Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Banner Ancharia Desktop 1 1
Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel

Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel

6 January 2026 09:24

The Patchwork hacker group, also known as Dropping Elephant and Maha Grass , has returned to the spotlight after a series of targeted attacks on Pakistani defense facilities. In their latest campaign, the attackers used phishing emails containing ZIP archives containing a hidden MSBuild project. Once executed, it activates a downloader that installs malware written in Python.

The malware can connect to a remote server, run Python modules, execute commands, and facilitate file sharing . This campaign used sophisticated stealth techniques, ranging from modified runtime environments to hidden communication channels and persistence methods.

Since late 2025, the group has maintained a connection with the new StreamSpy Trojan . This previously unknown program uses the WebSocket and HTTP protocols to separate control and file transfer. Server instructions are received via WebSocket, while files are intercepted and sent via HTTP.

An analysis by the Chinese firm QiAnXin revealed that StreamSpy shares some similarities with another malware called Spyder , believed to be a variant of the WarHawk family associated with the SideWinder group. Spyder has been used by the Patchwork group since 2023.

StreamSpy is distributed via archives with names like “OPS-VII-SIR.zip” hosted on the “firebasescloudemail[.]com” domain. The main executable file, “Annexure.exe” , collects system information and can connect to the system via the registry, Task Scheduler, or an LNK file in the startup folder. Communication with the command and control server occurs via two channels: WebSocket and HTTP.

The malware’s capabilities include downloading and opening files, executing commands via various shells, gathering information about the file system and connected drives, transferring and deleting files, and viewing the contents of specific folders. Some commands download encrypted ZIP files, unzip them, and automatically execute the contents.

QiAnXin also detected Spyder variants with advanced data collection capabilities deployed on the same resource. The digital signature “Annexure.exe” matches that of another Trojan, ShadowAgent , attributed to the DoNot group (also known as Brainworm ). In November 2025, the 360 Threat Analysis Center classified this executable as ShadowAgent .

According to Chinese researchers, the appearance of variants of StreamSpy and Spyder indicates that Maha Grass is actively developing its malware.

StreamSpy’s use of WebSocket channels can be seen as an attempt to bypass traffic filtering and hide command-line activity. Furthermore, the similarity of the samples confirms that Patchwork and DoNot likely share resources and technologies.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

  • APT Group
  • Cyber Attack
  • cybersecurity
  • Dropping Elephant
  • Maha Grass
  • Malware Analysis
  • Patchwork Group
  • StreamSpy Malware
  • threat intelligence
  • WebSocket C2 Channel
Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.