Alerts & Notice|Last Updated16/01/2026

Security Alert: IranGuard Spyware Campaign

Publish Date: Friday, 16 January 2026, 2:45 PM UTC

A spear-phishing campaign is distributing surveillance malware named "IranGuard" targeting Iranian individuals and organizations. The malware is delivered via spear-phishing emails impersonating the "Etelaat Faraja" (فرماندهی اطلاعات فراجا - FARAJA Intelligence Command), an Iranian law enforcement intelligence agency. The campaign distributes both Android (APK) and Windows (EXE) variants of the spyware, providing comprehensive surveillance capabilities across both mobile and desktop platforms.


Malware Analysis

Android Variant (Iranguard.apk)

Detection Rate: 22/67 antivirus engines

Classification:

  • Kaspersky: HEUR:Trojan-Spy.AndroidOS.Agent.abd
  • ESET: Android/Spy.Agent.APU trojan
  • DrWeb: Android.Backdoor.739.origin
  • Avast/AVG: Android:Caspy-C [Spy]

Package Information:

  • Package Name: com.example.dat.a8andoserverx
  • Main Activity: com.example.dat.a8andoserverx.MainActivity
  • Min SDK: 14 (Android 4.0)
  • Target SDK: 22 (Android 5.1)

Certificate Information:

  • CN: Ahmed
  • Location: Gaza, Palestine
  • Valid From: June 11, 2018
  • Thumbprint: d8627113ff814745774947709c730c678832c43a

Dangerous Permissions Requested:

PermissionRisk
READ_SMS / WRITE_SMSSMS interception and manipulation
SEND_SMSSend SMS without user knowledge
ACCESS_FINE_LOCATIONGPS tracking
ACCESS_COARSE_LOCATIONNetwork-based location tracking
RECORD_AUDIOAudio/call recording
CAMERAPhoto/video capture
READ_CONTACTSContact exfiltration
READ_CALL_LOGCall history theft
PROCESS_OUTGOING_CALLSCall interception
READ_PHONE_STATEDevice information collection
WRITE_EXTERNAL_STORAGEFile system access

Malicious Behaviors (MITRE ATT&CK):

Technique IDDescription
T1430Location tracking (GPS)
T1429Audio capture / microphone access
T1418Application enumeration
T1409Access stored account data (Gmail, WhatsApp)
T1571Non-standard port communication
T1573Encrypted channel (HTTPS)

Key Capabilities:

  • SMS interception and exfiltration (content://sms/inbox)
  • Contact theft (ContactsContract)
  • Incoming/outgoing call monitoring
  • Audio recording via MediaRecorder
  • GPS location tracking
  • Auto-start on boot (BOOT_COMPLETED)
  • Hides app icon from launcher (stealth mode)
  • Requests root access (su command)

Windows Variant (Iranguard.exe)

Detection Rate: Multiple engines detect as malicious trojan

Classification:

  • YARA Rule: AutoIT_Compiled - Compiled AutoIT script
  • Sigma Rule: High severity - "New RUN Key Pointing to Suspicious Folder"
  • Threat label: trojan.valyria

File Properties:

  • File Type: PE32 executable (GUI) Intel 80386
  • Compiler: AutoIt v3
  • Size: 1,367,955 bytes
  • PE Timestamp: 2012-01-29

Persistence Mechanism:

Registry Key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\UQJWJJ
Value: "C:\Users\[USER]\AppData\Roaming\Windata\Iranguard.exe"

Malicious Behaviors (MITRE ATT&CK):

Technique IDDescription
T1056.001Keylogging via polling
T1113Screenshot capture
T1115Clipboard data theft
T1105Download and execute files
T1497.002Sandbox evasion (mouse movement check)
T1547.001Registry Run key persistence
T1564.003Hidden window execution
T1134Access token manipulation
T1012Registry enumeration
T1082System information discovery
T1057Process enumeration
T1529System shutdown capability

Key Capabilities:

  • Keylogger - Records all keystrokes
  • Screenshot capture - Takes desktop screenshots
  • Clipboard monitoring - Steals copied data
  • File download/execution - RAT functionality
  • FTP communication - Data exfiltration
  • Process enumeration - System reconnaissance
  • Anti-analysis - Checks for mouse movement to detect sandboxes
  • Persistence - Registry autorun modification

Phishing Email Analysis

The phishing email impersonates "Etelaat Faraja" (فرماندهی اطلاعات فراجا), which translates to "FARAJA Intelligence Command" - a reference to Iranian law enforcement intelligence. The email was sent to a massive distribution list including:

Email Content (Translated):

Subject: Important Directive from FARAJA Intelligence Command

The Islamic Republic of Iran Intelligence Organization Command has issued an emergency directive requiring the use of the IranGuard application for:

  • Work communications
  • Necessary coordination

Features of IranGuard:

  • Available for Android (smartphones) and Windows (computers)
  • Functions as a secure communication option during severe internet restrictions

Emergency Status: Download links provided

  • Windows: hxxp[:]//up44[.]ir/yhloi2vr
  • Android: hxxp[:]//up44[.]ir/saia4vhc

The email uses urgency and authority impersonation to trick victims into installing the spyware.


Attribution Indicators

While definitive attribution requires further investigation, several indicators suggest potential state-sponsored origin:

  1. Target Selection: Iranian civil society, universities, government workers, human rights organizations
  2. Impersonation: Uses legitimate Iranian government agency branding (FARAJA)
  3. Language: Native Persian content with government-style formatting
  4. Infrastructure: Uses portmap.io tunneling service to obscure C2 infrastructure
  5. Certificate: Signed with name "Ahmed" from "Gaza, Palestine" - likely false flag

Indicators of Compromise (IOCs)

File Hashes

FileSHA256
Iranguard.apk8ea1dde61f3357a5068a4ff4b3619eee9853c8acea0609bc39c6db243681382e
Iranguard.exe3f303fad86ad441089a7b0406d08252d97a5ec5742d900191b09198301de3ca1

Network Indicators

TypeValueDescription
Domainbermoda-38337[.]portmap[.]hostC2 Server (using portmap.io tunneling)
IP Address193[.]161.193.99Resolved C2 IP
Port38337/TCPC2 Communication Port
Distribution URLhxxp[:]//up44[.]ir/yhloi2vrWindows malware download
Distribution URLhxxp[:]//up44[.]ir/saia4vhcAndroid malware download

Email Indicators

FieldValue
Sender (spoofed)etelaat.faraja@gmail[.]com
Subject (Persian)بخشنامه مهم از طرف فرماندهی اطلاعات فراجا
Subject (English)"Important Directive from FARAJA Intelligence Command"