APT36 Phishing Campaign Aims at Indian Defense with Credential-Stealing Malware

0
APT36 Phishing Campaign Targets Indian Defense with Credential-Stealing Malware

Executive Summary

The cyber espionage outfit APT36, also called Transparent Tribe, is based in Pakistan and has been using extremely complex phishing tactics to target Indian defense officials.  The gang spreads phishing emails with infected PDF files that are painstakingly created to look like genuine government documents, according to News4Hackers’s findings.

Upon opening one of these PDFs, the receiver is presented with a blurred background and a button that mimics the National Informatics Center (NIC) login page.  When a user clicks this button, a malicious executable file masquerading as a legal application is downloaded into a ZIP archive, and they are redirected to a fake URL.

APT36’s continued focus on credential theft and its strategic goal of creating long-term penetration within Indian defense networks are highlighted by this campaign.  In order to counteract such focused cyberthreats, the operation emphasizes the critical necessity for strong email security measures, extensive user awareness campaigns, and proactive threat detection and monitoring systems.

Introduction

Nation-state actors are constantly changing their strategies to carry out targeted espionage in the increasingly complicated cyber threat scenario of today.  One such threat actor is the Pakistani cyber-espionage organization “APT36” (also known as Transparent Tribe), which has drawn fresh attention for its intricate schemes to compromise India’s defense infrastructure.

With the intention of credential-harvesting for long-term access to sensitive networks, the gang disseminates malicious PDFs that imitate legitimate papers and direct visitors to fictitious NIC login sites, where they download disguised malware.  This emphasizes how urgently user awareness training, robust email security, and ongoing threat monitoring are needed.

Target Technologies Windows Operating System
Threat Type Phishing Campaign
Written In C/C++
File Types PE (Portable Executable)
Key Malware Identifiers PO-003443125.pdf, PO-003443125.pdf.7z
Observed First  2025-05-07
Impact Credential Harvesting, Data Exfiltration
MD5 Hashes PO-003443125.pdf “6ee3b0f4cb84e18751e7088043741e9a”

PO-003443125.pdf.7z“cdb9fb87dcb44d8f3040f4fb87d89508”

PO-003443125.pdf.exe “154f4cdcd4b822314293ad566d7255fa”

Phishing Campaign Analysis

The group’s campaign involves sending out phishing emails with the PDF file “PO-003443125.pdf” included.

Image Shows Phishing Campaign Analysis

A PDF icon, the file name “PO-003443125.pdf,” a blurred backdrop (a purposeful technique used to give the appearance of authenticity), and the words “This is a protected document” are displayed when the document is opened.  To view the material, click the button below.  A button that reads “Click to View Document” is prominently placed to entice the recipient to interact.

Image Shows Phishing Campaign Analysis

 

When the user interacts with the malicious URL “hXXps://superprimeservices[.]com/nishat/order/PO-003443125.pdf.7z,” an archive named “PO-003443125.pdf.7z” is downloaded.

Image Shows Phishing Campaign Analysis

A malicious executable file called “PO-003443125.pdf.exe” is included in the archive; it poses as a valid PDF icon.  This file is designed to deceive users and, if run, can allow unwanted access to the target system, compromising it.

Image Shos Phishing Campaign Analysis

Due to its recent construction and possible short-term malevolent use, the domain in question was registered on October 23, 2024, and it expires on October 23, 2025. It resolves to the IP address 104[.]21[.]0[.]118, which is presently shared with over 655 other domains and is hosted by Cloudflare Inc. in São Paulo, Brazil.

Image Shows Phishing Campaign Analysis

Technical Analysis of “PO-003443125.pdf.exe”

Malware Functionalities

Further research reveals that a freeware programming language was used to create the executable file.

Anti-debugging and anti-reversing:

As an anti-analysis method, the Windows API function “IsDebuggerPresent” is frequently used to ascertain whether the program is running under a debugging environment like x64dbg, WinDbg, or OllyDbg.  If the malware is found, it stops the process after displaying a warning that reads, “This is a third-party compiled script.”

Image Shows Phishing Campaign Analysis

Anti-VM

In order to determine whether it is operating in a 32-bit process on a 64-bit system—a typical indication of a virtualized or analytic environment—the malware makes use of IsWow64Process.

In order to avoid analysis, WOW64 sets a flag and stops execution if it is found.

This pattern suggests the adoption of anti-VM and anti-sandbox strategies to evade detection.

Image Shows Phishing Campaign Analysis

 

Loading Malicious Script from Resources:

FindResourceExW finds a resource in its own module with the name “SCRIPT” and type 0x0A.  The resource’s size and data are then obtained by loading and locking it, and they are then written into a stream that was formed using CreateStreamOnHGlobal.

In order to run or interpret the embedded script and enable fileless or in-memory execution, it lastly calls method calls (probably COM or ActiveScript interfaces).

Image Shows Phishing Campaign Analysis

 

Process Creation and Execution:

Using the command line supplied in arg1, the malware creates STARTUPINFO and PROCESS_INFORMATION structures and then uses CreateProcessW to spawn a new process, setting flags for normal priority and a default environment to indicate a covert launch.  If it is successful, the process handle is closed, signaling that commands or payloads are being executed.

Image Shows Phishing Campaign Analysis

Execution:

The secondary stages of an attack are initiated by ShellExecuteW.

Image Shows Phishing Campaign Analysis

The malware can interact with user sessions, inject code, avoid detection, and remain persistent in targeted environments by using the OpenWindowStationW, GetProcessWindowStation, SetProcessWindowStation, and OpenDesktopW functions to access and manipulate window stations and desktops.

Image Show Execution

Defense Evasion:

The Sleep function momentarily halts operation.  It is used by the malware to postpone actions, elude discovery, and evade analysis.

Image Shows Phishing Campaign Analysis

GetCurrentProcess and TerminateProcess are used by the malware for code injection, privilege escalation, process control, and anti-analysis.

Image Show Phishing Campaign Analysis

 

By loading unauthorized libraries through legitimate apps, attackers can use DLL side-loading to execute malicious code. The LoadLibraryExW function loads a DLL into a process address space.

Image Show Phishing Campaign Analysis

The malware supports persistence, configuration, and evasion strategies by modifying and accessing system environment variables with SetEnvironmentVariableA and GetEnvironmentVariableW.

Image Shows Phishing Campaign Analysis

Persistence:

Process startup parameters are obtained using the GetStartupInfo function.  It is used by the malware to improve stealth and modify execution.

Phishing Campaign Analysis

Data Discovery:

Attackers utilize GetDriveTypeW to determine which network or detachable drives to target.

Data Discovery:

The directory’s files are searched for data exfiltration using FindNextFileExW.

Data Discovery:

The file enumeration initiated by FindFirstFileExW is continued by FileNextFilew.

Data Discovery:

The handle is released from FindFirstFileExW using FileClose.

Data Discovery:

Credential Access:

The current window is identified using the GetForegroundWindow function, which is frequently used to record user activities.

Data Discovery:

Keystrokes are tracked and recorded in real time using the GetAsyncKeyState and GetKeyState methods.  By using these APIs to identify user input, the malware makes it easier to keylog users and steal private information like login passwords and private messages.

Data Discovery:

 

To access clipboard contents and steal private data, including cryptocurrency wallet addresses or copied passwords, utilize OpenClipboard, IsClipboardFormatAvailable, and GetClipboardData.

Data Discovery:

 

The application embeds an “edit” control as its child and generates a hidden window with a specified class name. Standard window manipulation functions (e.g., ShowWindow with the SW_HIDE flag) are used to hide both the parent and child windows. By imitating the operations of genuine apps, this setup enables the script to surreptitiously mimic user interactions and maybe avoid detection by automation or simple keylogger systems.

Command and Control:

Command and Control:

Malware establishes, controls, and ends network communications by using the socket, connect, bind, listen, send, and closesocket capabilities.  These features make remote access, data exfiltration, and command-and-control (C2) interactions easier.

Command and Control:

 

Malware Behaviors

Anti-Analysis Behavior:  By posing as a genuine PDF document, the executable PO-003443125[.]pdf[.]exe engages in anti-analysis behavior.  The purpose of this purposefully deceptive naming scheme is to deceive users and avoid accidental detection by analysts or entry-level security programs that might not show whole file extensions.  Furthermore, starting a Windows process (svchost.exe) that seems authentic as a child may be an attempt to blend in with regular system operations and evade detection during automatic monitoring or manual inspection.

Process Activity:  PO-003443125[.]pdf[.]exe is a parent process that launches svchost.exe as a child, according to the process tree. This is unusual since the Windows operating system, not user-launched apps, normally launches svchost.exe. When a parent process uses up all of a CPU core, it could be a sign of resource-intensive malicious activity like network beaconing, crypto mining, or keylogging. This erratic pattern of activity is a reliable predictor of possible malware execution.

Obfuscation:  The file appears harmless by using the traditional obfuscation approach of a double extension (.pdf.exe).  This method makes use of a common Windows user setting that conceals recognized file extensions, making the file appear to be a harmless PDF.  This method is commonly used to increase the likelihood of successful execution by avoiding user scrutiny and basic file-type filters.

Malware Behaviors

 

Credential and Data Theft:  The malware targets saved credentials, form inputs, email client credentials, system clipboard contents, and browser data cookies. It uses clipboard monitoring, keylogging through API hooks, and form-grabbing tactics to steal confidential information before it is hidden or encrypted by trustworthy apps.

Network Communication:  DNS queries to several malicious and low-reputation domains are seen, many of which use dubious TLDs like.xyz,.buzz,.ru, and.sbs.

Malware Behaviors

 

With infrastructure housed on well-known CDN providers (like Cloudflare and AWS), encrypted HTTP(S) connection with C2 servers is discovered. This is probably done for delivery reliability and camouflage.

Malware Behaviors

MITRE ATT&CK Framework

The widely recognized MITRE ATT&CK Framework is mentioned in the following table:

MITRE MAPPING
Tactic ID Technique Name
Initial Access T1566 Phishing
T1566.001 Spear phishing Attachment
Execution T1203 Exploitation for Client Execution
T1059 Command and Scripting Interpreter
Persistence 1542 Pre-OS Boot
T1542.003 Bootkit
T1574 Hijack Execution Flow
T1574.002 DLL Side-Loading
T1112 Modify Registry
T1547 Boot or Logon AutoStart Execution
T1547.009 Shortcut Modification
Privilege Escalation T1055 Process Injection
T1574 Hijack Execution Flow
T1574.002 DLL Side-Loading
T1134 Access Token Manipulation
T1134.001 Token Impersonation/ Theft
T1547 Boot or Logon AutoStart Execution
T1547.009 Shortcut Modification
Defense Evasion T1014 Rootkit
T1036 Masquerading
T1055 Process Injection
T1542 Pre-OS Boot
T1542.003 Bootkit
T1564 Hide Artifacts
T1564.001 Hidden Files and Directories
T1564.003 Hidden Window
T1497 Virtualization/Sandbox Evasion
T1562 Impair Defenses
T1562.001 Disable or Modify Tools
T1027 Obfuscated Files of Information
T1027.002 Software Packing
T1112 Modify Registry
T1134 Access Token Manipulation
T1134.001 Token Impersonation/ Theft
T1222 Files and Directory Permission Modification
T1497.002 User Activity Based Checks
T1574 Hijack Execution Flow
T1574.002 DLL Side-Loading
Credential Access T1003 OS Credential Dumping
T1056 Input Capture
T1056.001 Keylogging
Discovery T1012 Query Registry
T1057 Process Discovery
T1083 Files and Directory Discovery
T1010 Application Window Discovery
T1082 System Information Discovery
T1497 Virtualization/Sandbox Evasion
T1518 Software Discovery
T1518.001 Security Software Discovery
T1016 System Network Configuration Discovery
T1018 Remote System Discovery
T1614 System Location Discovery
T1033 System Owner/User Discovery
T1087 Account Discovery
T1497.002 User Activity Based Checks
T1614.001 System Language Discovery
Collection T1005 Data from Local System
T1114 Email Collection
T1057 Input Capture
T1056.001 Keylogging
T1113 Screen Capture
T1115 Clipboard Data
T1185 Browser Session Hijacking
Command and control T1071 Application Layer Protocol
T1095 Non-Application Layer Protocol
T1573 Encrypted Channel
T1105 Ingress Tool Transfer
Impact T1485 Data Destruction
T1496 Resource Hijacking
T1529 System Shutdown/Reboot

Conclusion

APT36, which targets Indian defense infrastructure in particular, is a serious and persistent cyberthreat to national security.  The group’s employment of sophisticated phishing techniques and credential theft is a prime example of how sophisticated current cyber espionage has become.  Implementing a thorough, multi-layered cybersecurity system that includes strong email security safeguards, ongoing user education, and alert threat detection and response capabilities is necessary to meet this problem.

Recommendations

Based on a thorough examination of the APT36 campaign, which used phishing emails and malware masquerades to target Indian defense professionals, News4Hackers suggests the following mitigation techniques and recommendations that are especially suited for the Indian defense industry:

Enhance Email Security Infrastructure

  • Deploy Government-Grade Email Security Solutions: For government communication platforms (such as NIC mail), use enhanced risk protection, which checks PDF, 7Z, and exe files for embedded malware.
  • Strict Attachment Handling Policies: Emails with questionable file formats (such as.pdf.7z or.exe files with fake icons) should be blocked or quarantined.
  • Implement Email Authentication Protocols: Enforce DKIM, SPF, and DMARC on official defense email domains to stop APT36 from impersonating and spoofing them.

User Awareness and Training

  • Mandatory Cyber Hygiene Training: All military and civilian staff should receive frequent, required training on how to spot phishing attacks, particularly those that imitate official NIC documents.
  • Simulated Phishing Exercises: Using formats and methods similar to those employed by APT36, conduct red team exercises with phishing simulations on a regular basis (e.g., fake protected PDFs).
  • Clear Reporting Protocols: Provide simple avenues for reporting alleged phishing emails and anomalous activity.

Network and Endpoint Security

  • Endpoint Detection and Response (EDR): Deploy EDR solutions on all defense endpoints to detect and respond to file-based threats such as:
    • PO-003443125.pdf – MD5: 6ee3b0f4cb84e18751e7088043741e9a
    • PO-003443125.pdf.7z – MD5: cdb9fb87dcb44d8f3040f4fb87d89508
    • PO-003443125.pdf.exe – MD5: 154f4cdcd4b822314293ad566d7255fa
  • Block Malicious Domains and URL: hXXps://superprimeservices[.]com/nishat/order/PO-003443125[.]df[.]7z

Access Control and Authentication

  • Mandate Multi-Factor Authentication (MFA): Reduce the usefulness of stolen credentials by requiring MFA for all access to NIC systems and sensitive defensive networks.
  • Regular Password Rotation and Audits: To identify misuse, establish stringent password regulations, and conduct regular credential audits.

Infrastructure and Threat Intelligence Monitoring

  • Monitor Cloudflare-Hosted Traffic: Keep an eye out for connections to recently registered Cloudflare-hosted domains in defense-related network logs—APT36 regularly employs this provider to conceal infrastructure.
  • Integrate Threat Feeds: To prevent signs of compromise (IOCs), sign up for real-time intelligence on APT36 and other regional threats.

Incident Response Preparedness

  • Establish Sector-Specific IR Teams: Create defense units with specialized cyber incident response teams that have received training on APT36 TTPs.
  • Run Tabletop and Live Drills: Test defense units’ preparedness for phishing attacks and post-compromise actions such as lateral movement or credential harvesting on a regular basis.

To efficiently identify new TTPs, improve situational awareness, and provide prompt threat mitigation pertinent to your sector and area, stay up to speed with News4Hackers’s threat intelligence sharing platform.

Utilize News4Hackers’s Indicators of Compromise (IOCs) and YARA rules to improve the identification of malicious files and activity through behavioral analysis and file integrity monitoring. Update them on your SIEM platform on a regular basis.

Indicators of Compromise (IoCs)

To exercise control over your security systems, please consult the IOCs section.

S.No Indicator Remarks
1 f03ac870cb91c00b51ddf29b6028d9ddf42477970eafa7c556e3a3d74ada25c9 Block
2 55b7e20e42b57a32db29ea3f65d0fd2b2858aaeb9307b0ebbcdad1b0fcfd8059 Block
3 55972edf001fd5afb1045bd96da835841c39fec4e3d47643e6a5dd793c904332 Block
4 SuperPrimeServices[.]com Block
5 Advising-Receipts[.]com Block
6 FunDay24[.]ru Block
7 slotgacorterbaru[.]xyz Monitor
8 servisyeni[.]xyz Monitor
9 chillchad[.]xyz Monitor
10 ggpoker[.]xyz Monitor
11 boldcatchpoint[.]shop Monitor
12 zhangthird[.]shop Monitor
13 vipwin[.]buzz Monitor
14 wholly-well[.]info Monitor
15 rapio[.]site Monitor
16 55cc[.]info Monitor
17 megasofteware[.]net Monitor
18 worrr19[.]sbs Monitor
19 kp85[.]cyou Monitor
20 mczacji[.]top Monitor
21 59292406[.]xyz Monitor
22 76[.]223[.]54[.]146 Monitor
23 188[.]114[.]97[.]7 Monitor
24 13[.]248[.]169[.]48 Monitor
25 84[.]32[.]84[.]32 Monitor
26 217[.]114[.]10[.]11 Monitor
27 207[.]244[.]126[.]106 Monitor
28 172[.]67[.]148[.]140 Monitor
29 198[.]252[.]111[.]31 Monitor
30 15[.]197[.]148[.]33 Monitor
31 162[.]254[.]38[.]217 Monitor
32 104[.]21[.]41[.]144 Monitor

YARA Rule

rule APT36_IOCs_Indicators

{

meta:

author = “News4Hackers Research”

description = “Detects known APT36-related indicators (hashes, IP, domains)”

date = “2025-06-08”

threat_group = “APT36 / Transparent Tribe”

 

strings:

// SHA256 file hashes (can be used for memory or file scan)

$hash1 = “f03ac870cb91c00b51ddf29b6028d9ddf42477970eafa7c556e3a3d74ada25c9”

$hash2 = “55b7e20e42b57a32db29ea3f65d0fd2b2858aaeb9307b0ebbcdad1b0fcfd8059”

$hash3 = “55972edf001fd5afb1045bd96da835841c39fec4e3d47643e6a5dd793c904332”

// Domains used by APT36

$domain1 = “SuperPrimeServices.com”

$domain2 = “Advising-Receipts.com”

$domain3 = “FunDay24.ru”

$domain4 = “slotgacorterbaru.xyz”

$domain5 = “servisyeni.xyz”

$domain6 = “chillchad.xyz”

$domain7 = “ggpoker.xyz”

$domain8 = “boldcatchpoint.shop”

$domain9 = “zhangthird.shop”

$domain10 = “vipwin.buzz”

$domain11 = “wholly-well.info”

$domain12 = “rapio.site”

$domain13 = “55cc.info”

$domain14 = “megasofteware.net”

$domain15 = “worrr19.sbs”

$domain16 = “kp85.cyou”

$domain17 = “mczacji.top”

$domain18 = “59292406.xyz”

 

// IPs used by APT36

$ip1 = “76.223.54.146”

$ip2= “188.114.97.7”

$ip3= “13.248.169.48”

$ip4= “84.32.84.32”

$ip5= “217.114.10.11”

$ip6= “207.244.126.106”

$ip7= “172.67.148.140”

$ip8= “198.252.111.31”

$ip9= “15.197.148.33”

$ip10= “162.254.38.217”

$ip11= “104.21.41.144”

condition:

any of ($hash*) or any of ($domain*) or any of ($ip*)

}

About The Author:

Yogesh Naager is a content marketer who specializes in the cybersecurity and B2B space.  Besides writing for the News4Hackers blogs, he also writes for brands including Craw Security, Bytecode Security, and NASSCOM.

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish