CL-STA-0048: An Espionage Operation Against High-Value Targets in South Asia
2025-1-29 23:0:17 Author: unit42.paloaltonetworks.com(查看原文) 阅读量:4 收藏

Executive Summary

We identified a cluster of activity that we track as CL-STA-0048. This cluster targeted high-value targets in South Asia, including a telecommunications organization.

This activity cluster used rare tools and techniques including the technique we call Hex Staging, in which the attackers deliver payloads in chunks. Their activity also includes exfiltration over DNS using ping, and abusing the SQLcmd utility for data theft.

Based on an analysis of the tactics, techniques and procedures (TTPs), as well as the tools used, the infrastructure and the victimology, we assess with moderate-high confidence that this activity originates in China.

The campaign primarily aimed to obtain the personal information of government employees and steal sensitive data from targeted organizations. These objectives bear the hallmarks of a nation-state advanced persistent threat (APT) espionage operation.

The threat actor behind this campaign demonstrated a methodical approach to network penetration to establish a foothold. We observed systematic attempts to exploit known vulnerabilities on public-facing servers, specifically targeting the following services:

  • IIS
  • Apache Tomcat
  • MSSQL services

Organizations that protect sensitive information should focus on patching commonly exploited vulnerabilities. They should also follow best practices for IT hygiene, as APTs frequently attempt to gain access using methods that have proven successful in the past.

We are sharing our analysis to provide defenders with means to detect and protect themselves against such advanced attacks.

Palo Alto Networks customers are better protected from the threats discussed in this article through Cortex XDR and XSIAM.

Customers are also better protected through the following products and services:

If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team.

Related Unit 42 Topics China, Cobalt Strike, Data Exfiltration

Timeline of Activity

Throughout our investigation, we observed a distinct sequence of events that characterized the threat actor's activities. Figure 1 illustrates this timeline, showcasing the key stages and progression of the attack.

Timeline diagram titled 'CL-STA-0048 Timeline' detailing various cybersecurity events from May 2024 to November 2024, including tasks like 'IIS Server Exploit Attempt' and 'User Creation Apache' along with others related to SQL injection, credential theft, and server access. There are five points in the series.
Figure 1. Activity timeline of CL-STA-0048.

Exploiting Multiple Entry Points

We observed the threat actor attempting to exploit three critical services, one after the other:

  • IIS
  • Apache Tomcat
  • MSSQL Services

With each failure, the threat actor adapted, targeting the next vulnerable asset in this list.

The Initial Target: Attempting to Exploit IIS Servers

On the first attempt, the threat actor tried to exploit vulnerabilities on multiple IIS servers in the environment, trying to deliver and deploy several web shells. These attempts were blocked by Cortex XDR.

Anti-Webshell and Anti-Exploitation Modules

The attackers’ attempts to deploy a web shell were also prevented by Cortex XDR.

The Attackers Shift to Apache Tomcat

After failing to exploit the IIS servers, the threat actor targeted an internet-facing Apache server, deploying a ColdFusion web shell as shown in Figure 2. This was again blocked by Cortex XDR.

Screenshot of code with attributes and tags like 'Form.Action', 'FileContents', and 'uploadcss', aimed at handling file uploads and form submissions, viewed in a code editor with a dark background and color-coded text.
Figure 2. ColdFusion web shell used in the attack.

One Final Attempt: An MSSQL Server

On the third attempt, the threat actor was able to compromise an unpatched internet-facing MSSQL server. The following section details the malicious activity that we observed from the compromised server.

Reconnaissance and a Rarely Seen Exfiltration Technique

The threat actor leveraged PowerShell to download multiple batch scripts from a remote server. These scripts executed commands such as tasklist to enumerate running processes on compromised machines and dir to list the contents of directories.

The scripts exfiltrated command outputs by formatting each line as a string constructed of a series of subdomains and sending ping requests to these subdomains. Each ping command triggered a DNS request, transmitting the exfiltrated data to the attackers via DNS.

The threat actor used dnslog.pw, a Chinese DNS logging tool for pen testers, to capture the output. Figure 3 below illustrates this data exfiltration technique.

Process tree in Cortex XDR showing a network of processes. The processes are visually connected by lines, indicating interactions and data flows, with numerical annotations and icons representing different statuses or functions. Some text and elements are blurred for privacy.
Figure 3. Process tree of the data exfiltration using the ping command.

In addition, the threat actor attempted to save the output of the dir command into text files and then uploaded the output file to their command and control (C2) server using PowerShell. Figure 4 below shows the command they used.

Text showing command line instructions for the exfiltration.
Figure 4. Exfiltration command.

Preparing the Ground: The “Hex Staging” Method and Delivering Malware

PlugX as the Attacker's Main Backdoor

The initial and primary backdoor the threat actor used in this attack was the PlugX backdoor. PlugX is a well-known remote access tool (RAT) with modular plugins and customizable settings that has been popular for over a decade, primarily among Chinese-speaking threat groups.

The threat actor abused certutil to download the PlugX component from a remote domain under the following URL path:

  • https://h5.nasa6[.]com/shell/

The attackers dropped and executed the following payloads:

  • Acrobat.exe - A legitimate Adobe Acrobat binary
  • Acrobat.dxe - An encrypted PlugX payload
  • Acrobat.dll - A PlugX loader

The payloads were saved under the path C:\ProgramData\DSSM\

The threat actor then used the DLL sideloading technique and exploited vulnerable legitimate binaries (Acrobat.exe) to initiate the PlugX loader Acrobat.dll. This technique was detected by Cortex XDR.

When the legitimate binary successfully sideloaded the PlugX loader, it searched for the payload Acrobat.dxe in the system. Once it found the payload, the PlugX loader proceeded to load, decrypt and then inject it into a legitimate instance of svchost.exe.

The PlugX payload then connected to the C2 server mail.tttseo[.]com, executing in memory as a detection evasion attempt.

Talos mentioned similar TTPs including the same file names, several hashes and the C2 address in their September 2024 blog about a Chinese threat actor called DragonRank. Figure 5 shows how Cortex XDR captured the PlugX execution flow.

Cortex XDR network security alert interface showing two warnings with associated process details, displaying IP addresses and module paths. Some information is redacted.
Figure 5. Detection of PlugX execution flow, as shown in Cortex XDR.

Hex Staging: Another Rarely Seen Technique Used by the Threat Actor

Once the threat actor gained a foothold inside the network, they attempted to upload additional tools. They employed a stealthy and uncommon technique to do this, in which the attackers deliver payloads in chunks (T1027: Obfuscated Files or Information). We call this technique Hex Staging.

In Hex Staging, an attacker incrementally writes hex-encoded data into a temporary file piece by piece, using commands passed to cmd.exe. This method avoids detection systems that scan for direct file writes.

Once the file is assembled in hex format, the attacker uses a tool like certutil to decode the hex data back into ASCII. This content could be either binary executables or scripts. This method bypasses conventional security detection by using native Windows utilities to covertly deliver and execute malicious code.

Figure 6 shows an example of the Hex Staging commands used by the threat actor.

Screenshot of a table in Cortex XDR with an MZ header highlighted.
Figure 6. Hex Staging commands.

The threat actor attempted to deliver multiple files using this method. This included binary files such as Cobalt Strike loaders and implants, as well as a .sql script, which we will describe later in this post.

A PowerShell script that loaded Cobalt Strike (shown in Figure 7) was among the payloads they wrote using that technique. It was detected and prevented by Cortex XDR.

Screenshot of a computer screen displaying complex programming code in an IDE with syntax highlighting, involving functions and system calls.
Figure 7. Alert for the malicious PowerShell script, as shown in Cortex XDR.

Privilege Escalation Tools

SspiUacBypass

After establishing a foothold in the environment, we observed the threat actor attempting to bypass User Account Control (UAC), leveraging the SspiUacBypass tool. This technique exploits the Windows Security Support Provider Interface (SSPI) to sidestep UAC prompts, allowing the actor to run high-privileged processes without user consent.

The Potato Suite

To successfully execute certain tools, the threat actors needed to run their tools and commands with adequate privileges, such as Admin or SYSTEM. To do so, they used different tools from the popular Potato Suite, a collection of various native Windows privilege escalation tools.

The main tools that we observed during the investigation were:

  • BadPotato: A local privilege escalation tool that elevates user privileges to SYSTEM for command execution
  • RasmanPotato: This tool exploits the Windows Remote Access Connection Manager (RASMAN) service to gain system-level access, allowing high-privilege operations without user interaction

Command-and-Control Tools

SoftEther VPN

Another tool that we observed the threat actor using is a renamed version of the open-source SoftEther VPN. This software is flexible and has multi-protocol support. Threat actors, particularly those in Chinese groups, frequently abuse it for stealthy communications and bypassing network restrictions.

Figure 8 shows the command the threat actors used to download the client and configuration file.

Screenshot showing two Command Prompt inputs executing commands with parameters that include URLs and file paths related to the FortiEDR software.
Figure 8. The command used to download the SoftEther VPN client and configuration file.

Winos4.0-Based Downloader

The threat actor also attempted to use a downloader built using the advanced malicious framework Winos4.0. The downloader, placed under drivers\etc masquerading as hosts.exe, attempted to connect to the IP address 154.201.68[.]57.

After a successful connection, it downloads the payload and saves it into the registry key d33f351a4aeea5e608853d1a56661059. It then executes the payload. Fortinet observed similar behavior as part of the execution of another malware called ValleyRAT, which we believe the threat actor built using the same framework.

The downloader variant we discovered also leverages the KCP Protocol. This is a fast and reliable automatic repeat-request (ARQ) protocol that provides low-latency and faster communications.

Chinese threat actors were the main users of this protocol [PDF] in the past, including the infamous APT41. This corresponds with the fact that the main GitHub page is written in Mandarin, suggesting it mainly addresses Mandarin-speaking hackers.

Cobalt Strike Execution

The threat actor deployed Cobalt Strike to execute additional malicious activities within the compromised environment. Using the Hex Staging technique mentioned earlier, the loader was dropped onto the SQL server. Upon execution, it injected the Cobalt Strike beacon into winlogon.exe, initiating communication with the configured C2 server sentinelones[.]com.

One of their initial objectives was dumping the LSASS process. This attempt was detected and successfully blocked by Cortex XDR, preventing the harvesting of credentials.

The threat actor also used the Cobalt Strike implant to deliver additional payloads. Those payloads were two sets of legitimate binaries and DLLs:

  • The first pair was a legitimate ecmd.exe and the malicious DLL msvcp140.dll
  • The second pair was the AppLaunch.exe application and the malicious DLL mscoree.dll

The threat sideloaded the malicious DLLs to the legitimate binaries to load Stowaway, a multi-hop proxy tool, shown in Figure 9 below. The threat actor used this tool to create a connection back to one of its main C2 servers: 43.247.135[.]106.

After failing to load the malicious DLLs, the threat actor tried to use another tool for the same purpose: iox, a port forward and intranet proxy tool.

Finally, the actor attempted to create a new database user through the Cobalt Strike beacon. We will explore this step and its implications in detail in the following section.

Cortex XDR process tree showing a cyber attack sequence, with numbered steps indicating the progression of processes and interactions between files and commands, including connections to IP addresses.
Figure 9. Execution flow of Cobalt Strike, as shown in Cortex XDR.

Aiming Toward the Database: Stealing Tables Data

Creating a Privileged Database User

Once the threat actor established their presence in the network, they attempted to exfiltrate sensitive data from SQL servers.

The threat actor initially attempted to create a database user with the username webuseraa and password teasd$%!FFr. They granted the user System Administrator privileges on the main database using the command shown in Figure 10.

Command prompt screenshot showing the execution of SQL commands to create a login named 'newuseraa' with a specified password and adding this user to the 'sysadmin' role on a Microsoft SQL server.
Figure 10. Creation of database user.

Deploying a Malicious SQL Script

The attacker also created an SQL script named 1.sql.tmp using the Hex Staging technique mentioned earlier in this post. They first decoded the hex file into ASCII using certutil and saved the file as 1.sql (shown in Figure 11).

Screenshot of a computer screen displaying a complex SQL query code on a dark background with light text.
Figure 11. The malicious SQL script.

Then they executed the script and saved the output into the text file shown in Figure 12 below.

Screenshot displaying a command line interface with a typed command that includes a file path pointing to the "cmd.exe" in the Windows System32 directory.
Figure 12. Execution of the malicious SQL script.

This script identifies and exfiltrates sensitive contact information stored across multiple databases by searching for columns that could contain phone-related data, such as those named “phone,” “Mobile” or “TEL.” The script then aggregates results across databases, generating a list with the database name, schema, table, column names and total row count for each match.

Figure 13 shows the execution flow of the SQL script.

Cortex XDR process tree depicting various CMD command lines involving system tasks. The flow starts from a single point on the left, expanding into multiple branches.
Figure 13. Execution flow of the SQL script, as shown in Cortex XDR.

After executing the script, the threat actor attempted to exfiltrate the output text file containing the results to their C2 server, as shown in Figure 14. They then deleted the script from the server.

Screenshot of text on a computer screen displaying a command line prompt executing a PowerShell script.
Figure 14. Exfiltration command.

The Abuse of Sqlcmd.exe for Data Exfiltration

By leveraging the sqlcmd utility, the attacker connected to the local SQL server instance (127.0.0[.]1) on port 1434 and executed a dynamic SQL query. Such a query creates a temporary table to store metadata about all tables across accessible databases.

The script dynamically generates SQL commands to iterate through all user databases (excluding system databases) and retrieves details like database name, schema name and table name. Figure 15 below shows the database harvesting command.

Screenshot showing a command line interface executing a script that interacts with system databases.
Figure 15. DB harvesting command-line execution.

The results are then sorted and written into an output file (C:\users\public\123.txt), which the threat actors tried to exfiltrate later, as shown in Figure 16 below. After that, the threat actor deleted the temporary table.

Screenshot showing a snippet of computer code for exfiltration.
Figure 16. Exfiltration command.

Finally, the threat actor attempted to extract personally identifiable information (PII) and sensitive client data from one of the databases, specifically targeting details such as:

  • Client names
  • Mobile numbers
  • Gender
  • Birth dates
  • Email IDs
  • Residential addresses

The command groups this data by mobile number and saves the output as a .zip file, as shown in Figure 17.

Screenshot displaying a line of SQL code on a dark background with syntax highlighting, showing commands and functions for querying client details from a database.
Figure 17. Database theft command-line execution.

Connection to the Chinese Nexus

Overlaps with DragonRank

The threat actor behind this cluster of activity employed PlugX as one of its primary backdoors. They used specific components (notably the loader and payload), exhibiting an overlap with those used by DragonRank, a recently identified Chinese threat group.

We lack sufficient data on DragonRank to definitively link it to CL-STA-0048. However, we acknowledge the similarities between the two while keeping CL-STA-0048 as a distinct cluster for tracking purposes. This allows us to monitor for potential connections without making premature conclusions.

Activity Time Frame

During our investigation, we successfully traced the time frame of the threat actor's interactive sessions. We focused on hands-on-keyboard commands executed on the compromised SQL server, as well as commands sent to the different active backdoors. A thorough review of the activity's time over several months revealed a notable and consistent pattern.

Our findings, as illustrated in Figure 18 below, demonstrate a correlation with typical 9-to-5 working hours in the UTC+8 time zone. This time period notably aligns with the business hours of various Asian nations, with China being a prominent example.

Dual line chart showing two data sets, plotted over time.
Figure 18. Comparison of activity time frame between UTC and UTC+8.

DNS Logging Service

Figure 19 shows that the threat actor used a DNS logging service primarily designed for a Chinese-speaking audience to exfiltrate command output, as we mentioned earlier in this article. Although this service is globally accessible, its usage patterns and associated tool ecosystems suggest a predominant adoption within Chinese cybersecurity circles, where it closely aligns with local security testing practices.

Screenshot of a website named DNSlog.pw featuring the DNSlog System. The text is in Chinese and describes the website.
Figure 19. DNSlog System web description.

KCP Protocol

The threat actor’s use of a Winos4.0-based Downloader leveraging the KCP Protocol could suggest a Chinese origin. The protocol has been historically associated with Chinese threat actors like APT41 and is documented primarily in Mandarin, indicating its intended audience is Chinese-speaking developers. This linguistic and operational context points to a likely connection to the Chinese cyberthreat ecosystem.

Supershell Panel

During our investigation, we observed the attackers downloading several files from the IP address 206.237.0[.]49. Elastic disclosed this IP address in January 2024 as part of the Supershell C2 platform. While Supershell is openly available on GitHub, its interface and documentation are primarily tailored to a Mandarin-speaking audience, further solidifying the connection to the Chinese nexus.

Conclusion

The CL-STA-0048 campaign represents a significant threat, targeting government and telecom entities in South Asia with a clear focus on espionage. The threat actor behind it leverages tactics to evade detection, bypass security measures and exfiltrate sensitive data from high-value targets.

CL-STA-0048 exploits unpatched vulnerabilities in widely used services such as IIS, Apache Tomcat and MSSQL. It adapts to new defenses and deploys rarely seen techniques, adjusting its methods to overcome defenses and achieve its objectives.

Our analysis indicates a strong link between this group and the Chinese nexus based on the observed tools, techniques and victimology.

These findings emphasize the critical need for organizations to prioritize proactive cybersecurity measures. Addressing known vulnerabilities, maintaining robust IT hygiene and employing vigilant threat monitoring are essential to counter adversaries like CL-STA-0048. Organizations can better protect sensitive data and defend against advanced and persistent threats by strengthening security measures and staying informed about emerging threats.

Protections and Mitigations

For Palo Alto Networks customers, our products and services provide the following coverage associated with this activity cluster:

  • Advanced WildFire cloud-delivered malware analysis service accurately identifies the PlugX and CobaltStrike samples mentioned in this article as malicious.
  • Advanced URL Filtering and Advanced DNS Security identify domains associated with this group as malicious.
  • Cortex XDR and XSIAM are designed to:
    • Prevent the execution of known malicious malware and also prevent the execution of unknown malware using Behavioral Threat Protection and machine learning based on the Local Analysis module.
    • Protect against exploitation of different vulnerabilities using the Anti-Exploitation modules as well as Behavioral Threat Protection.
    • Detect post-exploit activity, including credential-based attacks, with behavioral analytics through Cortex XDR Pro and XSIAM.
    • Detect user and credential-based threats by analyzing anomalous user activity from multiple data sources.
    • Protect from threat actors dropping and executing commands from web shells using Anti-Webshell Protection.
  • Cortex Xpanse is able to detect internet-exposed Microsoft IIS, Apache Tomcat and MSSQL Servers, among hundreds of other types of enterprise applications.

If you think you might have been impacted or have an urgent matter, get in touch with the Unit 42 Incident Response team or call:

  • North America: Toll Free: +1 (866) 486-4842 (866.4.UNIT42)
  • UK: +44.20.3743.3660
  • Europe and Middle East: +31.20.299.3130
  • Asia: +65.6983.8730
  • Japan: +81.50.1790.0200
  • Australia: +61.2.4062.7950
  • India: 00080005045107

Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance.

Indicators of Compromise

Cobalt Strike Loaders

  • 525540eac2d90c94dd3352c7dd624720ff2119082807e2670785aed77746301d
  • af0baf0a9142973a3b2a6c8813a3b4096e516188a48f7fd26ecc8299bce508e1

Cobalt Strike C2

  • sentinelones[.]com

PlugX

  • 508d6dd6c45027e3cda3d93364980f32ffc34c684a424c769954d741cf0d40d0
  • 3503d6ccb9f49e1b1cb83844d1b05ae3cf7621dfec8dc115a40abb9ec61b00bb
  • 0f85b67f0c4ca0e7a80df8567265b3fa9f44f2ad6ae09a7c9b7fac2ca24e62a8

PlugX C2

  • mail.tttseo[.]com

PotatoSuite

  • c5af6fd69b75507c1ea339940705eaf61deadd9c3573d2dec5324c61e77e6098
  • 8dfc107662f22cff20d19e0aba76fcd181657255078a78fb1be3d3a54d0c3d46

SspiUacBypass

  • 336892ff8f07e34d18344f4245406e001f1faa779b3f10fd143108d6f30ebb8a

Winos4.0-based Malware

  • 35da93d03485b07a8387e46d1ce683a81ae040e6de5bb1a411feb6492a0f8435

Winos4.0-based Malware C2

  • 154.201.68[.]57

Stowaway

  • a09179dec5788a7eee0571f2409e23df57a63c1c62e4b33f2af068351e5d9e2d
  • edc9222aece9098ad636af351dd896ffee3360e487fda658062a9722edf02185

C2 Servers

  • 43.247.135[.]106
  • 38.54.30[.]117
  • 38.54.56[.]88
  • 65.20.69[.]103
  • 52.77.234[.]115
  • 192.227.180[.]124
  • 107.174.39[.]125
  • 18.183.94[.]114
  • 206.237.0[.]49

Domains

  • h5.nasa6[.]com
  • test.nulq5r.ceye[.]io
  • web.nginxui[.]cc

Additional Resources


文章来源: https://unit42.paloaltonetworks.com/espionage-campaign-targets-south-asian-entities/
如有侵权请联系:admin#unsafe.sh