TI Mindmap HUB
Threat Intelligence Report

Fake Telegram Malware Campaign: Analysis of a Multi-Stage Loader Delivered via Typosquatted Websites - K7 Labs

๐Ÿ“… March 28, 2026 ๐Ÿ“ฐ labs.k7computing.com ๐Ÿ” 0 CVE(s) referenced

A convincing typosquatted Telegram website is distributing a multi-stage malware loader that evades detection by modifying Windows Defender settings, stealthily loading payloads into memory, and maintaining persistent command-and-control communication.

Sign in to access the full report including:
detailed analysis, IOCs, MITRE ATT&CK mapping, and STIX bundle.

๐Ÿ” Sign In to Read Full Report

You'll need to accept our Terms of Service to access the platform.

๐Ÿ“Š Visual Mindmap
๐ŸŽฏ IOC Extraction
โš”๏ธ MITRE ATT&CK TTPs
๐Ÿ“ฆ STIX 2.1 Bundle