ioSekoia.io WebDAV infrastructure report (Sekoia.io Blog)

5.2 Detection guidance

Vendor and community detection content

Practical behavioural hunts (examples)
Use these as templates (adapt fields to your EDR/SIEM):

Windows process creation hunt (high-signal)

  • forfiles.exe spawning PowerShell with dot-sourcing and mshta
  • PowerShell spawning mshta.exe with remote hxxp(s) URLs
  • mshta.exe reaching out to unusual CDN subdomains followed by script-heavy child processes

Example KQL (Microsoft Defender / Sentinel style):

DeviceProcessEvents
| where FileName in~ ("forfiles.exe","powershell.exe","mshta.exe")
| where ProcessCommandLine has_any ("mshta", ".b-cdn", "Expand-Archive", "DownloadData", "SecurityProtocolType")
| project Timestamp, DeviceName, InitiatingProcessFileName, FileName, ProcessCommandLine, InitiatingProcessCommandLine
| order by Timestamp desc

WebDAV indicator hunt

  • Outbound connections to hosts serving /Downloads/ and immediate retrieval of .lnk
  • Explorer opening remote file shares that then lead to shortcut execution

Example Splunk (proxy + endpoint correlation concept):

(index=proxy OR index=network) uri_path="*/Downloads/*" (uri_path="*.lnk" OR uri_path="*/Downloads/")
| stats count values(dest) values(url) by src

6. Incident Response Guidance

6.1 Containment, eradication, and recovery

  1. Isolate affected endpoints quickly (network containment), because downstream payloads include stealers and loaders with high likelihood of credential theft.
  2. Reset credentials and session tokens for users of affected hosts, prioritising browsers, email, VPN, and SaaS accounts. Consider forced re-authentication if you suspect cookie/session theft.
  3. Block and sinkhole known indicators from reputable sources (start with Mandiant-published IOCs; augment with internal telemetry). (Google Cloud)
  4. Hunt laterally for “follow-on” execution patterns, especially scheduled tasks or abnormal persistence mechanisms introduced by secondary loaders (varies by payload; do not assume a single persistence pattern).

6.2 Forensic artefacts to collect and preserve

Because early stages may be memory-resident or short-lived:

  • Memory capture (where policy permits) and EDR process telemetry around powershell.exe, mshta.exe, and suspicious child processes.
  • PowerShell logs (Script Block Logging, Module Logging) and AMSI events if enabled.
  • Sysmon (Event IDs 1, 3, 7, 11) or equivalent EDR records for process/network/module load.
  • Downloads and Temp directories, including extracted ZIPs and any renamed “legitimate” executables used for side-loading. (Google Cloud)
  • Proxy/DNS logs for Bunny CDN subdomains and WebDAV endpoints.

6.3 Lessons learned and preventive recommendations

  • Treat mshta.exe and script interpreters as high-risk utilities in user workstations, and reduce where operationally possible.
  • Tighten controls around “user downloaded executable content” and LNK execution from user-writeable paths.

7. Threat Intelligence Contextualisation

7.1 Similar incidents and ecosystem overlap

Peaklight aligns with a wider trend: multi-stage loaders that blend social engineering, reputable web services, and living-off-the-land binaries to deliver credential theft at scale.

  • Orange Cyberdefense documents Emmenhtal as a multistage downloader used across numerous clusters since early 2024. (orangecyberdefense.com)
  • Sekoia.io’s “WebDAV-as-a-Service” reporting expands the picture into shared distribution infrastructure used for multiple malware families, reinforcing a service model hypothesis. (Sekoia.io Blog)
  • Talos later describes MaaS-style operations using Emmenhtal components and public GitHub repositories for staging payloads, indicating continued professionalisation of the ecosystem. (Cisco Talos Blog)

7.2 Full MITRE ATT&CK mapping table (observed or directly supported behaviours)

TacticTechnique IDTechnique NameObserved behaviour
Initial AccessT1204.002User Execution: Malicious FileUsers execute LNK masquerading as video/document content. (Google Cloud)
ExecutionT1059.003Windows Command ShellLNK uses forfiles.exe to launch scripted execution flow. (Google Cloud)
ExecutionT1059.001PowerShellPowerShell used extensively for downloader and decryption stages. (Google Cloud)
Defence EvasionT1218.005Signed Binary Proxy Execution: Mshtamshta.exe used to execute remote script content. (Google Cloud)
Defence EvasionT1027Obfuscated Files or InformationMulti-layer obfuscation in JavaScript and PowerShell stages. (Google Cloud)
Command and ControlT1071.001Application Layer Protocol: Web ProtocolsHTTP/HTTPS retrieval of staged content and payloads. (Google Cloud)
Command and ControlT1105Ingress Tool TransferDownloader retrieves ZIP archives and additional components. (Google Cloud)
Privilege Escalation / Defence EvasionT1574.001DLL Search Order HijackingLegitimate executable loads malicious DLL (side-loading pattern). (Google Cloud)

8. Mitigation Recommendations

8.1 Hardening and configuration

  • Constrain or block mshta.exe where business impact allows (WDAC, AppLocker, or EDR policy). Prioritise user workstations and non-developer endpoints.
  • Reduce PowerShell abuse: enable Script Block Logging, enforce Constrained Language Mode where feasible, and monitor for dot-sourcing and encoded commands.
  • Mark-of-the-Web enforcement and archive handling: treat downloaded archives containing LNK as high-risk; consider blocking or warning on LNK execution from user writeable directories (Downloads, Temp).
  • Web filtering: explicitly monitor and, if appropriate, restrict access to suspicious Bunny CDN subdomains used in campaigns (balance with false positives).

8.2 Patch management advice

Peaklight’s core chain as described does not rely on a specific unpatched vulnerability; it relies on user execution and built-in tooling. Patch prioritisation should instead focus on:


9. Historical Context & Related Vulnerabilities

9.1 Previously exploited techniques in the same ecosystem

The Emmenhtal/Peaklight ecosystem reflects persistent attacker preference for:

  • Script-heavy, multi-layer loaders (HTA/JS/PowerShell) embedded in or appended to legitimate binaries. (orangecyberdefense.com)
  • WebDAV and CDN abuse to host first-stage artefacts and reduce takedown friction. (Sekoia.io Blog)

9.2 Related coverage


10. Future Outlook

Peaklight and the wider Emmenhtal loader family show the characteristics defenders should expect from commodity loader evolution:

  • Broader distribution partnerships: Sekoia.io’s infrastructure observations and Talos’s MaaS reporting indicate shared services and modular payload delivery are likely to increase. (Sekoia.io Blog)
  • More trusted-host abuse: CDNs, code hosting, and common enterprise web services remain attractive staging points because organisations often cannot block them outright. (Cisco Talos Blog)
  • Shift from “fileless” marketing to hybrid reality: memory-resident stages will continue, but many campaigns will still drop archives, DLLs, or side-loading components when that improves reliability and payload success rates. (Google Cloud)

11. Further Reading

Primary technical analyses

Ecosystem evolution

Vulnerability references (contextual)