Threats and Connections uncovered related to Pakistani APTs Escalate Attacks on Indian Gov.

0
Image about Threats and Connections uncovered related to Pakistani APTs Escalate Attacks on Indian Gov.

Threats and Connections uncovered related to Pakistani APTs Escalate Attacks on Indian Gov.

Things are Escalating from the Pakistan Side, After the Pahalgam attack, they are intruding into the databases of the Indian Gov. Know, How?

Cyberattacks by APTs with linkages to Pakistan against Indian government organizations have accelerated recently. During telemetry analysis and field hunting, the Seqrite Labs APT team has found several similar campaigns.

Over the past few weeks, SideCopy, one such threat organization, has used its popular AllaKore RAT in three different campaigns, deploying two of these RATs simultaneously in each campaign.

Crimson RAT was continuously employed by its parent APT group, Transparent Tribe (APT36), during the same events, but either in an encoded or packed form. We were able to correlate these APTs based on their C2 infrastructure, demonstrating their sub-divisional relationship once more.

This blog provides an overview of these campaigns and explains how examining their prior attacks establishes a connection. One of the most targeted nations in the cyber threat scene is India, where new spear-phishing tactics like Operation RusticWeb and FlightNight have surfaced in addition to Pakistan-affiliated APT organizations like SideCopy and APT36 (Transparent Tribe).

Simultaneously, we have seen a rise in underground forums where initial access brokers are selling access to Indian entities (both government and corporate), high-profile ransomware attacks, and over 2900 disruptive attacks, including DDoS, website defacement, and database leaks, by more than 85 Telegram hacktivist groups in the first quarter of 2024.

Threat Actor Whereabouts

Since at least 2019, the Pakistan-affiliated Advanced Persistent Threat organization SideCopy has been attacking South Asian nations, mainly Indian government and defense organizations. Among its many tools are the Ares RAT, Action RAT, Margulas RAT, AllaKore RAT, and Reverse RAT.

The same persistent targeting is used by its parent threat group, Transparent Tribe (APT36), which updates its Linux malware arsenal frequently and has code similarities. Since it began operating in 2013, it has consistently employed payloads including Oblique RAT, Capra RAT, Eliza RAT, and Crimson RAT in its campaigns.

SideCopy

The same infection chain has so far been seen in three attack campaigns that use compromised domains to host payloads. Two customized versions of an open-source remote agent named AllaKore are deployed as the final payload rather than side-loading the Action RAT (DUser.dll) payload, as was previously observed.

Image showing information regarding Attack Chain of SideCopy

Infection Steps

  1. An archive file with a shortcut (LNK) in a double-extension format is the first step in spear-phishing.
  2. When the LNK is opened, a remote HTA file hosted on a compromised domain is executed by the MSHTA process. Two base64-encoded embedded files—a DLL and a decoy—are present in the stage-1 HTA.
  3. The decoy file is dropped and opened by the DLL, which is triggered to run in-memory. As was previously observed, the DLL generates several text files containing the name “Mahesh Chand” along with other arbitrary text.
  4. To start its second stage, the DLL will thereafter download two HTA files from the same hacked domain.
  5. This time, there are two DLLs and an EXE encoded in each HTA.
  6. When one of the DLLs is run in-memory, the other two files are decoded and then dropped into the public directory. The Run registry key is used to set persistence on the final payload in advance. As an illustration:

REG ADD “HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run” /V “issas” /t REG_SZ /F /D “C:\Users\Public\issas\issas.exe”

Image showing informationa regarding files dropped in one of the campaigns

Finally, both of the AllaKore RAT final payloads are run and connected to the same IP address, but with distinct port numbers for C2 communication. The final DLL is an authentic, old file that isn’t side-loaded.

Our prior blogs and whitepapers provide a detailed examination of each step. It has distinct sockets for the desktop, files, and keyboard in addition to timeout, reconnection, and clipboard timers. AllaKore’s capabilities include:

  • Gathering system information
  • Enumerating files and folders
  • Upload and execute files
  • Keylogging
  • Steal clipboard data

Campaign-wise, the Delphi-based AllaKore RATs have the following information:

Campaign Internal Name Compiler Timestamp
1. msmediaGPview  msmediarenderapp 06-Mar-2024
2. msvideolib msrenderapp 18-Mar-2024
3. msvideolib msrenderapp 01-Apr-2024

To determine that the connection is active, the RAT first sends and receives ping-pong commands while listening to the C2 for orders. The network traffic below demonstrates how the two RAT payloads operate in tandem, enhancing one another.

Additionally, they differ in size: Double Action RAT is 3.2 MB, while the other nearly doubles to 7 MB. For every instance, a connection ID is generated using the system data.

Image about network traffic for port 9828

Image about network traffic for port 6663

List of encrypted strings used in smaller payloads for C2 communication:

S.No. Encrypted Decrypted
1. 7oYGAVUv7QVqOT0iUNI SocketMain
2. 7oYBFJGQ OK
3. 7o4AfMyIMmN Info
4. 7ooG0ewSx5K PING
5. 7ooGyOueQVE PONG
6. 7oYCkQ4hb550 Close
7. 7oIBPsa66QyecyD NOSenha
8. 7oIDcXX6y8njAD Folder
9. 7oIDaDhgXCBA Files
10. 7ooD/IcBeHXEooEVVuH4BB DownloadFile
11. 7o4H11u36Kir3n4M4NM UploadFile
12. Sx+WZ+QNgX+TgltTwOyU4D Unknown (Windows)
13. QxI/Ngbex4qIoVZBMB Windows Vista
14. QxI/Ngbex46Q Windows 7
15. QxI/Ngbex4aRKA Windows 10
16. QxI/Ngbex4KTxLImkWK Windows 8.1/10

The AllaKore agent has been integrated with several file actions, such as create, delete, execute, copy, move, rename, zip, and upload. The larger payload contained these orders.

Image providing information about File Move Operation and Command in the Second Payload

The DLL files that are discarded are genuine files that might be used maliciously in the future and are not sideloaded by the AllaKore RAT. Only a small number of these libraries have a legitimate signature, despite being connected to Microsoft Windows.

S.No. Dropped DLL Name PDB Description Compilation Timestamp
1. msdr.dll Windows.Management.Workplace.WorkplaceSettings.pdb Windows Runtime WorkplaceSettings DLL 2071-08-19
2. braveservice.dll dbghelp.pdb Windows Image Helper 2052-02-25
3. salso.dll D3d12core.pdb Direct3D 12 Core Runtime 1981-03-18
4. salso.dll OrtcEngine.pdb Microsoft Skype ORTC Engine 2020-01-07
5. salso.dll msvcp120d.amd64.pdb Microsoft® C Runtime Library 2013-10-05
6. FI_Ejec13234.dll IsAppRun.pdb TODO:<> 2013-10-15

Decoys

One of the two decoy files that have been seen was utilized in earlier attacks in February and March of 2023. The document’s date, “21 December 2022,” has been deleted, and the bait’s name, “Grant_of_Risk_and_HardShip_Allowances_Mar_24.pdf,” has been modified to reflect March 2024.

As the name implies, it is a 2022 advisory on allowance payments to Indian Ministry of Defense Army officers. Two of the three campaigns make use of this.

Image about Decoy(1)

The second deception refers to payment in arrears form and is associated with the same allowance type. This is another ancient document that was utilized in the past; it was created on January 19, 2023.

Image about Decoy(2)

Attribution and Infrastructure

As demonstrated by the passive DNS replication since last year, the compromised domains resolve to the identical IP addresses that were utilized in earlier campaigns.

S.No. IP Compromised Domain Campaign
1. 151.106.97[.]183 inniaromas[.]com

ivinfotech[.]com

November 2023
revivelife.in March 2024
vparking[.]online April 2024
2. 162.241.85[.]104 ssynergy[.]in April 2023
elfinindia[.]com May 2023
occoman[.]com August 2023
sunfireglobal[.]in October 2023
masterrealtors[.]in November 2023
smokeworld[.]in March 2024

AllaKore RAT’s C2 servers, which SideCopy frequently uses, are registered in Germany under AS51167- Contabo GmbH. These campaigns are ascribed to SideCopy, which has a high degree of confidence and employs comparable infrastructure to spread the infection, based on the attack chain and armament employed.

164.68.102[.]44 vmi1701584.contaboserver.net
213.136.94[.]11 vmi1761221.contaboserver.net

The telemetry hits for each of the three SideCopy campaigns associated with AllaKore RAT are shown in the following chart. While the third campaign is shown in the second week of April, the first two campaigns show a surge twice in March.

Image providing information regarding SideCopy campaign hits

Open Tribe

The VirusTotal platform frequently displays a large number of Crimson RAT samples, with a detection rate of 40–50. We have discovered new samples in our threat hunting, although we haven’t detected many.

Image showing information about Infection Chain of APT36

The Crimson RAT samples are not integrated directly within the maldocs as they typically are, according to our analysis of the infection chain to look for any modifications. This time, there were three items in the XLAM form of the maldoc: the base64-encoded blobs and the decoy.

An image featuring information regarding Additional Functions in Macro

Additional functions for reading a file, decoding base64, and converting binary to a string are visible after extracting the VBA macro. The two base64 blobs that are embedded inside the maldoc are read and decoded by the macro. This opens the decoy file and includes archived Crimson RAT executed samples.

Image about VBA infection flow

Crimson RAT

The same functionality is present in the final RAT payloads, which use 22 instructions for C2 connection. We observe a low rate for both of these samples, whereas the detection rate for this Crimson RAT is normally high.

The PDB for these .NET examples is “C:\New folder\mulhiar tarsnib\mulhiar tarsnib\obj\Debug\mulhiar tarsnib.pdb,” and their compilation timestamp is 2024-03-17.

Image providing information regarding Detection Count on VT

When the C2 commands and the process flow were examined together, no significant changes were found. 204.44.124[.]134 is the C2’s IP address, and it attempts to establish a connection using five distinct ports: 9149, 15597, 18518, 26791, and 28329.

The C2 instructions for a few recent samples (compile-timestamp-wise) of Crimson RAT, which employ comparable 22–24 commands, are listed below. Except for the final two, none of these are packed, and they are all in the same size range (10–20 MB).

An image showing details about C2 Commands of Crimson RAT for Recent Sample

Similarity with prior samples is consistently greater than 75%, as demonstrated by BinDiff. Only by adding numbers or dividing the command into two did the RAT detect changes in the order of the command it interpreted.

Image showing information about Comparing similarity between Crimson RAT Variants

Additionally, two new samples called “ShareX” and “Analytics Based Card” were discovered after being obfuscated using Eziriz’s .NET Reactor. In the past, APT36 has employed a variety of packers and obfuscators, including ConfuserEx, Crypto Obfusator, and Eazfuscator.

In contrast to the previous iteration, the obfuscated ones have 40 commands, while the conventional ones have 22–24 commands as usual. In this instance, the C2, juichangchi[.]online, is attempting to establish a connection with four ports: 909, 67, 65, and 121.

Although some of these C2 instructions are not yet functioning, they resemble the ones that Proofpoint initially disclosed. Our earlier APT36 whitepaper contains a list of all 22 commands and their functions.

Image providing information about Comparison after Deobufscation

Decoys

India’s Directorate General of Mines Safety, or DGMS, is contained in the malicious document titled “Imp message from dgms.” The counterfeit document’s numerous references to military or defense-related land and urban policy demonstrate its deliberate targeting of the Indian government. Despite being empty, the “All details” maldoc contains the heading “Posting list.”

Image about DGMS decoy

Crimson Keylogger

Recently, a malicious .NET file with the compilation timestamp 2023-06-14 was discovered. It has a PDB naming scheme similar to Crimson RAT. After analysis, a keylogger payload was created that records every keystroke.

  • PDB: e:\vdhrh madtvin\vdhrh madtvin\obj\Debug\vdhrh madtvin.pdb

It gathers the name of the active process in the foreground, in addition to recording every keystroke and saving it to a file. Clipboard data is also copied to the storage file, and toggle keys are recorded independently and according to key combinations.

Image providing information about Crimson Keylogger

Correlation

Based on the domain that Transparent Tribe uses as C2, we pivot to observe passive DNS replications of the domain using Virus Total and Validin, which is comparable to the code overlaps previously observed between SideCopy and APT36 in Linux-based payloads.

The timeline below shows when the C2 for the two packed samples mentioned above went live. They resolved to distinct IPs, 176.107.182[.]55 and 162.245.191[.]214.

Image showing information regarding Timeline of C2 Domain

Two more IP addresses, 155.94.209[.]4 and 162.255.119[.]207, are also obtained in this way. While the latter is not linked to new malware, the former is connected with a payload that has only 7/73 detections on Virus Total.

With a build timestamp of 2039-02-24, the malware appears to be another .NET Reactor-packed payload; however, it is smaller (6.55 MB) than the Crimson RAT payloads.

Image showing information about Deobufscated Allakore RAT

The sample’s default name, “Kuchbhi.pdb,” is an Indian term that might signify anything. Following deobfuscation, C2 commands resemble the Delphi-based AllaKore RAT used by SideCopy mentioned above. This time, though, it’s in a .NET form and has the five commands listed below:

C2 Command Function
LIST_DRIVES Obtain and transmit a list of the machine’s drives.
LIST_FILES List all of the files and folders in the specified path.
UPLOAD_FILE Download and run the file.
PING Sending PONG for live status while listening to C2
getinfo Provide your OS details, machine name, and username.

There are two methods to set persistence: using the starting directory or the registry key. SideCopy’s Linux-based Ares RAT stager payload and Transparent Tribe’s Linux-based Python malware, Poseidon, and other desktop tools were determined to have similar code usability. Similar code overlaps and potential C2 infrastructure sharing between the two groups are evident here. Since its discovery in 2019, SideCopy has been linked to the Action RAT payload and the open-source AllaKore RAT. Likewise, Crimson RAT is associated with being an internal APT36 toolkit.

Infrastructure and Attribution

The identical target names that were previously utilized by APT36 were found to be operating Windows Server 2012 and 2022 versions on the C2.

S.No. IP ASN Organization Country Name
1. 204.44.124[.]134 AS8100 QuadraNet Inc United States WIN-P9NRMH5G6M8
2. 162.245.191[.]214 AS8100 QuadraNet Inc United States WIN-P9NRMH5G6M8
3. 155.94.209[.]4 AS207083 Quadranet Inc Netherlands WIN-P9NRMH5G6M8
4. 176.107.182[.]55 AS47987 Zemlyaniy Dmitro Leonidovich Ukraine WIN-9YM6J4IRPC

These operations are confidently linked to both APT36 and SideCopy groups based on this correlation and prior attack chains, demonstrating yet another close relationship between them.

Conclusion

APT organizations with ties to Pakistan have persisted in targeting the Indian government and defense institutions, and new activities have surfaced posing comparable risks. In contrast to its parent group, Transparent Tribe (APT36), which consistently uses Crimson RAT, T, and makes modifications to avoid detection, SideCopy has used its well-known AllaKore RAT in several missions.

India will undoubtedly continue to be targeted as the threat landscape changes as a result of numerous geopolitical events, including the Israel-Iran war. It is advised that people adopt the appropriate safety measures and remain safe in the face of rising cybercrime as India prepares for its next election.

Seqrite Protection

  • 48519
  • 48674.GC
  • 48761.GC
  • S30112905
  • SideCopy
  • 48760.GC
  • Crimson

IOCs

SideCopy

HTA

6cdc79655e9866e31f6c901d0a05401d jfhdsjfh34frjkfs23432.hta
dbf196ccb2fe4b6fb01f93a603056e55 flutter.hta
37b10e4ac08534ec36a59be0009a63b4 plugins.hta
d907284734ea5bf3bd277e118b6c51f0 bjihfsdfhdjsh234234.hta
2a47ea398397730681f121f13efd796f plugins.hta
6ab0466858eb6d71d830e7b2e86dab03 flutter.hta
ecc65e6074464706bb2463cb74f576f7 4358437iufgdshvjy5843765.hta
da529e7b6056a055e3bbbace20740ee9 min-js.hta
cadafc6a91fc4bba33230baed9a8a338 nodejsmin.hta

Embedded DLL

1e5285ee087c0d73c76fd5b0b7bc787c hta.dll
f74c59fd5b835bf7630fbf885d6a21aa hta.dll
3cc6602a1f8a65b5c5e855df711edeb0 hta.dll
990bfd8bf27be13cca9fa1fa07a28350 SummitOfBion.dll
29fa44d559b4661218669aa958851a59 SummitOfBion.dll
26bde2d6a60bfc6ae472c0e9c8d976e2 SummitOfBion.dll
eceb986d166526499f8f37fd3efd44db SummitOfBion.dll
2a680cf1e54f1a1f585496e14d34c7e9 SummitOfBion.dll

AllaKore RAT

76ca50a71e014aa2d089fed1251bf6cd issas.exe
71b285c8903bb38d16d97c1042cbeb92 quick.exe
9684bf8955b348540446df6b78813cdb cove.exe
48e1e695258a23742cd27586e262c55a salso.exe
4ba7ca56d1a6082f0303f2041b0c1a45 cove.exe
6cda3b5940a2a97c5e71efcd1dd1d2ca FI_Ejec1.exe

Decoys

30796f8fb6a8ddc4432414be84b8a489

8740d186877598297e714fdf3ab507e9

Grant_of_Risk_and_HardShip_Allowances_Mar_24.pdf

DLL

abeaa649bd3d8b9e04a3678b86d13b6b msdr.dll
b3a5e819e3cf9834a6b33c606fc50289 braveservice.dll
312923e0baf9796a846e5aad0a4d0fb6 salso.dll
1d7fc8a9241de652e481776e99aa3d46 salso.dll
760ff1f0496e78d37c77b2dc38bcbbe4 salso.dll
fa5a94f04e684d30ebdc4bf829d9c604 FI_Ejec13234.dll

Compromised Domains

revivelife[.]in 151.106.97[.]183
smokeworld[.]in 162.241.85[.]104
vparking[.]online 151.106.97[.]183

C2 and Ports

164.68.102[.]44 6663, 9828
213.136.94[.]11 6663, 7880

URLs

hxxps://revivelife[.]in/assets/js/other/new/
hxxps://revivelife[.]in/assets/js/other/new/jfhdsjfh34frjkfs23432.hta
hxxps://revivelife[.]in/assets/js/other/grant/
hxxps://revivelife[.]in/assets/js/other/grant/32476sdfsdafgsdcsd3476328.hta
hxxps://revivelife[.]in/assets/js/support/i/index.php
hxxps://revivelife[.]in/assets/js/support/c/index.php
hxxps://smokeworld[.]in/wp-content/plugins/header-footer-show/01/
hxxps://smokeworld[.]in/wp-content/plugins/header-footer-show/01/bjihfsdfhdjsh234234.hta
hxxps://smokeworld[.]in/wp-content/plugins/header-footer-other/intro/index.php
hxxps://smokeworld[.]in/wp-content/plugins/header-footer-other/content/index.php
hxxps://vparking[.]online/BetaVersion/MyDesk/assets/fonts/account/show/index.php
hxxps://vparking[.]online/BetaVersion/MyDesk/assets/fonts/account/show/4358437iufgdshvjy5843765.hta
hxxps://vparking[.]online/BetaVersion/MyDesk/plugins/quill/support/intro/
hxxps://vparking[.]online/BetaVersion/MyDesk/plugins/quill/support/content/index.php

Host

C:\ProgramData\HP\flutter.hta
C:\ProgramData\HP\plugins.hta
C:\ProgramData\HP\min-js.hta
C:\ProgramData\HP\nodejsmin.hta.hta
C:\Users\Public\quick\quick.exe
C:\Users\Public\quick\msdr.dll
C:\Users\Public\quick\quick.bat
C:\Users\Public\issas\issas.exe
C:\Users\Public\issas\braveservice.dll
C:\Users\Public\issas\issas.bat
C:\Users\Public\cove\cove.exe
C:\Users\Public\cove\salso.dll
C:\Users\Public\cove\cove.bat
C:\Users\Public\salso\salso.exe
C:\Users\Public\salso\salso.dll
C:\Users\Public\salso\salso.bat
C:\Users\Public\FI_Ejec1\FI_Ejec1.exe
C:\Users\Public\FI_Ejec1\FI_Ejec1324.dll
C:\Users\Public\FI_Ejec1\FI_Ejec1.bat

APT36

Maldoc

f436aa95838a92b560f4cd1e1c321fe7 All details.xlam
afb24ec01881b91c220fec8bb2f53291 Imp message from dgms.xlam

Base64-zipped Crimson RAT

7bb8f92770816f488f3a8f6fe25e71a7 oleObject1.bin
303b75553c5df52af087b5b084d50f98 oleObject2.bin

Crimson RAT

898df40a8f2a6702c0be059f513fab9d mulhiar tarsnib.exe
e3cf6985446cdeb2c523d2bc5f3b4a32 mulhiar tarsnib.exe
bb5b569b38affb12dfe2ea6d5925e501 ShareX.exe
7cdc81a0f5c5b2d341de040a92fdd23a Analytics Based Card.exe
81b436873f678569c46918862576c3e0 vdhrh madtvin.exe (keylogger)

AllaKore RAT (.NET)

e291fffbcb4b873b76566d5345094567 Mailbird.exe

Decoys

9d337c728c92bdb227055e4757952338 All details.xlam.xlsx
d7b909f611e8f9f454786f9c257f26eb Imp message from dgms.xlam.xlsx

C2 and Ports

204.44.124[.]134 9149, 15597, 18518, 26791, 28329
juichangchi[.]online

176.107.182[.]55

162.245.191[.]214

909, 67, 65, 121
155.94.209[.]4 8888, 9009, 33678

Host

  • C:\Users\<name>\Documents\mulhiar tarsnib.scr
  • C:\Users\<name>\AppData\Meta-<number>\
  • C:\Users\<name>\AppData\mulhiar tarsnib.scr\mulhiar tarsnib.png

MITRE ATT&CK

S.No. Tactic Technique ID Name
1. Resource Development T1583.001 Acquire Infrastructure: Domains
T1584.001 Compromise Infrastructure: Domains
T1587.001 Develop Capabilities: Malware
T1588.001 Obtain Capabilities: Malware
T1588.002 Obtain Capabilities: Tool
T1608.001 Stage Capabilities: Upload Malware
T1608.005 Stage Capabilities: Link Target
2. Initial Access T1566.001 Phishing: Spear phishing Attachment
T1566.002 Phishing: Spear phishing Link
3. Execution T1106 Native API
T1129 Shared Modules
T1059 Command and Scripting Interpreter
T1047 Windows Management Instrumentation
T1204.001 User Execution: Malicious Link
T1204.002 User Execution: Malicious File
4. Persistence T1547.001 Registry Run Keys / Startup Folder
5. Defense Evasion T1027.010 Command Obfuscation
T1036.005 Masquerading: Match Legitimate Name or Location
T1036.007 Masquerading: Double File Extension
T1140 Deobfuscate/Decode Files or Information
T1218.005 System Binary Proxy Execution: Mshta
T1574.002 Hijack Execution Flow: DLL Side-Loading
T1027.009 Obfuscated Files or Information: Embedded Payloads
T1027.010 Obfuscated Files or Information: Command Obfuscation
6. Discovery T1012 Query Registry
T1033 System Owner/User Discovery
T1057 Process Discovery
T1083 File and Directory Discovery
T1518.001 Software Discovery: Security Software Discovery
7. Collection T1005 Data from Local System
T1056.001 Input Capture: Keylogging
T1074.001 Data Staged: Local Data Staging
T1119 Automated Collection
T1113 Screen Capture
T1125 Video Capture
8. Command and Control T1105 Ingress Tool Transfer
T1571 Non-Standard Port
T1573 Encrypted Channel
T1071.001 Application Layer Protocol: Web Protocols
9. Exfiltration T1041 Exfiltration Over C2 Channel

This image showing roadmap to Best Cyber Security Diploma

About The Author

Suraj Koli is a content specialist with expertise in Cybersecurity and B2B Domains. He has provided his skills for the News4Hackers Blog and Craw Security. Moreover, he has written content for various sectors of business, Law, Food and beverage, Entertainment, and many others. Koli established his center of the field in an amazing scenario. Simply said, he started his career selling products, where he enhanced his skills in understanding the product and the point of view of clients from the customer’s perspective, which simplified his journey in the long run. It makes him an interesting personality among other writers. Currently, he is a regular writer at Craw Security.

READ MORE HERE

The Website of the Army Nursing College was Hacked After the Pahalgam Terror Attack 2025

The Inside Story of ₹97 Lakh Online Trading Scam: VIP Group, Fake Profits

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish