AI WEAPONISED | OFFENSIVE AI
Active Threat10 min read

AI-Generated Slopoly Malware: Hive0163 Maintains 7-Day Dwell in Live Ransomware Attacks

89%
Year-over-year increase in AI-driven attacks per IBM X-Force 2026 Threat Index
7+ days
Slopoly dwell time before Hive0163 deployed the Interlock ransomware payload
30 sec
Slopoly C2 heartbeat interval — system telemetry transmitted to attacker infrastructure every 30 seconds
5
Distinct malware components in Hive0163's toolkit: NodeSnake, InterlockRAT, JunkFiction, Slopoly, and Interlock ransomware

IBM X-Force confirmed in March 2026 that AI-generated malware Slopoly gave Hive0163 a 7-day undetected foothold in a live Interlock ransomware attack, the first documented case of a large language model generating a functional C2 framework component deployed against a real target.

Slopoly is a PowerShell backdoor that Hive0163 used as the persistent command-and-control client in their attack chain. After ClickFix social engineering tricked a victim into running a malicious PowerShell command, Slopoly installed itself as a scheduled task named "Runtime Broker" in C:\\ProgramData\\Microsoft\\Windows\\Runtime\\ and began checking into attacker infrastructure every 50 seconds. IBM X-Force researcher Golo Mühr attributed the script to LLM authorship based on three markers: extensive inline code comments narrating each function, comprehensive and uniform error handling throughout, and accurately descriptive variable names. The script self-describes as a "Polymorphic C2 Persistence Client" despite lacking any actual polymorphic capability — the LLM named it according to design intent, not actual behavior.

The significance of Slopoly extends well beyond one ransomware incident. IBM's 2026 X-Force Threat Index, published February 25, documented an 89% year-over-year rise in AI-driven attacks. Slopoly confirms what that index predicted: threat actors with limited development capacity are using LLMs to eliminate the skill gap in malware production. The script is technically basic. It has no novel evasion technique. It stayed hidden for 7 days anyway. If your environment does not monitor Windows scheduled task creation by name and path, and does not profile PowerShell for fixed-interval C2 beaconing, this attack chain completes without a detection alert.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

How Does Slopoly Work as an AI-Generated C2 Backdoor?

Slopoly is a PowerShell C2 client that handles persistent access for Hive0163 after the initial compromise phase establishes a foothold. The backdoor deploys to C:\\ProgramData\\Microsoft\\Windows\\Runtime\\ and installs persistence through a Windows scheduled task named "Runtime Broker," chosen to blend with the legitimate Windows process of the same name, which runs from System32.

Once active, Slopoly runs two concurrent loops. A heartbeat loop transmits system telemetry to the attacker-controlled C2 server every 30 seconds, maintaining an active session indicator. A command polling loop requests operator instructions from the same server every 50 seconds and executes received commands via cmd.exe, relaying results back. The framework operates as the client side of a larger C2 platform that Hive0163 controls separately.

IBM X-Force researcher Golo Mühr identified four LLM authorship markers. First, every code block contains extensive inline comments describing its purpose in natural language, consistent with LLMs that narrate their output. Second, error handling is comprehensive and structurally uniform throughout the script, unlike human-written code where error handling is often selective. Third, all variables are accurately named to describe their contents. Fourth, the script self-describes in its own header as a "Polymorphic C2 Persistence Client" even though it cannot modify its own code during execution — the LLM named it after its intended design goal rather than what it actually produced.

IBM also identified two related AI-generated families in the same reporting period: **VoidLink** and **PromptSpy**, suggesting LLM-assisted malware development is spreading across multiple threat actor groups beyond Hive0163.

Hive0163's Kill Chain: ClickFix Phishing to Interlock Ransomware in Five Stages

**Hive0163** is a financially motivated ransomware group tracked by IBM X-Force, responsible for deploying **Interlock ransomware**, a double-extortion platform targeting Windows and Linux systems across healthcare, technology, manufacturing, and financial services. The group operates a five-stage attack chain with Slopoly inserted as a persistent access layer before ransomware detonation.

**Stage 1 — ClickFix Initial Access:** Hive0163 delivers initial access via ClickFix, a social engineering technique where a malicious webpage displays a fake CAPTCHA or system alert instructing the user to paste a PowerShell command into their terminal. The group amplifies ClickFix reach through two initial access brokers: TA569, known as SocGholish, which embeds lures in compromised news sites; and TAG-124, known as KongTuke or LandUpdate808, which delivers fake browser update overlays. For additional context on how ClickFix operates at enterprise scale, see the [Booking.com Storm-1865 ClickFix campaign breakdown](/blog/booking-com-storm-1865-clickfix-reservation-breach).

**Stage 2 — NodeSnake Loader:** The ClickFix command drops **NodeSnake**, a first-stage loader that downloads and executes shell commands and establishes initial persistence on the compromised host.

**Stage 3 — InterlockRAT Framework:** NodeSnake retrieves **InterlockRAT**, a multi-platform remote access framework written in PowerShell, PHP, C/C++, Java, and JavaScript providing SOCKS5 proxying, reverse shell spawning, and secondary payload delivery on both Windows and Linux.

**Stage 4 — Slopoly Persistent Access:** With elevated access established, Hive0163 deploys Slopoly for long-duration covert persistence. The AI-generated backdoor maintained undetected access for over 7 days while operators conducted reconnaissance and staged exfiltration tools.

**Stage 5 — Exfiltration and Ransomware:** AzCopy transfers victim data to attacker-controlled Azure storage. Advanced IP Scanner maps encryption targets. Interlock ransomware encrypts files and appends the .interlock extension. Victims face dual pressure: pay to decrypt, or pay to suppress the data leak.

1

ClickFix Initial Access via TA569 and TAG-124

Hive0163 delivers fake CAPTCHA or system alert pages through initial access brokers SocGholish and KongTuke, tricking victims into pasting and executing a malicious PowerShell command that drops the NodeSnake loader.

2

NodeSnake to InterlockRAT Escalation

NodeSnake establishes initial persistence and retrieves InterlockRAT, the multi-platform remote access framework providing SOCKS5 proxy tunneling, reverse shell capabilities, and payload delivery on Windows and Linux.

3

Slopoly Persistence, AzCopy Exfiltration, and Interlock Ransomware

Hive0163 deploys the AI-generated Slopoly C2 backdoor for 7-day covert access, then uses AzCopy to bulk-exfiltrate data before detonating Interlock ransomware in a double-extortion close.

How IBM X-Force Confirmed Slopoly Was Written by an LLM

Attributing malware to LLM authorship is a new discipline in threat intelligence. IBM X-Force's Slopoly analysis established four structural markers that security teams can apply when reviewing suspicious scripts recovered during incident response.

The most reliable marker is inline commenting density. Human developers write inline comments selectively, typically for complex logic or regulatory requirements. LLMs narrate everything. Slopoly contains comments on every function block, including trivial ones, in a consistent natural-language style that mirrors how LLM-generated code explainers read.

The second marker is uniform error handling. Human code tends to have inconsistent error handling: thorough where the developer anticipated problems, absent where they did not. Slopoly has comprehensive try-catch blocks throughout, structured identically, because the LLM applied error handling as a pattern rather than a judgment call.

The third marker is variable naming precision. LLMs produce accurately named variables because they generate names to reflect each variable's purpose clearly. Human developers often abbreviate, use legacy conventions, or introduce naming inconsistencies across a codebase. Slopoly's variables read like documentation.

The fourth marker is the self-description mismatch. Slopoly names itself a "Polymorphic C2 Persistence Client" in its own header. It is not polymorphic. IBM concludes the LLM named it based on design intent expressed in the prompt, not on the code it actually produced. This gap between stated capability and actual behavior appears in other AI-generated families including VoidLink and PromptSpy, tracked by IBM in the same period.

These four markers are now applicable to any suspicious PowerShell or scripting-language artifact recovered during incident response, not just Slopoly.

AI-generated malware does not pose a new or sophisticated threat from a technical standpoint, but it disproportionately enables threat actors by reducing development and execution time.

IBM X-Force, Slopoly Threat Intelligence Report, March 12, 2026

Why AI-Generated Malware Like Slopoly Is a Strategic Threat to Your Organization

The Slopoly discovery matters for one specific reason: the malware is basic, and it worked anyway.

Hive0163 did not need a skilled developer to produce a custom C2 backdoor. They needed an LLM prompt and the willingness to bypass safety guardrails. The resulting script is technically basic. It lacks genuine polymorphism despite naming itself a "Polymorphic C2 Persistence Client." A competent analyst can identify it as AI-generated in minutes. It stayed hidden for over 7 days in a real enterprise environment regardless. The threat is not the malware's quality. The threat is the time compression and skill democratization that LLMs deliver to attackers with limited coding capability.

IBM's 2026 X-Force Threat Index quantified this trajectory: AI-driven attacks rose 89% year-over-year. The index notes that AI primarily eliminates the skill gap rather than raising the sophistication ceiling. Groups that previously could not build custom tooling can now iterate on C2 frameworks, loaders, and credential stealers within hours.

Slopoly connects to a wider documented pattern. APT28 deployed **PROMPTSTEAL**, a data-mining tool that queries the Hugging Face API in live operations to generate reconnaissance commands against Ukrainian targets. Financially motivated groups are adopting AI-generated loaders alongside established crimeware. For additional context on AI-assisted malware used by state-sponsored actors, see the [HonestCue AI malware and Gemini APT campaign analysis](/blog/honestcue-ai-malware-gemini-apt-live-operations).

The practical implication: your organization's threat model can no longer treat custom malware development as a signal of an advanced, well-resourced threat actor. Slopoly shows that a financially motivated group of limited capability can produce targeted, functional tooling on demand.

MITRE ATT&CK Mapping for Hive0163's Slopoly Ransomware Campaign

The Hive0163 Slopoly campaign maps to six documented MITRE ATT&CK Enterprise techniques. Security teams should build detection rules around these IDs in their SIEM and EDR platforms.

**T1566 — Phishing (Initial Access):** ClickFix lures are phishing through social engineering. Users are directed to pages impersonating legitimate services and instructed to run attacker-supplied PowerShell commands. Block ClickFix by enforcing PowerShell script block logging (Event ID 4104) and training users that no legitimate service requires copy-pasting a command from a webpage.

**T1059.001 — PowerShell (Execution):** The ClickFix payload, NodeSnake, and Slopoly all execute as PowerShell scripts. Alert on PowerShell execution originating from browser processes, user-interactive sessions, and scheduled tasks created by non-administrative accounts.

**T1053.005 — Scheduled Task/Job: Scheduled Task (Persistence):** Slopoly installs via schtasks.exe as a task named "Runtime Broker." The legitimate Windows Runtime Broker executes from C:\\Windows\\System32\\RuntimeBroker.exe only. Any scheduled task with this name executing from ProgramData or AppData is a confirmed indicator of compromise.

**T1071.001 — Application Layer Protocol: Web Protocols (C2):** Slopoly communicates over HTTP/S with fixed 30-second and 50-second timing intervals. Detect by profiling endpoints for periodic outbound connections at these exact intervals to non-categorized external hosts.

**T1105 — Ingress Tool Transfer (Payload Staging):** InterlockRAT and subsequent payloads including Slopoly are retrieved via the established C2 channel using the ingress transfer capability built into NodeSnake and InterlockRAT.

**T1048 — Exfiltration Over Alternative Protocol:** Hive0163 uses AzCopy to move victim data to attacker-controlled Azure blob storage before ransomware detonation. Alert on AzCopy.exe execution from standard user or service accounts and on transfers to unfamiliar Azure storage endpoints.

Indicators of Compromise
ArtifactTypeSHA-256 (Truncated)
C:\ProgramData\Microsoft\Windows\Runtime\File System PathMalicious Slopoly deployment path; legitimate Runtime Broker never executes from ProgramData — any script here is an IOC
Runtime Broker (Scheduled Task from non-System32 path)Scheduled Task NameAny Windows scheduled task named Runtime Broker executing outside System32 is malicious; IBM did not publish a file hash for Slopoly
AzCopy.exe (standard or service account execution)Exfiltration Tool MisuseHive0163 uses AzCopy for bulk pre-ransomware data exfiltration to Azure blob storage; alert on any AzCopy use outside IT-sanctioned migration tasks

Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.

Slopoly IOCs and Defenses: How to Hunt AI-Generated Malware in Your Environment Right Now

Detecting Slopoly requires behavioral controls rather than signature-based scanning. IBM confirmed the script evaded antivirus for over 7 days in the observed incident. The kill chain is catchable at multiple stages if the following detections are in place.

For the broader AI-generated malware threat, apply IBM's four LLM authorship markers when reviewing suspicious scripts during incident response: dense inline commenting, uniform error handling, accurate variable naming, and a mismatch between the script's stated purpose and its actual capability.

Hunt for Slopoly's scheduled task persistence indicator

Query your EDR for any scheduled task named 'Runtime Broker' executing from C:\ProgramData\ or AppData paths. The legitimate Windows Runtime Broker runs exclusively from System32. Any match outside System32 is a confirmed indicator of compromise requiring immediate investigation.

Alert on fixed-interval PowerShell C2 beaconing

Configure your SIEM to detect PowerShell processes generating outbound HTTP/S connections at 30-second or 50-second fixed intervals to non-categorized external hosts. Slopoly's timing is consistent and predictable, making it detectable by any network-aware EDR with connection profiling.

Block or alert on AzCopy execution by non-IT accounts

Alert when AzCopy.exe runs under standard user or service accounts outside sanctioned IT migration tasks. Hive0163 uses AzCopy to exfiltrate data to Azure blob storage before deploying ransomware — catching this pre-ransomware exfiltration breaks the double-extortion leverage.

Enable PowerShell Script Block Logging (Event ID 4104)

Script block logging captures the full content of every executing PowerShell script, including deobfuscated payloads. This is the primary detection mechanism for ClickFix-delivered malware and is disabled by default on most Windows systems. Enable it via Group Policy under Computer Configuration, Administrative Templates, Windows Components, Windows PowerShell.

Train users to reject ClickFix lures

Brief all employees that no legitimate service, IT team, CAPTCHA, or browser prompt will ever require them to open a terminal and paste a command from a webpage. ClickFix is the entry point for the entire Hive0163 kill chain and is only effective against uninformed users.

Run CISA Interlock advisory IOCs against your SIEM

CISA's StopRansomware advisory AA25-203A for Interlock contains the full IOC list and detection signatures applicable to the Hive0163 kill chain. Run these against your SIEM and EDR including historical data from the past 30 days to identify any prior exposure.

The bottom line

AI-generated malware Slopoly confirms that Hive0163 weaponized a large language model to build a functional ransomware C2 framework with no specialized development skill required. The script maintained covert access for over 7 days before Interlock ransomware deployed and AzCopy exfiltrated the victim's data. IBM's 2026 X-Force Threat Index documents an 89% year-over-year rise in AI-driven attacks, and Slopoly is the clearest proof point yet of what that escalation looks like in a live operation. Hunt your scheduled tasks for 'Runtime Broker' executing from ProgramData right now. Run CISA AA25-203A IOCs through your SIEM before end of day today.

Frequently asked questions

What is Slopoly malware?

Slopoly is a PowerShell command-and-control backdoor identified by IBM X-Force as likely generated by a large language model. Deployed by Hive0163 during a live Interlock ransomware attack in early 2026, Slopoly acts as a persistent C2 client: it checks into attacker infrastructure every 50 seconds, transmits system information every 30 seconds, and executes commands via cmd.exe. IBM identified it as AI-generated based on extensive inline comments, comprehensive error handling, and accurately named variables, all hallmarks of LLM-produced code.

What is Hive0163?

Hive0163 is a financially motivated ransomware threat actor tracked by IBM X-Force, responsible for deploying Interlock ransomware in double-extortion campaigns. The group uses ClickFix social engineering for initial access, partnering with initial access brokers TA569 (SocGholish) and TAG-124 (KongTuke). Their malware toolkit includes NodeSnake, InterlockRAT, JunkFiction loader, and now Slopoly, the AI-generated C2 backdoor first observed in active use during early 2026.

How does AI-generated malware work?

AI-generated malware is code written by a large language model rather than a human developer. A threat actor prompts an LLM with a malicious intent, bypassing safety guardrails, and the model produces functional code. In the Slopoly case, the result was a PowerShell script with comprehensive commenting, uniform error handling, and accurately named variables. IBM X-Force notes that while AI-generated malware is technically basic, it reduces development time to near zero and removes the skill barrier for threat actors who lack coding expertise.

How does ClickFix social engineering work?

ClickFix is a social engineering technique in which attackers present victims with a fake CAPTCHA, error message, or verification prompt on a malicious webpage. The page instructs the user to copy a displayed command and paste it into their terminal to resolve a fictitious problem. Executing the pasted command triggers malware deployment. Hive0163 uses ClickFix as the initial access stage to deliver NodeSnake before the full Interlock attack chain begins. Training users to treat any instruction to run a pasted command from a webpage as a red flag is the most direct defense.

Is there a patch for AI-generated malware like Slopoly?

There is no patch because Slopoly is not a software vulnerability. The defense is behavioral: block ClickFix initial access by enforcing script block logging and educating users not to execute pasted PowerShell commands. Monitor for scheduled tasks named Runtime Broker deployed from non-System32 paths. Watch for outbound HTTP beaconing at fixed 30-second or 50-second intervals. Alert on AzCopy usage by standard accounts. CISA's StopRansomware advisory AA25-203A for Interlock provides additional detection guidance applicable to the full Hive0163 kill chain.

How do I detect Slopoly in my environment?

Check for a Windows scheduled task named Runtime Broker executing from C:\ProgramData\Microsoft\Windows\Runtime\ as the legitimate Windows Runtime Broker runs from System32, never from ProgramData. Look for PowerShell processes generating periodic HTTP outbound connections at 30-second or 50-second fixed intervals to unknown hosts. Alert on AzCopy execution from non-IT accounts, which Hive0163 uses for bulk exfiltration before deploying ransomware. IBM X-Force maps this activity to MITRE T1053.005, T1071.001, and T1105.

Can AI-generated malware bypass antivirus detection?

AI-generated malware like Slopoly can evade signature-based antivirus because each LLM-generated script produces structurally different code, making static hash matching unreliable. IBM confirmed Slopoly evaded detection for over 7 days in the observed Hive0163 incident. Behavioral detection is more effective: focus on execution chain anomalies such as PowerShell running schtasks.exe, unexpected C2 beaconing at fixed intervals, and AzCopy exfiltration from user accounts. Endpoint detection and response platforms with behavioral analytics are better positioned to catch AI-generated malware than signature-based scanners.

Which sectors does Interlock ransomware target?

Interlock ransomware, deployed by Hive0163, targets organizations across multiple sectors with no single industry focus, consistent with financially motivated opportunistic targeting. Confirmed 2025 and 2026 victims span healthcare, technology, manufacturing, and financial services. The group uses double extortion: data is exfiltrated via AzCopy before encryption, giving attackers two levers for ransom pressure. CISA's StopRansomware advisory AA25-203A covers Interlock's full targeting history and indicators of compromise.

Sources & references

  1. IBM X-Force — A Slopoly Start to AI-Enhanced Ransomware Attacks
  2. The Hacker News — Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
  3. CISA — StopRansomware: Interlock (AA25-203A)
  4. IBM Newsroom — 2026 X-Force Threat Index: AI-Driven Attacks Are Escalating
  5. Security Affairs — AI-Assisted Slopoly Malware Powers Hive0163 Ransomware Campaigns
  6. MITRE ATT&CK — Technique Library

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.