When the user clicked the LNK file, it triggered a series of commands (often using PowerShell or legitimate Windows tools like mshta.exe ) to download and execute the TinyNode or TinyPosh backdoor.
This file was used as a malicious attachment in a observed around August 2022 . The attack specifically targeted Russian organizations (such as banks and manufacturing plants) by impersonating a prominent legal firm or industrial company. Technical Details of the Attack File: heavennhell_en.zip ...
The group is known for using shortcut files to bypass traditional security filters that might block .exe attachments. If you're investigating this for a security report , When the user clicked the LNK file, it
Inside the heavennhell_en.zip archive was typically a LNK file (a Windows shortcut). Technical Details of the Attack The group is
If it has already been opened, disconnect the computer from the network immediately to prevent the spread of the infection.
The file is a specific archive associated with a ransomware campaign attributed to the threat actor group known as OldGremlin (also tracked as TinyGremlin). Context and Origin