100% found this document useful (1 vote)
430 views68 pages

Double Dragon: APT41, A Dual Espionage and Cyber Crime Operation

Uploaded by

blackorbird
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
430 views68 pages

Double Dragon: APT41, A Dual Espionage and Cyber Crime Operation

Uploaded by

blackorbird
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

APT41

Double Dragon
APT41, a dual espionage and
cyber crime operation
2 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION SPECIAL REPORT | APT40 2

Table of Contents
Overview...........................................................................................4 Links to Other Known Chinese Espionage
Operators....................................................................................... 34

Targeting...........................................................................................6 Certificate Overlap............................................................. 35


Launcher Overlap............................................................... 36

Operations Over Time.................................................................8 Code Family Overlap......................................................... 36

Cyber Espionage Activity........................................................ 10 Use of Code-Signing Certificates........................................ 39

Case Study: Healthcare Sector Targeting...................12


Outlook and Implications........................................................ 41

Financially Motivated Activity.............................................. 14

Case Study: Video Game Industry Targeting.............17 Technical Annex: Attack Lifecycle...................................... 42

Initial Compromise............................................................. 43
Third-Party Access.................................................................... 20 Establish Foothold............................................................. 44
Escalate Privileges............................................................. 45

History of Supply Chain Compromises...............................21 Internal Reconnaissance.................................................. 45


Lateral Movement............................................................... 46
December 2014....................................................................22
Maintain Presence.............................................................. 47
March 2017.............................................................................23
Complete Mission............................................................... 48
July 2017................................................................................. 24
June 2018................................................................................25
July 2018................................................................................ 26 Technical Annex: MITRE ATT&CK Mapping..................... 49

Overlaps Between Espionage and Financial Technical Annex: Code-Signing Certificates Used by
Operations.....................................................................................27 APT41................................................................................................51

Attribution.................................................................................... 30 Technical Annex: Additional Malware Overlaps............52

Background............................................................................52
Status as Potential Contractors........................................... 33 HIGHNOON............................................................................52
HIGHNOON.BIN and HIGHNOON.LITE........................52
HIGHNOON.LINUX and HIGHNOON........................... 54
CROSSWALK and CROSSWALK.BIN.......................... 54

Technical Annex: Malware Used by APT41......................60

Technical Annex: APT41 IOCs............................................... 63


SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 3

Executive Summary

FireEye Threat Intelligence assesses with high confidence that APT41 is a Chinese
state-sponsored espionage group that is also conducting financially motivated activity for
personal gain.

APT41 espionage operations against the healthcare, high-tech, and telecommunications


sectors include establishing and maintaining strategic access, and through mid-2015, the
theft of intellectual property.

The group's operations against higher education, travel services, and news/media firms
provide some indication that the group also tracks individuals and conducts surveillance.

FireEye Threat Intelligence assesses with high confidence that APT41 carries out an array
of financially motivated intrusions, particularly against the video game industry, including
stealing source code and digital certificates, virtual currency manipulation, and attempting
to deploy ransomware.

APT41 has executed multiple software supply chain compromises, gaining access to
software companies to inject malicious code into legitimate files before distributing updates.
4 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Overview
FireEye Threat Intelligence assesses with high confidence that APT41 is
a prolific cyber threat group that carries out Chinese state-sponsored
espionage activity in addition to financially motivated activity potentially
outside of state control. Activity traces back to 2012 when individual
members of APT41 conducted primarily financially motivated operations
focused on the video game industry before expanding into likely state-
sponsored activity. This is remarkable because explicit financially motivated
targeting is unusual among Chinese state-sponsored threat groups, and
evidence suggests these two motivations were balanced concurrently from
2014 onward.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 5

• APT41 is unique among tracked China-based actors in • The group's distinct use of supply chain compromises to
that it leverages non-public malware typically reserved target select individuals, consistent use of compromised
for espionage operations in what appears to be activity digital certificates, and deployment of bootkits (rare
that falls outside the scope of state-sponsored missions. among APT operators), highlight a creative and well-
resourced adversary.
• Based on early observed activity, consistent behavior,
and APT41's unusual focus on the video game industry, • Some of the early operations driven by personal gain
we believe the group's cyber crime activities are most used techniques that would later be pivotal in executing
likely motivated by personal financial gain or hobbyist supply chain compromises.
interests. • Learning to access video game production environments
enabled APT41 to develop the tactics, techniques, and
This contrasts with the state-sponsored goals that likely
procedures (TTPs) that were later leveraged against
drive the group's healthcare, high-tech, and politically
software companies to inject malicious code into
related targeting.
software updates.
• We believe that APT41 is highly sophisticated and
APT41 campaigns include most of the incidents previously
innovative. Its history of financially motivated targeting
attributed in FireEye Threat Intelligence reporting to
of the video game industry has ultimately supported the
GREF Team and a number of additional clusters that were
group's state-sponsored activity.
previously unnamed.
6 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Targeting
Like other Chinese espionage operators, APT41 targets
industries in a manner generally aligned with China's
Five-Year economic development plans. However, some
campaigns attributed to APT41 indicate that the group is
also deployed to gather intelligence ahead of imminent
events, such as mergers and acquisitions (M&A) and
political events. Directly targeted verticals include:

• Healthcare: including medical devices and diagnostics


• High-tech: including semiconductors, advanced
computer hardware, battery technology, and electric
vehicles
• Media: including news organizations
• Pharmaceuticals
• Retail
• Software companies: which were compromised in
supply chain operations potentially affecting large
numbers of victims
• Telecoms
• Travel services
• Education
• Video games: including development studios,
distributors/publishers, and activities enabling supply
chain compromises
• Virtual currencies: including in-game currencies,
cryptocurrencies, and related services

APT41 has targeted organizations in 14 countries (and


Hong Kong) over seven years, including: France, India,
Italy, Japan, Myanmar, the Netherlands, Singapore, South
Korea, South Africa, Switzerland, Thailand, Turkey, the
United Kingdom, and the United States (Figure 1). APT41
espionage operations against entities in these countries
follow targeting of verticals consistent with Chinese
national policy priorities.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 7

Industries Targeted
Figure 1:
Countries and Automotive Financial Pharmaceuticals
industries targeted
directly by APT41. Business Services Healthcare Retail

Cryptocurrency High-Tech Telecommunications

Education Intergovernmental Travel

Energy Media and Entertainment


8 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Operations Over Time


The duality of APT41's state-sponsored activity and its own cyber crime
operations is demonstrated in the group's simultaneous operations. Throughout
the group’s observable history, APT41 has consistently run its own financially
motivated campaigns concurrently with espionage operations. In contrast,
APT41 espionage targeting has changed significantly over time, suggesting
shifts in assigned missions or new contracts to complete. A breakdown of
industries targeted by APT41 over time can be found in Figure 2.

• We believe that like other Chinese espionage operators, APT41 has moved
toward strategic intelligence collection and establishing access, but away from
direct intellectual property theft. This shift, however, has not affected the group's
consistent interest in targeting the video game industry for financially motivated
reasons.
–– We have not observed evidence of IP theft since late 2015.
–– In 2014, APT41 was observed carrying out espionage campaigns
concurrently with financially motivated intrusions, demonstrating that they
could balance different objectives simultaneously.
• Espionage operations occurred while the group was still carrying out
financially motivated campaigns, including longer-term intrusions, which
typically extended for more than a year.
–– In one instance, APT41 was attempting to steal data from a healthcare target
while also attempting to deploy ransomware at a video game studio.
• Compromising organizations in different sectors concurrently provides some
indication that they are fulfilling specific assigned tasks.
–– Campaigns have expanded into additional industries including telecoms,
the automotive sector, higher education, and travel services.
–– In 2015, we observed a time period in which eight organizations in six
different industries were compromised simultaneously.
• Since 2017, APT41's activities have included a series of supply chain
compromises. The operation injects malware into legitimate server software
packages used by hundreds of companies worldwide but limits deployment
of additional payloads to select targets.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 9

Figure 2: Timeline
of industries
targeted by APT41.

INDUSTRIES TARGETED BY APT 41


2012 2013 2014 2015 2016 2017 2018 2019

Video Game Video Game Video Game Video Game Video Game Retail Video Game Education

Video Game Video Game Video Game Video Game Telecom Telecom Telecom
Related Related Related Related

Hi-Tech Hi-Tech Hi-Tech Hi-Tech Hi-Tech Finance Hi-Tech

Intergovernmental Media Media Media Travel

Healthcare Healthcare Healthcare Automotive Healthcare

Pharmaceutical Energy Software Software


10 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Cyber Espionage Activity


Observed APT41 targeting is consistent with China's • Since 2017, APT41 has consistently targeted
national strategies to move production capabilities telecommunications companies, possibly a crucial first
upmarket into research and development (R&D)-heavy step to establish a foothold in targeting a particular region.
fields. These initiatives were especially highlighted with –– Targeted telecom companies spanned several
"Made in China 2025," a plan announced in 2015 that aims countries, and recently identified intrusions were
to shift China's economy toward higher value products concentrated in countries where we had not identified
and services, including pharmaceuticals, semiconductors, any prior APT41 activity.
and other high-tech industries.
–– APT41 has targeted large telecom companies and
• We assess that the targeting of high-tech firms that their subsidiaries in various locations, demonstrating
produce computer components aligns with Chinese consistent interest in obtaining access to these
interests in domestically developing high-end targets.
technologies as outlined in the 12th (2011) and 13th –– The group has also repeatedly targeted call record
(2016) Five-Year plans, as well as the Made in China information at telecom companies, supporting
2025 (2015) initiative. indications of their wider intelligence collection efforts.
–– Since 2013, APT41 has targeted organizations involved
in the research, development, and sale of computer In addition to specifically targeting industries of
components used for machine-learning, autonomous strategic value, we suggest that APT41 is also given
vehicles, medical imaging, and the consumer market. more tactical assignments, including reconnaissance and
The group also targeted companies involved in identifying dissidents.
producing motherboards, processors, and server
• A hotel was targeted two weeks ahead of a diplomatic
solutions for enterprises.
visit in which high-ranking Chinese officials stayed
–– In April 2013, the group targeted an enterprise there. Personal data within the reservations system was
cloud-computing provider. Developing domestic directly accessed, suggesting the group was potentially
cloud-computing technologies was a goal in the 12th tasked to reconnoiter the facility.
Five-Year Plan.
• We assess with moderate confidence that APT41
–– In a 2014 compromise, APT41 targeted a European gathered intelligence on pro-democracy dissidents
conglomerate and specifically focused on systems in Hong Kong based on the targets and timing of
physically located in China. operations.
• The timing of multiple intrusions attributed to the group –– In July and August 2016, APT41 sent spear-phishing
indicate a focused interest in strategic business decisions, emails to Hong Kong media organizations known for
including entry into the Chinese market, partnerships/ pro-democracy editorial content.
M&A, and expansion into other regional markets.
–– The timing and targeting of this activity suggests
–– In October 2017, an intrusion into a retailer targeted possible interest in the pro-democracy Umbrella
strategic investment plans at the same time as the Movement candidates who were running for seats in
firm was beginning to negotiate a partnership with a Hong Kong's legislative council.
Chinese company (although this potential deal was
–– A spear-phishing email with the subject-line "help"
not publicized).
was later sent to one of the previously targeted
–– In spring 2015, APT41 targeted information related organizations in October 2017, coinciding with the
to two entities undergoing a merger announced the sentencing of pro-democracy Occupy activists. The
previous year. This included data related to a senior ruling placed a five-year ban on the activists from
executive, as well as payroll and communications holding public offices in Hong Kong.
integration issues.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 11

–– This was the first instance we have observed of APT41 • In 2015, APT41 targeted a Japanese media organization
targeting pro-democracy groups in Hong Kong. with a lure document (Figure 3) titled “中東呼吸器症候
群(MERS)の予防,” which translates to "Prevention of
APT41 frequently leverages timely news stories as the
Middle East Respiratory Syndrome (MERS)." The fear of
lure content in their spear-phishing emails, although
respiratory infections and a potential pandemic provide
social engineering content does not always correlate with
particularly effective lure material against targets in the
targeted users or organizations.
Asia-Pacific region that had first-hand experience with
prior SARS and avian flu outbreaks.

Figure 3:
MERS-themed lure document leveraging for C&C (MD5: 5e87b09f9a3f1b728c9797560a38764b).
12 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

CASE STUDY

Healthcare Sector Targeting

APT41 activity aimed at medical device companies


and pharmaceuticals is demonstrative of the group's
capacity to collect sensitive and highly valuable
intellectual property (IP), although we have not observed
evidence of IP theft since late 2015. The healthcare
sector was targeted in a manner that is highly specific
and most likely indicative of focused taskings from
sponsoring organizations with a stake in the healthcare
market. Targeted information included pharmaceutical
development, clinical trial data, and intelligence
regarding a medical subsidiary's parent company.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 13

The targeting of these organizations just ahead of the –– A keylogger dubbed GEARSHIFT was first deployed at
release of products requiring a long R&D cycle can confer the medical device company. A digital certificate from
a significant market advantage to a competitor. The the victim was compromised and used to sign malware
observed activities are indicative of ongoing efforts to used in an operation against a separate biotech
support China's own R&D efforts in support of Made in company detailed below.
China 2025. • A biotech company undergoing acquisition was
targeted by APT41 in May 2015. Highly sensitive
• Between July 2014 and May 2016, APT41 targeted a
information about corporate operations, including
medical devices subsidiary of a large corporation.
human resources data, tax information, and acquisition-
–– Although APT41 initially targeted the parent company, related documents, were targeted.
30 percent of the victimized hosts were related to
–– Clinical trials data of developed drugs, academic data,
a subsidiary specialized in manufacturing medical
and R&D funding-related documents were exfiltrated.
devices. Password strings and spoofed domains
leveraged in the operation signify a narrow tasking –– The time frame, use of the same GEARSHIFT sample,
to target the subsidiary instead of the parent and a digital certificate from the aforementioned
corporation. medical device company provide some indication that
these two campaigns were conducted by the same
–– We have some indication based on the nature of hosts
operator concurrently.
targeted that APT41 was interested in information
technology employees and software used by the • In 2018, we observed APT41 target a third healthcare
medical device subsidiary. company, although their goals during this compromise
were unclear.
14 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Financially Motivated Activity


Unlike other observed Chinese espionage operators, APT41 conducts explicit
financially motivated activity, which has included the use of tools that are
otherwise exclusively used in campaigns supporting state interests. The late-
night to early morning activity of APT41's financially motivated operations
suggests that the group primarily conducts these activities outside of their
normal day jobs. However, the group compiled malware for use in cyber crime
activity even during espionage-focused working hours.

• As demonstrated in Figure 4, operational times for APT41 espionage


operations over all observed activity are relatively close to Chinese work hours
(in UTC +8, China's time zone).
• In contrast, the group's financially motivated activity targeting the video game
industry tends to occur much later in the night.

Operational times at gaming targets are most frequent between 18:00 and
07:00 (UTC +8), providing some indication that the group is moonlighting. Note
that this is based on data collected over years and does not represent a daily
schedule.

• The typical working hours in China for tech workers is a "996" work schedule
(9:00 a.m. to 9:00 p.m., six days a week), which is consistent with APT41's
operational activity observed over time.
• Operational times at targets not related to video games (and therefore, almost
certainly in support of state-sanctioned missions) are more frequent between
14:00 and 22:00 (China Standard Time (CST), UTC +8), closer to conventional
working hours (Figure 4).
• Analysis of compile times for all portable executable (PE) files suggests that
APT41's average working hours fall between 10:00 to 23:00 (UTC +8),
highlighting that the financially motivated activity is most likely extraneous
to their espionage operations.
• Compile times for samples used in suspected financial gain missions are skewed
toward later in the evening, roughly 19:00 to 00:00 (UTC +8). However, there
is significant overlap with the compile times of PE files deployed at espionage
targets between 15:00 to 19:00 (UTC +8).
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 15

APT41 Operational Times UTC +8


Figure 4:
Operational
activity for gaming
versus non-
gaming-related
targeting based
on observed
operations since
2012.

Operational Times at
Gaming Targets

Operational Times at
Non-Gaming Targets
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

The group has also targeted cryptocurrencies, including at Giardino, which is likely a reference to an employee at
least one case in which there was a connection between Valve, an American video game developer responsible
cryptocurrency and an online video gaming platform. for the software distribution platform Steam and
various video games. The body of the email (Figure 6)
• In June 2018, APT41 sent spear-phishing emails using an also mentions gaming offerings. This provides another
invitation lure to join a decentralized gaming platform connection between the targeting of the cryptocurrency
linked to a cryptocurrency service (Figure 5) that had organizations and video game targeting.
positioned itself as a medium of exchange for online
• In October 2018, the group compiled an instance
games and gambling sites. The malicious emails were
of XMRig, a Monero cryptocurrency mining tool,
sent from an email address listed with the name Tom
demonstrating a continued interest in cryptocurrency.
16 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Figure 5:
Screenshot of
invitation to join
the FairWin online
gaming platform.

From: Tom Giardino < >


Figure 6: Date: <redacted>
Subject: Project (FairWin) online application!
English translation
of invitation to join Project Introduction:
the FairWin online FairWin is a decentralized online gaming platform.
gaming platform.
Be sure to win fairness because our special FairChannel guarantees accurate RTP rates.
The system is based on a blockchain, which means that the gameplay process is open. The
payment of the bonus is automatic. Not dependent on the organizer. In addition to this, we
also offer fun generous games with fascinating graphics. It can be run on any device and any
browser so that all players can enjoy these experiences.
Please refer to the attachment for other details!
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 17

CASE STUDY

Video Game Industry Targeting

APT41 continuously returns to targeting the video game


sector and seems to have matured its campaigns through
lessons learned in operations against the industry. We
believe these operations include broadly malicious
activity that can enable further operations, such as
targeting game source code and compromising digital
certificates, while other activities are explicitly financially
motivated, such as abusing in-game currency mechanics.
APT41 campaigns focused on the video game sector
have largely affected studios and distributors in East and
Southeast Asia, although global companies based in the
United States have also been targeted.
18 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

The group leverages many TTPs during the targeting • We have also observed APT41 limitedly deploy rootkits
of video game-related organizations, which are likewise on Linux systems and Master Boot Record (MBR)
employed in their espionage operations. bootkits, such as ROCKBOOT, on Windows systems to
hide their malware and maintain persistence on victim
• Since at least 2012, APT41 has repeatedly gained access systems. Selective deployment of ROCKBOOT suggests
to game development environments within affected that APT41 reserves more advanced TTPs and malware
companies, including online multiplayer networks, as only for high-value targets.
well as targeting of production database administrators.
–– Bootkits are a stealthy means of installing malware
–– The group is competent in both Linux and Windows because the code resides outside of the OS. Because
environments and can pivot easily between bootkits are initialized prior to the OS and operate in
both environments within a single operation, kernel mode, OS applications and security tools may
including compromising intermediary servers that have great difficulty detecting bootkits.
provide access to separated Windows and Linux
–– The use of bootkits among threat actors, however,
environments.
is rare. It is more common for threat actors to rely
–– In October 2012, APT41 used captured credentials to on techniques such as DLL search order hijacking
compromise a jump server and access a production or modifying Windows registry keys to achieve
environment where they deployed a Linux version of persistence.
PHOTO. Based on the machines targeted, we have
–– The group used the Adore-NG rootkit on older Linux
some indication that APT41 specifically sought to
operating systems to hide their Linux backdoor
access production machines used in the development
ADORE.XSEC. Note that the Adore-ng rootkit is
of an upcoming online game.
no longer in development and would likely not run
–– In 2014, APT41 used a variant of SOGU that is capable successfully on modern Linux systems, but APT41
of connecting to Windows and Linux systems via SSH deployed this on a legacy game server.
and Samba/CIFS.
APT41 is well-known for leveraging compromised digital
–– APT41 has been observed inserting malicious code certificates from video game studios to sign malware. The
into legitimate video game files to distribute malware. group has abused at least 19 different certificates in this
In 2018, the group inserted CRACKSHOT malware into way. Additional details on code-signing certificates are
game files that were signed with legitimate code- provided in the section "Use of Code Signing Certificates."
signing certificates, most likely indicating access
to the production environment, which facilitated a • In 2012, APT41 used a code-signing certificate from
supply chain compromise. Mgame, a South Korean game publisher, against other
gaming industry entities. The serial number for this
§§ A highly similar incident in 2014 suggests that
certificate was:
APT41 (or a closely affiliated actor) has a history
of carrying out such operations against the video
01:00:00:00:00:01:30:73:85:f7:02
game industry.
–– APT41's experience gaining access to production
environments may have been a precursor to more
recent supply chain compromises. The insertion of
malware into a build environment for later distribution
with legitimate software is a natural extension of
the group's earliest activities. Additional details are
provided in the section "History of Supply Chain
Compromises."
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 19

• A different Mgame digital certificate has been used ransomware. We suggest that APT41 sought to target
by several other Chinese operators, including APT17, in-game currency but found they could not monetize
APT20, and APT31. It is unclear if this certificate the specific targeted game, so the group resorted to
was compromised at the same time as the one used ransomware to attempt to salvage their efforts and
by APT41 (or if it was stolen by APT41 and shared profit from the compromise.
with these other groups). The serial number for this –– This ransomware was sold via a Ransomware-as-
certificate was: a-Service (RaaS) operation that was available via a
Tor (.onion) website. Users of the ransomware were
4e:eb:08:05:55:f1:ab:f7:09:bb:a9:ca:e3:2f:13:cd charged a 20 percent fee for any collected ransom.
–– Since this was not the group's typical method
APT41 has blatantly engaged in financially motivated of choice for collecting money from a victim
activity targeting the video game industry, including environment, it is possible that APT41 turned to a pay-
manipulating virtual currencies. These activities for-service ransomware to avoid having to develop
demonstrate established connections to underground such a tool or set up the associated payment and
marketplaces and familiarity with monetization and infrastructure associated with collecting the ransom.
laundering techniques.
–– APT41 attempted to deploy the ransomware through
• Using its access to a game production environment, in a group policy (GPO) scheduled task. However, the
less than three hours the group generated tens of millions malware was unsuccessfully deployed because of a
of dollars of a popular game's virtual currency. The simple typo.
money was credited to more than 1,000 accounts and –– Figure 7 shows the ransom note associated with
most likely sold and laundered in underground markets. Encryptor RaaS, which contains default messages in
• APT41 has targeted payment services specializing in both English and German (the instruction links have
handling in-game transactions and real money transfer been redacted). Given that this is the default message,
(RMT) purchases. the languages in the note should not be considered
when determining actor origin or location.
• In a highly unusual case, APT41 attempted to extort
a game company by deploying the Encryptor RaaS

ATTENTION!
Figure 7: The files on your computer have been securely encrypted.
Screenshot of To get access to your files again, follow the instructions at:
ransomware note.

ACHTUNG!
Die Dateien auf Ihrem Computer wurden ischer verschluesselt.
Um den Zugriff auf Ihre Dateien wiederzuerlangen, folgen Sie der Anleitung auf:
20 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Third-Party Access
In multiple instances, APT41 targeted third parties and leveraged this access to
target additional victims. APT41's exploitation of third parties varied. In some
instances, APT41 moved laterally from one victim environment to another in
order to initiate compromise. APT41 has also used credentials compromised in
previous operations.

• In 2014, APT41 compromised an online billing/payment service using VPN


access between a third-party service provider and the targeted payment
service. The payment service was likely targeted because it provided access
to multiple gaming companies.
• Although we do not have first-hand evidence of APT41's compromise of
TeamViewer, we have observed APT41 use compromised TeamViewer
credentials as an entry point at multiple organizations.
–– During a 2017 compromise, APT41 initiated a TeamViewer session and
transferred files that were later deleted. Filenames and creation times
indicate that these may have been the HIGHNOON backdoor.
–– According to statements by a TeamViewer's spokesperson, the company
was targeted in fall 2016. The company stated that they conducted a
comprehensive security audit of its IT architecture and added additional
security measures to help strengthen its security posture.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 21

History of Supply Chain


Compromises
Supply chain compromises are most likely an extension Although APT41 supply chain compromises affect very
of APT41's tactics used in gaining access to gaming large numbers of victims, the group limits follow-on
development environments and to other gaming activity to select victims most likely to reduce detection
organizations via third-party service providers. Public and ensure any additional malware is delivered only
reports of supply chain compromises linked to APT41 date to intended victims. Counterintuitively, supply chain
back to at least 2014, and technical evidence associated operations add an additional layer of obscurity to the
with these incidents was used to determine a relationship, group's operations because it is difficult to pinpoint the
if any, with APT41. Our assessment in each of these cases desired target set.
is noted in Table 1.
• In a June 2018 supply chain compromise, APT41
• As demonstrated in operations targeting the video leveraged MAC addresses and C:\ drive volume serial
game industry, APT41 leverages a variety of TTPs to numbers to identify specifically targeted victims for
access production environments where they can inject follow-on activity. This significantly obfuscates the
malicious code into legitimate files. The files are signed targeted sector or victim set; in a typical spear-phishing
with valid code-signing certificates and distributed campaign, for example, desired targeting can be
widely to end users. discerned based on recipients' email addresses.
• Supply chain targeting requires more effort than
typically observed mass targeting methods, such as
establishing a strategic web compromise (SWC) or
conducting large spear-phishing campaigns.

Table 1. Supply chain compromises.

Date Compromised Entities FireEye Attribution Assessment

Online games distributed by a Southeast


Asian video game distributor
December 2014 • Path of Exile Possibly APT41 or a close affiliate
• League of Legends
• FIFA Online 3
March 2017 CCleaner Utility Unconfirmed APT41
July 2017 Netsarang software packages (aka ShadowPad) Confirmed APT41
Stage 1 unconfirmed APT41
June 2018 - November 2018 ASUS Live Update utility (aka ShadowHammer)
Reported Stage 2 confirmed APT41
Southeast Asian video game distributor
July 2018 Infestation Confirmed APT41
PointBlank
22 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

December 2014

In December 2014, installers for three online games • Use of the same malware families (HIGHNOON.BIN,
published by a Southeast Asian video game distributor HIGHNOON.LITE, EASYNIGHT, FRONTWHEEL)
were injected with the SOGU backdoor. The installer for • Use of HIGHNOON.BIN samples with the same
these popular games was replaced by a malicious file compile times
that dropped the SOGU backdoor along with the normal
game installer. • Overlap in domain resolution to the same IP netblock
(61.38.186.0/24) during the same time frame in 2012
• The video game distributor operates servers in East • Video game-related supply chain targeting
and Southeast Asia for some of the most popular
online games, including the three games that were Despite these compelling overlaps, the actors responsible
compromised: Path of Exile, League of Legends, and for this compromise leverage additional unique tools not
FIFA Online 3 (Table 2). observed with APT41 or any other Chinese espionage
We have observed many similarities between TTPs group, suggesting that they are either part of APT41 and
involved in this compromise and APT41, including: maintain their own toolset, or a close affiliate of APT41 that
shares both tools and taskings.
• Targeting the same victim organization 31 days apart
• Use of code-signing certificates from the same video
game-related issuer organizations

Table 2. 2014 compromised games.

Game File MD5 Malware C&C


SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 23

March 2017

In March 2017, suspected Chinese espionage operators algorithms (DGA) for C&C, use of dead drop resolvers
targeted CCleaner, a utility that assists in the removal of (DDR), and use of shellcode as primary payloads.
unwanted files from a computer. According to the parent However, FireEye malware analysis of the compromised
company, Avast, the infected CCleaner was downloaded CCleaner samples and associated COLDJAVA samples
by 2.27 million customers. While we have identified some did not reveal shared code with the POISONPLUG and
overlaps between the CCleaner activity and APT41, we do POISONPLUG.SHADOW malware samples used in
not have enough information to attribute the CCleaner similar supply chain incidents by APT41.
compromise to APT41 at this time. –– DIRTCLEANER uses DGA to generate new C&C
domains each month. This is similar to first-stage
• Both APT41 and the actors in the CCleaner incident
malware used in the Netsarang compromise described
used TeamViewer during initial compromise. According
below.
to Avast, the actors used TeamViewer to compromise a
developer workstation and used VBScript (x64.vbs) to –– The BLACKCOFFEE sample reaches out to actor-
drop a malicious payload. controlled profiles hosted on legitimate websites to
retrieve encoded commands for C&C, a technique
• The compromised CCleaner update (which we call
known as DDR. The malware parses the content of
DIRTCLEANER) is believed to download a second-stage
the websites (listed in Table 3), looking for 12 bytes
loader (MD5: 748aa5fcfa2af451c76039faf6a8684d) that
contained between the tags: "BSM1cr0S0ft" and
contains a 32-bit and 64-bit COLDJAVA DLL payload.
"SBM1cr0Soft." APT41 POISONPLUG samples have
The COLDJAVA payload contains shellcode that loads a
also used DDR for C&C.
variant of BLACKCOFFEE (Figure 8).
–– The POISONPLUG and POISONPLUG.SHADOW
–– While COLDJAVA has been used by APT41,
samples in similar supply chain incidents use a
BLACKCOFFEE has been used by other Chinese
shellcode format that resembles PE files, while the
cyber espionage groups, including APT17 and APT40.
BLACKCOFFEE backdoor that was delivered in the
It is possible that COLDJAVA may also be shared
CCleaner compromise uses a traditional PIC blob.
between distinct cyber espionage operators.
Additionally, there is apparent code reuse between
• Malware samples identified in the CCleaner incident observed POISONPLUG and POISONPLUG samples
included notable shared design decisions observed in not observed in the CCleaner samples.
APT41 malware, including the use of domain generation

Table 3. BLACKCOFFEE DDR websites.


Figure 8: Malware
downloaded by File MD5 Legitimate DDR Websites Used for C&C
DIRTCLEANER.

3ca2a13f646690481
dc15d78bac6d829

DIRTCLEANER COLDJAVA BLACKCOFFEE


24 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

July 2017

In July 2017, APT41 injected malicious code into a software –– Alternatively, it is also possible that APT41 injected
update package maintained by Netsarang and signed it malicious code into the package prior to compilation,
with a legitimate Netsarang certificate in an operation circumventing the need to steal the code-signing
referred to as "ShadowPad" by Kaspersky. The software certificate and compile it on their own.
package is reportedly used by hundreds of companies • The first stage of the malware uses DGA, which changes
worldwide. its C&C servers monthly. The use of shifting network
infrastructure is most likely intended to add operational
• We observed numerous opportunistic infections
robustness and to reduce detection.
associated with POISONPLUG.SHADOW spanning 13
countries and a variety of industries, demonstrating the • The second-stage shellcode is initialized only after it
broad impact of this operation. However, we have not is activated using a decryption key retrieved from the
observed the associated second-stage at any victim first-stage DNS communications. This likely allows
organizations. Open-source reporting indicated one APT41 to selectively activate the payload on specific
victim was identified in Hong Kong. victim systems. The second-stage payload contains the
default C&C server, notped.com, which overlaps with
• Signing the malicious update with a legitimate
other APT41 C&C infrastructure. Other reported APT41
NetSarang certificate is consistent with APT41's pattern
domains that may also be related to the second-stage
of using legitimate certificates. In this case, all updates
payload can be found in Table 4.
were required to be signed by Netsarang, which means
APT41 had to use the code-signing certificate to subvert
the update mechanism.

Table 4. Reported APT41 domains associated with POISONPLUG.SHADOW.

Domain Associated Malware Family


SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 25

June 2018

In June 2018, a utility used to update ASUS sequence of events, we confirm the reported stage-
computers was compromised in an operation dubbed two POISONPLUG backdoor is attributed to APT41,
"ShadowHammer" by Kaspersky. Open-source contained several gaming references, and was likely
reporting indicated that more than 50,000 systems used to target the gaming industry.
installed the malicious update, yet the malware was • The POISONPLUG sample (MD5:
only designed to execute and retrieve second-stage 37e100dd8b2ad8b301b130c2bca3f1ea) attempts to
malware on a designated list of approximately 600 connect to a Google document that was created under
systems, demonstrating this was a targeted campaign. the same name and email address (Tom Giardino and
Public reporting on the incident noted that many of the ) that was used to target the
targeted MAC addresses were associated with wireless cryptocurrency organization. It also attempts to connect
adapters from various vendors, partially indicating the to a Steam community page (Table 5).
operation's targeting strategy.
• The POISONPLUG payload uses DDR and parses the
• Although we have limited visibility into the intended Google document for a C&C command. The Steam
targets of this operation, we observed one of the community page is likely used as a fallback mechanism.
whitelisted MAC addresses on a system at a telecom • FireEye malware analysis of the POISONPLUG sample
company. indicates the malware is likely designed to run only
• Kaspersky's analysis of the infected machines revealed one system with a C: drive volume serial number of
that a POISONPLUG backdoor was installed as a result 0xc25cff4c.
of the malicious update. While we have been unable to • Additional POISONPLUG samples located in Table 6 also
attribute the DAYJOB malware used in the incident to leverage Google Document and Steam Community Pages
APT41 due to an inability to independently confirm this for C&C.

Table 5. "ShadowHammer" stage-two POISONPLUG sample.

File MD5 C&C Domain

37e100dd8b2ad8b301b130c2bca3f1ea

Table 6. POISONPLUG samples leveraging dead drop resolving.

File MD5 C&C Domain

557ff68798c71652db8a85596a4bab72

ff8d92dfbcda572ef97c142017eec658

b0877494d36fab1f9f4219c3defbfb19

ffd0f34739c1568797891b9961111464
26 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

July 2018

Beginning in July 2018, APT41 appeared to have directly • APT41 used a C&C domain that masquerades as
targeted several East and Southeast Asia-based video Xigncode, , in the
game developers and distributors to inject legitimate compromise of the video game PointBlank. Ironically,
executables with the CRACKSHOT backdoor. Xigncode is a service intended to prevent hacking and
cheating in online games.
• Like other high-profile supply chain compromises
attributed to APT41, these incidents included the • We attribute these compromises (also reported by both
ESET and Kaspersky) to APT41 based on the unique
incorporation of malicious code into legitimate
use of the CRACKSHOT backdoor and tactics consistent
executables and the signing of these files using
with APT41 operations. A list of related indicators is in
legitimate digital certificates from the same
Table 7.
compromised organization.

Table 7. Video games industry targeting in July 2018.

Targeted Game / Platform MD5 Hashes Malware C&C Domain

Southeast Asian video game platform 04fb0ccf3ef309b1cd587f609ab0e81e CRACKSHOT


Infestation game fcfab508663d9ce519b51f767e902806 CRACKSHOT
0b2e07205245697a749e422238f9f785
PointBlank game 272537bbd2a8e2a2c3938dc31f0d2461 CRACKSHOT
dd792f9185860e1464b4346254b2101b
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 27

Overlaps Between Espionage


and Financial Operations
Identified overlaps across various incidents attributed –– The lure used to target the cryptocurrency exchange
to APT41 demonstrate the group's dual nature. Figure (displayed in Figure 5 and translated in Figure 6)
9 and Figure 10 illustrate crossover between espionage referenced an online gaming platform, tying the
and financially motivated activity, as well as technical cryptocurrency targeting to APT41's focus on video
similarities in tools used across both types of operations. game-related targeting.
–– As depicted in Figure 10, hrsimon59@gmail.
• The email address was used to
com was used to create a Google document
send spear-phishing emails to a Taiwanese newspaper
being used as a POISONPLUG (MD5:
with the subject lure "I have a little surprise for you :)" in
37e100dd8b2ad8b301b130c2bca3f1ea) C&C. As
an espionage campaign in August 2016 (Figure 9).
previously mentioned, this sample also connected
• The same email address was later used to target a to a Steam page.
cryptocurrency exchange in June 2018, demonstrating
email reuse between espionage operations and
financially motivated activity.

Figure 9:
Email overlaps
between
espionage and
financial activity.

AUGUST 2016 JUNE 2018

Cyber Espionage Probable Financial Motivation

Phishing email to Taiwanese newspaper Phishing email to European


Subject: I have a little surprise for you :) bitcoin exchange
 Subject: 项目 (FairWin) 上线申请!
Invitation to join a decentralized
gambling platform

ATTACHMENT ATTACHMENT
Documents.7z FairWin.chm
8c6cceae2eea92deb6f7632f949293f0 223e4cc4cf5ce049f300671697a17a01
28 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

ASUS SUPPLY CHAIN


(AKA “SHADOWHAMMER”)
Figure 10:
JUNE–NOV 2018
Malware
overlaps across
DAYJOB
supply chain Trojanized ASUS Update Utility
compromises. 0f49621b06f2cdaac8850c6e9581a594

>50K
victims

COMPROMISE OF A NETSARANG SUPPLY CHAIN


U.S. COMPANY (AKA “SHADOWPAD”)

MAY 2016 JULY 2017

POISONPLUG POISONPLUG.SHADOW POISONPLUG


Stage 1 Loader Trojanized Sotware Package 37e100dd8b2ad8b301b130c2bca3f1ea
830a09ff05eac9a5f42897ba5176a36a (DLL Loader)
97363d50a279492fda14cbab53429e75

100s
of victims
Compromise of a
U.S. Video Game Company
SH

Identified at
AR

D Stage 1
E

CO
D E shellcode loader
a6c7db170bc7a4ee2cdb192247b59cd6
1
Telecom
Victim

Stage 2
shellcode loader
72584d6b7dd10c82d9118567b548b2b1

C&C C&C

STAGE 2
activated at

1
unknown
victim in
Hong Kong

Speculated Connection

Confirmed Connection

Unconfirmed

Confirmed

Video Game Related

Google Document Author


SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 29

seg000:00010246 movzx edi, byte ptr [eax]


Figure 11: seg000:00010249 ror esi, 8
seg000:0001024C or edi, 20h
POISONPLUG
seg000:0001024F add esi, edi
API hashing (MD5:
830a09ff05eac9a5
seg000:00010251 add eax, 2
f42897ba5176a36a). seg000:00010254 xor esi, 7C35D9A3H
seg000:0001025A cmp [eax], dx
seg000:0001025D jnz short loc_10246
seg000:0001025F cmp esi, 0FD5B1261h

g000:0000F55C 0F B6 0E movzx ecx, byte ptr [esi]


Figure 12: g000:0000F55F 8B 45 F4 mov eax, [ebp-0Ch]
POISONPLUG.
g000:0000F562 C1 C8 08 ror eax, 8
SHADOW API g000:0000F565 83 C9 20 or ecx, 20h
hashing (MD5: g000:0000F568 03 C1 add eax, ecx
a6c7db170bc7a4 g000:0000F56A 35 A3 D9 35 7C xor eax, 7C35D9A3H
ee2cdb192247b5 g000:0000F56F 83 C6 02 add esi, 2
9cd6). g000:0000F572 89 45 F4 mov [ebp-0Ch], eax
g000:0000F575 66 39 3E cmp [esi], di
g000:0000F578 75 DD jnz short loc_F557
g000:0000F57A 3D 61 12 5B FD cmp eax, 0FD5B1261h

• FireEye malware analysis identified source code overlaps § Both loaders use the same API hashing algorithm
between malware used by APT41 in May 2016 targeting to resolve routines from system libraries (Figure
of a U.S.-based game development studio and the 11 and Figure 12). The routine uses byte-wise
malware observed in supply chain compromises in 2017 operations to compute a hash, including byte-wise
and 2018. rotate-right by eight bytes, byte-wise binary, OR
with 0x2, and byte-wise XOR using the four-byte
–– In May 2016, APT41 deployed a POISONPLUG
key 0x7C35D9A3. Using this routine, the hash for
sample at a U.S.-based game development studio.
The stage-one loader for this sample (MD5: kernel32.dll, a common DLL provided by Microsoft
Windows, is 0xFD5B1261.
830a09ff05eac9a5f42897ba5176a36a) shares code
overlaps with the stage-one shellcode loader (MD5: • FireEye analysis of a separate POISONPLUG payload
a6c7db170bc7a4ee2cdb192247b59cd6) used in the (MD5: c8403fabda4d036a55d0353520e765c9)
Netsarang compromise, first reported by Kaspersky compiled in July 2017 and the POISONPLUG.
as ShadowPad. These connections, illustrated in SHADOW stage-two shellcode loader (MD5:
Figure 10, led us to identify the malware used in the 72584d6b7dd10c82d9118567b548b2b1) identified
Netsarang incident as a variant of POISONPLUG multiple additional plug-in similarities.
(therefore: POISONPLUG.SHADOW). –– Core plug-in IDs between the samples are the same,
–– The POISONPLUG and POISONPLUG.SHADOW including 100, 101, 102, 103, 104, and 201.
variants share the observed commonalities: –– Core plug-in names are the same including Plugins,
§ The entrypoint functions for both loaders use the Online, Config, Install, and HTTP.
same instructions, constants, and structures to pass –– C&C plug-in IDs and names between both samples
control to loading routines. are the same, including 200/TCP, 201/HTTP, 202/UDP,
§ The layout of functions and data within the 203/DNS, 204/HTTPS, and 205/SSL.
loaders are the same; for example, following the –– Both samples parse the C&C response by searching
entrypoint, both loaders contain an unusual region for "$" characters and decoding the result.
of structured data 0x60 bytes long.
30 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Attribution
We assess with high confidence that APT41 is attributable ––
to Chinese individuals who are working on behalf of the ––
Chinese state in conducting cyber espionage operations,
and that these actors are also running financially ––
motivated campaigns for personal gain. ––

Two identified personas using the monikers "Zhang ––


Xuguang" and "Wolfzhi" linked to APT41's operations • Examples of domains registered to known aliases (some
have also been identified in Chinese-language forums. of these may have since been re-registered legitimately):
Attribution to these individuals is backed by identified
––
persona information, the previous work of these
individuals, their apparent expertise in programming skills,
and their targeting of Chinese market-specific games.
It is uncertain how many other individuals may also be

associated with APT41.

• Multiple domains leveraged by early APT41 activity

were registered by emails and names associated with
both Zhang Xuguang and Wolfzhi (or their alternative
monikers). Registrant information also included
references to Beijing and Chinese phone numbers (+86
country code).


Zhang Xuguang (张旭光) registered more than a dozen
domains masquerading as video games or companies ––
with trusted relationships with video game developers/
distributors. Long-running activity provides a catalog of
Zhang's efforts to improve his skills and expertise over time. In 2005, Zhang posted personal information on “华夏黑
客同盟” (Chinese Hackers Alliance), a popular Chinese
• Additional names include: kbkxlp, akbkxlp, injuriesa, online forum, that listed his date of birth as 1989, that he
ravinder10, Addison Lau, and addison jack previously lived in Inner Mongolia, and that he specialized
• Associated email addresses: in script hacking (Figure 13). Zhang's profile indicated
he was 16, going on 17, and he was applying to be the
–– administrator of a script hacking forum.
––
• Spoofed domains most likely targeted players of games
–– such as "Age of Wuxia," a massively multiplayer online
–– role-playing game (MMORPG) themed on cultural
references to dynastic China. Zhang Xugang's interest
––
in these games is also apparent in his registration and
–– posting on a forum dedicated to the Age of Wuxia
–– (Figure 14).
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 31

Figure 13:
Screenshot of
Zhang's profile,
with "Zhang
Xuguang"
highlighted in
orange.

Figure 14:
Zhang posting
to Age of Wuxia
forum, with his
alias "injuriesa"
highlighted in
yellow.
32 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Wolfzhi is linked to a 2017 profile on a data science • Examples of domains registered under the wolf_zhi alias:
community page, which indicated that he had 10 years ––
working experience at the time of the posting, with
significant experience in Oracle and Python. Other ––
documents linked to his email accounts also highlight his ––
programming skills and database experience.
• Posts in a forum provide some indication he is from
• Additional aliases include: wolf_zhi, wolfjiao, jiaozhiq, Beijing or Hebei, the surrounding Chinese province. This
and jiaozhiqiang is also consistent with information found in early domain
registrations created by Wolfzhi (Figure 15).

Domain:
Figure 15:
Domain Registrant
registration by Wolfzhi
Wolfzhi. Wolfzhi ( )
beijingxxxdaxia
beijing
beijing, 100000
US
Tel. +86.2011111111

Creation Date: 2011-08-23 15:23:29


Expiration Date: 2011-08-23 15:23:29

Additional indicators of Chinese attribution include: the • Compiled HTML (.chm) files used in targeting contained
reliance on malware used exclusively by Chinese espionage a language code set to "Chinese (Simplified)" despite
operators, the use of Chinese-language strings, time zone the lure content being in the target region's language
and operational time analysis, and targeting consistent (English or otherwise).
with Beijing's interests. • Compile and operational times of APT41 activity
suggest the bulk of the group's work hours, 10:00
• The use of tools leveraged only by several other
and 23:00 (UTC +8), are consistent with the Chinese
Chinese operators such as HOMEUNIX and HIGHNOON
workday, especially for tech sector employees on a "996
provides some indication that APT41 relies on the similar
schedule."
resources and support as these other Chinese groups.
APT41 also leverages PHOTO (aka "Derusbi") and SOGU –– Figure 4 shows a breakdown of all of the operational
(aka "Destroy RAT" and "PlugX"), tools shared much activity within victim environments, separated
more widely among Chinese espionage groups. See the between gaming and espionage (non-gaming)
section "Links to Other Known Chinese Operators" for activity. Analysis of the times where APT41 modified
more details. or accessed a file within a victim environment, shows
a concentration between 10:00 and 18:00 (UTC+8).
• An APT41 HIGHNOON sample (MD5:
36711896cfeb67f599305b590f195aec) from 2012 • Targeting of healthcare, semiconductors, and telecoms
contained a process debugging path (.pdb) with the is consistent with Chinese state interests and parallels
Chinese-language directory "D:\桌面\木马," which activity from other Chinese espionage groups.
translates to "D:\Desktop\trojan."
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 33

Status as Potential Contractors


We assess with moderate confidence that APT41 is • Public reports on Chinese hackers highlight that skilled
constituted of contractors tasked by the Chinese state actors opt to work for private sector entities that have
to conduct espionage operations. Individuals attributed government contracts because of better pay.
to the group have previously indicated that they • Underground activity dating back to 2009 indicated
could be hired and advertised their skills and services. that Zhang Xuguang is a hacker for hire. Zhang
APT41's use of the same malware in both financial- and advertised on forums that he was available for
espionage-related operations could support their status professional penetration and hacking services.
as contractors; state employees are less likely to use such
tools for personal financial gain over multiple years given –– Zhang listed his online hours from 4:00 p.m. – 6:00
the potential for greater scrutiny or punishment. a.m., which are similar to the operational times
observed at gaming targets displayed in Figure 4.
• APT41 cyber crime activity includes the use of • He was also observed sharing an injection tool named
espionage-only malware, indicating two possible Ocean hysi (海洋hysi注入工具) to demonstrate his skills,
conclusions: either APT41 is operating outside of as displayed in Figure 16.
state control but still working with other Chinese APT
malware actors, tools, and infrastructure on a part- China has previously relied on contractors to bolster state
time or contractual basis, or APT41 is a full-time, state- resources dedicated to cyber espionage activity. Increased
sponsored APT actor but is also working outside of integration between government units and civilian entities,
state control or direction for supplemental income. including contractors and freelancers, is believed to be a
key feature of Chinese cyber policy.
–– Tools used by APT41 in financially motivated
operations include the use of HOMEUNIX and PHOTO, • According to indictments unsealed by the U.S.
which are non-public malware used only by other Department of Justice (USDOJ) in December 2018,
Chinese espionage actors. APT10 was operated by contractors working for the
–– A loose time separation between espionage and China's Ministry of State Security (MSS).
cyber crime activities provides some indication that • In a USDOJ indictment unsealed in November 2017,
the group divides its work hours between both types individual contractors responsible for APT3 were found
of operations. For additional details, see Figure 4 and to be working for an MSS front company.
the previous section "Financially Motivated Activity."

Figure 16:
Ocean injection
tool posted by
Zhang.
34 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Links to Other Known Chinese


Espionage Operators
APT41 uses many of the same tools and compromised • APT41 overlaps at least partially with public reporting
digital certificates that have been leveraged by other on groups including BARIUM (Microsoft) and Winnti
Chinese espionage operators. Initial reports about (Kaspersky, ESET, Clearsky). In some cases, the
HIGHNOON and its variants (reported publicly as primary observed similarity in the publicly reported
"Winnti") dating back to at least 2013 indicated the Winnti activity was the use of the same malware—
tool was exclusive to a single group, contributing to including HIGHNOON—across otherwise separate
significant conflation across multiple distinct espionage clusters of activity.
operations. • Previous FireEye Threat Intelligence reporting on the
use of HIGHNOON and related activity was grouped
together under both GREF and Mana, although we
now understand this to be the work of several Chinese
cyber espionage groups that share tools and digital
certificates.
• APT41 reflects our current understanding of what was
previously reported as GREF, as well as additional
indicators and activity gathered during our extensive
review of our intelligence holdings.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 35

Certificate Overlap

A digital certificate issued by YNK Issuer: CN=VeriSign Class 3 Code Signing 2009-2 CA
Japan that was publicly reported Subject: CN=YNK JAPAN Inc
as being used by Winnti has been Serial Number: 67:24:34:0d:db:c7:25:2f:7f:b7:14:b8:12:a5:c0:4d
used by multiple Chinese espionage Issue-Date: 11/27/09 , Expiration-Date: 11/27/11
operators, including APT17, and
APT20, and APT41.

A self-signed digital certificate Issuer: CN=Microsoft Certificate Authority


purporting to be from the Microsoft Subject: CN=Microsoft Certificate Authority
Certificate Authority has been used Serial Number: (Negative)77:62:e5:c6:c9:c2:75:59:b0:b8:f5:56:60:61:d8:78
by both APT41 and APT40 to sign Issue-Date: 12/31/2009, Expiration-Date: 12/30/2035
samples of the PHOTO backdoor.

The overlaps in groups observed using


these certificates is illustrated in
Table 8.

Table 8. Example of shared certificates between APT groups.

Serial Number Subject APT17 APT20 APT40 APT41

67:24:34:0d:db:c7:25:2f:7f:b7:14:b8:12:a5:c0:4d YNK JAPAN Inc X X X


(Negative)77:62:e5:c6:c9:c2:75:59:b0:b8:f5:56:60:61:d8:78 Microsoft Certificate Authority X X
36 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Launcher Overlap

The use of DLL side-loading has been a source of executable allows actors to bypass host-based security
continued confusion when used as an indicator for distinct measures. For this reason, it continues to be popular
operations. This technique uses a legitimate and often mechanism used by multiple groups. This also explains
digitally signed executable to essentially trick a system why the use of these DLL filenames is not a unique
into launching a malicious DLL because it has been given indicator for distinct APT operators. Table 9 contains
the same name as a legitimate DLL normally loaded by legitimate executables used by APT41 and selected other
the executable. The use of a valid and digitally signed Chinese cyber espionage groups for DLL side-loading:

Table 9. Legitimate files used by different APT groups for DLL side-loading.

File MD5 Hash Filename APT9 APT10 APT20 APT41

09b8b54f78a10c435cd319070aa13c28 nvSmartEx.exe X X X X
26a196afc8e6aff6fc6c46734bf228cb form.exe X X

Code Family Overlap

A significant number of non-public tools used by –– HIGHNOON, one of the main code families observed
APT41 are shared with other distinct Chinese espionage being used by APT41, was also used by APT17 in 2015
operators. Source code overlaps between observed to target semiconductor and chemical manufacturers.
code families indicate potential access to shared code –– HOMEUNIX, another popular backdoor used by
repositories or common developers between groups. APT41, has been used by at least 14 separate Chinese
espionage groups, including APT1, APT10, APT17,
• APT41 has used several malware families that have
APT18, and APT20.
also been used by other Chinese espionage operators,
including variants of HIGHNOON, HOMEUNIX, PHOTO, –– JUMPALL is a dropper that has been observed
SOGU, and ZXSHELL, among others. Table 10 illustrates dropping variants of the HIGHNOON, ZXSHELL, and
some of overlap between malware families used by SOGU code families attributed to APT17 and APT41.
APT41 and other APT groups. Note that this is only for
illustration purposes and is not indicative of all observed
malware families used by these APT groups or all groups
that have used those families.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 37

Table 10. Code family overlap among different Chinese espionage groups.

Malware APT1 APT3 APT10 APT17 APT18 APT19 APT40 APT41

BLACKCOFFEE X X X

CHINACHOP X X X

COLDJAVA X

HIGHNOON X X

HIGHNOON.BIN X X

HIGHNOON.LITE X

HOMEUNIX X X X X X

JUMPALL X X

Table 11. CLASSFON sample with internal name "DrvDll.dll" and contains reference to "PlusDll.dll".

File MD5 Hash Malware Internal Filename Device Driver Name

9e1a54d3dc889a7f0e56753c0486fd0f CLASSFON DrvDll.dll PlusDll.dll

Table 12. APT41 HIGHNOON.BIN samples that reference "PlusDll.Dll".

File MD5 Hash Malware Process Debugging Path

36711896cfeb67f599305b590f195aec HIGHNOON.BIN D:\桌面\木马\Anti_winmm\AppInit\AppInit\Release\AppInit.pdb


a0a96138b57ee24eed31b652ddf60d4e HIGHNOON.BIN H:\RBDoor\Anti_winmm\AppInit\AppInit\Release\AppInit.pdb

• APT41 has not only shared the same tools with other –– PDB paths identified in related APT41 HIGHNOON.
Chinese espionage operators but also appears to have BIN samples contain the name "RBDoor," which
access to shared source code or developers as well. has also been identified in samples of HIGHNOON,
HIGHNOON.LITE, HIGHNOON.CLI, and GEARSHIFT
–– APT41 has used CROSSWALK.BIN, a kernel driver,
(Figure 17). APT41 files containing PDB paths
to circumvent firewalls and covertly send data.
referencing "RBDoor" are listed in Table 13. At least
Another Chinese espionage group used a similar
two of these malware families, HIGHNOON.CLI and
tool, CLASSFON, to covertly proxy network
GEARSHIFT, have been used by APT17 and another
communications in 2011.
suspected Chinese espionage group.
§§ CLASSFON (MD5:
• Further information regarding code family overlaps
9e1a54d3dc889a7f0e56753c0486fd0f) has an
between variants can be found in "Technical Annex:
internal name of DrvDll.dll and an embedded device
Additional Malware Overlaps."
driver that is internally named PlusDll.dll (Table 11).
The PlusDll.dll filename has also been identified in
APT41 HIGHNOON.BIN samples (Table 12).
38 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

H:\Double-V1\stone_srv\Bin\RbDoor64.pdb
Figure 17: H:\Double\Door_wh\AppInit\x64\Release\AppInit.pdb
PDB paths H:\Double\Door_wh\RbDoorX64\x64\Release\RbDoorX64.pdb
containing
"RBDoor".
H:\Double\door_wh_kav\Bin\RbDoor64.pdb
H:\RBDoor\Anti_winmm\AppInit\AppInit\Release\AppInit.pdb
H:\RBDoor\Anti_winmm\AppInit\AppInit\x64\Release\AppInit.pdb
H:\RBDoor\Anti_winmm\AppInit\ShutDownEvent\x64\Release\ShutDownEvent.pdb
H:\RbDoor\Anti_winmm\AppInit\AppInit\Release\AppInit.pdb
H:\RbDoor\Anti_winmm\AppInit\RbDoorX64\Release\RbDoor.pdb
H:\RbDoor\Anti_winmm\AppInit\ShutDownEvent\Release\ShutDownEvent.pdb
H:\RbDoor\Lib\WMI_SSL\RemoteLib\bin\TestRjLib.pdb
H:\Svn\Double-V1\stone_srv\Bin\RbDoor64.pdb

Table 13. APT41 samples with PDB paths containing "RBDoor".

File MD5 Hash Malware

46a557fbdce734a6794b228df0195474 HIGHNOON
77c60e5d2d99c3f63f2aea1773ed4653 HIGHNOON
a0a96138b57ee24eed31b652ddf60d4e HIGHNOON.BIN
7d51ea0230d4692eeedc2d5a4cd66d2d HIGHNOON.BIN
849ab91e93116ae420d2fe2136d24a87 HIGHNOON.BIN
ba08b593250c3ca5c13f56e2ca97d85e JUMPALL
f8c89ccd8937f2b760e6706738210744 GEARSHIFT
5b26f5c7c367d5e976aaba320965cc7f GEARSHIFT
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 39

Use of Code-Signing Certificates


APT41 regularly leverages code-signing certificates to –– In most cases, multiple digital certificates are issued to
sign malware when targeting both gaming and non- an organization using the same public name, making
gaming organizations. Notably, most of the digital it more difficult to identify a compromised certificate
certificates being used in this manner are valid unrevoked among others with identical names.
digital certificates stolen from East Asia-based game –– Certificate authorities are responsible for revoking
development studios. APT41 likely signs their malware compromised digital certificates, although response
to ensure compatibility with the targeted systems and to times can vary greatly, and digital certificates can
potentially avoid detection. continue to be abused even long after they are first
identified being misused.
• Microsoft requires all kernel-mode drivers to be signed
in order to run on operating systems running Windows • Several malware samples were signed very close to the
Vista or later. certificate issue date, suggesting that APT41 or a related
actor had access to the private key or build environment
• The use of code-signing certificates can also
at that time. It is also possible the group acquired the
significantly decrease the likelihood that a malicious
private keys soon after they were issued.
payload is detected.
• In some cases, digital certificates were used to sign
Although we do not have direct evidence of APT41 malware samples just before they expired, most likely
specifically targeting and stealing code-signing certificates, indicating the actors were actively managing a library of
we have some indication from targeting of affected digital certificates for this purpose.
organizations within the same time frame that digital
• Figure 18 depicts compile times of malware signed with
certificates are first compromised and used to sign malware.
compromised digital certificates within the time frame
• Stealing private keys or compromising an organization's that the certificates were valid. All of the certificates
infrastructure to access and steal digital certificates listed in the graphic have either been revoked or are
abuses trust relationships between firms and certificate currently expired. Indicators associated with these
authorities. Malicious files signed with valid digital certificates are listed in "Technical Annex: Code Signing
certificates can circumvent automated scanning/ Certificates Used by APT41."
blocking solutions and bypass Windows group policies • Alternatively, it is possible APT41 may have purchased
which restrict unsigned code from running. the digital certificates used for signing malware within
–– Even when detected, malicious files signed by an underground market. FireEye researchers found that
a digital certificate from a trusted partner or code signing certificates are currently available for sale
associated business are less likely to draw suspicion. in underground marketplaces for as little as $399 USD,
According to an advertisement in an underground although ones that go through rigorous vetting can be
marketplace, the success rate of installing a payload sold for $1,699 USD.
increases by as much as 50 percent when signing
files with valid digital certificates.
40 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Figure 18: First observed malware


samples signed with digital certificates
(white) in relation to valid certificate
dates (blue).

Observed Use Of Code Signing Certificates

Electronics Extreme Limited

Zepetto Co.

En Masse Entertainment

GameUS Inc.

Shanda Games

NetSarang Computer

Wemade Entertainment Co.

XL Games Co.

Nanjing Ranyi Technology Co.

Guangzhou YuanLuo Technology Co.

Fuqing Dawu Technolofy Co.

Mgame Corp

xlgames

Neowix Corporation

Webzen Inc.

Guangzhou YuanLuo Technology Co.

YNK JAPAN Inc.

11/27/09 4/11/11 8/23/12 1/5/14 5/20/15 10/1/16 2/13/18 6/28/19

Certificate Validity Dates


First Observed Malware Sample Signed
with Compromised Certificate
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 41

Outlook and Implications


APT41 is a dual threat demonstrating creativity
and aggressiveness in carrying out both espionage
campaigns and financially motivated operations. The
group's capabilities and targeting have both widened
over time, signaling the potential for additional supply
chain compromises affecting more victims in additional
verticals.

APT41's links to both underground marketplaces and


state-sponsored activity may indicate the group enjoys
protections that enables it to conduct its own for-profit
activities, or authorities are willing to overlook them. It
is also possible that APT41 has simply evaded scrutiny
from Chinese authorities. Regardless, these operations
underscore a blurred line between state power and
crime that lies at the heart of threat ecosystems and is
exemplified by APT41.
42 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

TECHNICAL ANNEX
Attack Lifecycle
Maintain Presence Move Laterally
Figure 19:
APT41 attack
• ADORE.XSEC • HIGHNOON
lifecycle.
• CROSSWALK • SOGU
• CROSSWALK.BIN • Brute-force local
• FRONTWHEEL admin account
• HIGHNOON • Creation of user accounts
• HIGHNOON.BIN added to User and
• HIGHNOON.LINUX Admin groups
• HOMEUNIX • Modification of the
• PACMAN legitimate WMI
• PHOTO Performance Adapter
• POISONPLUG • RDP
• POWERSPLOIT • Scheduled tasks
• ROCKBOOT • Stolen credentials
• SOGU
• Scheduled tasks
• Startup files
• Sticky Keys Vulnerability
• Windows Registry
modifications

Initial Compromise Establish Foothold Escalate Privilege Internal Reconnaisance Complete Mission

• CHINACHOP • ACEHASH • ACEHASH • HIGHNOON • Encryptor RaaS


• Credential theft • ASPXSpy • GEARSHIFT • SOGU • XMRIG
• CVE-2019-3369 • Beacon • Mimikatz • WIDETONE • Clear “.bash_history”
• Spear-phishing • CHINACHOP • NTDSDump • Built-in Windows files
• Stolen credentials • COLDJAVA • PHOTO commands • Clear Windows
• TeamViewer • CRACKSHOT • PwDump (ping, nestate, etc.) security and system
• CROSSWALK • WINTERLOVE event logs
• DEADEYE • Bypass User Account • Compress data
• DOWNTIME Control using RAR
• EASYNIGHT • Password hash • Credential theft
• Gh0st dumping • Delete Scheduled
• HIGHNOON • Windows Credential tasks
• HIGHNOON.LITE Editor (WCE) • Intellectual property
• HIGHNOON.PASTEBOY theft
• HKDOOR • Modify DNS
• HOTCHAI management to avoid
• JUMPALL anti-virus detection
• LATELUNCH • Steal in-game
• LIFEBOAT currencies
• LOWKEY
• njRAT
• PHOTO
• POISONPLUG
• POISONPLUG.SHADOW
• POTROAST
• SAGEHIRE
• SOGU
• SWEETCANDLE
• TERA
• TIDYELF
• WINTERLOVE
• XDOOR
• ZXSHELL
• PowerShell
• Sticky Keys Vulnerability
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 43

APT41 leverages a variety of techniques to perform an initial compromise, including spear-


phishing, moving laterally from trusted third parties, leveraging stolen credentials, using the
CHINACHOP web shell, and accessing victim organizations using remote desktop sharing
Initial software, such as TeamViewer. APT41 often relies on the use of simple spear-phishing email
Compromise with attachments such as compiled HTML (.chm) files to initially compromise their victims.
However, once in a victim organization, the operation can leverage more sophisticated TTPs
and deploy additional malware tools.

• In a campaign running almost one year, APT41 compromised hundreds of systems and
used close to 150 unique pieces of malware including backdoors, credential stealers,
keyloggers, and rootkits.
• We have observed TeamViewer credentials used as an entry point in multiple intrusions
across industries. In these instances, APT41 leveraged TeamViewer to transfer malware
into the compromised environment, although we do not have direct evidence of APT41
compromising TeamViewer.
–– In July 2017, APT41 initiated a TeamViewer session and transferred files that were
later deleted. Filenames and creation times indicate that these may have been the
HIGHNOON backdoor.
–– In May 2018, APT41 used TeamViewer for initial entry in the compromise of a healthcare
company. During this intrusion, APT41 started a TeamViewer session and shortly
after transferred DLL files associated with the CROSSWALK backdoor to the victim
environment before deploying CROSSWALK.

The group has leveraged several exploits in their operations. Notably, APT41 was observed
using proof-of-concept exploit code for CVE-2019-3396 within 23 days after the
Confluence vulnerability was announced.

Observed Vulnerabilities
• CVE-2012-0158
• CVE-2015-1641
• CVE-2017-0199
• CVE-2017-11882
• CVE-2019-3396

APT41 compromised one organization and moved to a client environment.


44 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Establish APT41 uses a variety of malware and tools, both public and unique to the group, to
Foothold establish a foothold with a victim's environment, including:

• ASPXSpy • HIGHNOON.LITE • POISONPLUG.SHADOW


• ACEHASH • HIGHNOON.PASTEBOY • POTROAST
• Beacon • HOTCHAI • SAGEHIRE
• CHINACHOP • HKDOOR • SOGU
• COLDJAVA • JUMPALL • SWEETCANDLE
• CRACKSHOT • LATELUNCH • TERA
• CROSSWALK • LIFEBOAT • TIDYELF
• DEADEYE • LOWKEY • XDOOR
• DOWNTIME • njRAT • WINTERLOVE
• EASYNIGHT • POISONPLUG • ZXSHELL
• Gh0st

APT41 has been observed using Linux and Windows variants of the same malware families,
such as PHOTO and HIGHNOON. The group often initially installs its backdoors to c:\
windows\temp.

We have observed APT41 attempting to masquerade their files and domains as popular
anti-virus software:



APT41 appears to use the commercially available Beacon backdoor that is part of the
Cobalt Strike pen-testing software platform. In at least one instance, a server used for
Beacon C&C was also leveraged for CROSSWALK C&C.

On multiple occasions, APT41 leveraged the Sticky Keys vulnerability and PowerShell to
deploy malware families in victims' environments.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 45

Escalate APT41 escalates its privileges in systems by leveraging custom-made and publicly available
Privileges tools to gather credentials and dump password hashes. The tools include:

• ACEHASH • NTDSDump
• GEARSHIFT • PHOTO
• GOODLUCK • PwDump
• Mimikatz • WINTERLOVE

Windows Credential Editor (WCE)


APT41 frequently uses the Windows Credential Editor to dump password hashes from
memory and authenticate other user accounts.

APT41 conducts network reconnaissance after using compromised credentials to log on


Internal to other systems. The group leverages built-in Windows commands, such as "netstat"
Reconnaissance and "net share," in addition to the custom and non-public malware families SOGU,
HIGHNOON, and WIDETONE.

• HIGHNOON includes the ability to collect host information by enumerating active


Remote Desktop Protocol (RDP) sessions.

• SOGU is capable of listing TCP and UDP network connections, respectively.

• WIDETONE is capable of conducting port scans and password brute-force attacks and
collecting network information. It contains an embedded variant of a publicly available
enumeration tool and can be run with the following options:

–– "-hbs" option runs a port scan on the specified subnet.

–– "-hscan" scans the specified IP range for IPC and SQL services.

–– "-enum" queries a Windows host for requested information, such as users, groups/
members, policies, and more.
46 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

APT41 assesses the network architecture of an organization and identifies pivotal systems
for enabling further access. The group has repeatedly identified intermediary systems that
provide access to otherwise segmented parts of an organization's network (as outlined
in Case Study: Video Game Industry Targeting). Once APT41 has identified intermediary
systems, it moves quickly to compromise systems. In one case, hundreds of systems across
several geographic regions were compromised in as little as two weeks.

APT41 uses multiple methods to perform lateral movement in an environment, including


RDP sessions, using stolen credentials, adding accounts to User and Admin groups,
and password brute-forcing utilities. The group will also use a compromised account to
Lateral create scheduled tasks on systems or modify legitimate Windows services to install the
Movement HIGHNOON and SOGU backdoors.

• We observed APT41 using a compromised account to create a scheduled task on a


system, write a binary component of HIGHNOON containing the payload and C&C
information to disk, and then modify the legitimate Windows WMI Performance Adaptor
(wmiApSrv) to execute the HIGHNOON payload.

APT41 frequently uses the publicly available utility WMIEXEC to move laterally across
an environment. WMIEXEC is a tool that allows for the execution of WMI commands on
remote machines. Examples of commands executed by the utility include:

cmd.exe /c whoami > C:\wmi.dll 2>&1


cmd.exe /c del C:\wmi.dll /F > nul 2>&1
cmd.exe /c a.bat > C:\wmi.dll 2>&1
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 47

To maintain presence, APT41 relies on backdoors, a Sticky Keys vulnerability, scheduled


Maintain tasks, bootkits, rootkits, registry modifications, and creating or modifying startup files.
Presence APT41 has also been observed modifying firewall rules to enable file and printer sharing to
allow for inbound Server Message Block (SMB) traffic.

• APT41 leveraged ROCKBOOT as a persistence mechanism for PHOTO and TERA


backdoors. The bootkit performs raw disk operations to bypass the typical MBR boot
sequence and execute the backdoors prior to the host operating system. This technique
was implemented to ensure the malware would execute at system runtime and was
designed to be difficult to detect and prevent. APT41 ROCKBOOT samples have been
signed with legitimate code-signing certificates from MGame and Neowiz, two South
Korean video game companies.
• APT41 leveraged ADORE.XSEC, a Linux backdoor launched by the Adore-NG rootkit,
throughout an organization's Linux environment. The group installed the backdoor and
the Adore-NG rootkit persistently by creating a hidden shell script in "/etc/rc.d/init.d,"
a directory that contains the startup scripts for many system services. The Adore-NG
rootkit is used to hide the backdoor and authenticate any incoming connections using a
provided password.
• The group also uses CROSSWALK.BIN, FRONTWHEEL, HIGHNOON.BIN, HIGHNOON.
LINUX, HOMEUNIX, and PACMAN to maintain presence.

In some instances, APT41 leveraged POISONPLUG as a first-stage backdoor to deploy the


HIGHNOON backdoor in the targeted environment. We observed APT41 use PowerSploit
with the capability to use WMI as a persistence mechanism. The group also deploys the
SOGU and CROSSWALK malware families as means to maintain presence.

APT41 has demonstrated it is highly agile, responding quickly to changes in victim


environments and incident responder activity.

• Hours after a victimized organization made changes to thwart APT41, the group
registered a new C&C domain, compiled a new SOGU backdoor variant, and deployed
the new backdoor to several systems across multiple geographic regions.
• APT41 sent spear-phishing emails to multiple HR employees three days after the
compromise had been remediated and systems were brought back online. Within hours
of a user opening the malicious attachment dropping a HOMEUNIX backdoor, APT41
regained a foothold within the environment by installing PHOTO on the organization's
servers across multiple geographic regions.
48 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Avoiding C&C Detection Preventing Anti-Virus Updates


At times APT41 uses legitimate websites, such as GitHub, Before attempting to deploy the publicly available
Pastebin, and Microsoft TechNet, to avoid detection. Ransomware-as-a-Service (RaaS) Encryptor RaaS
Interestingly, some of the group's POISONPLUG malware through group policy, APT41 blocked victim systems
samples leverage the Steam Community website from retrieving anti-virus updates by accessing the DNS
associated with Valve, a video game developer and management console and implementing a forward lookup
publisher. This technique of storing encoded or encrypted on the domain used for anti-virus updates to the park IP
strings, known as dead drop resolvers (DDR), on legitimate address "1.1.1.1."
websites that can subvert network defenders as traffic to
and from the sites is typically benign.

The group has also configured Linux backdoors to run


on ports used by legitimate applications within victim
environments, enabling malicious traffic to bypass network
security measures and hide malicious activity within the
organization's regular application traffic.

APT41 has been observed creating a RAR archive of targeted files for exfiltration. The group
has also manipulated in-game currencies using the targets' databases after compromising
production environments. During multiple engagements, APT41 attempted to remove
evidence of some of its activity by deleting Bash histories, clearing Windows security and
Complete system events, and modifying DNS management to avoid anti-virus detections.
Mission In at least one instance, the group attempted to deploy Encryptor RaaS. However, an
operator's typo prevented the ransomware from executing in the victim's environment.

In another instance, APT41 deployed XMRig, a Monero cryptocurrency mining tool in a


victim's environment.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 49

TECHNICAL ANNEX

MITRE ATT&CK Mapping


Initial Access Persistence
t1190 Exploit Public-Facing Application t1015 Accessibility Features
t1133 External Remote Services t1098 Account Manipulation

t1193 Spear-phishing Attachment t1067 Bootkit

t1195 Supply Chain Compromise t1136 Create Account

t1199 Trusted Relationship t1038 DLL Search Order Hijacking


t1133 External Remote Services
t1078 Valid Accounts
t1179 Hooking
t1031 Modify Existing Service
Execution t1050 New Service
t1059 Command-Line Interface t1034 Path Interception
t1223 Compiled HTML File t1108 Redundant Access
t1106 Execution through API t1060 Registry Run Keys / Start Folder
t1129 Execution through Module Load t1165 Startup Items
t1203 Exploitation for Client Execution t1078 Valid Accounts
t1061 Graphical User Interface t1100 Web Shell
t1170 Mshta
t1086 PowerShell
t1053 Scheduled Task Privilege Escalation

t1085 Rundll32 t1134 Access Token Manipulation


t1064 Scripting t1015 Accessibility Features
t1035 Service Execution t1038 DLL Search Order Hijacking
t1204 User Execution t1034 Path Interception
t1047 Windows Management Instrumentation t1055 Process Injection
t1078 Valid Accounts
t1100 Web Shell
50 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Defense Evasion Discovery


t1134 Access Token Manipulation t1087 Account Discovery
t1009 Binary Padding t1482 Domain Trust Discovery
t1146 Clear Command History t1083 File and Directory Discovery
t1116 Code Signing t1169 Permission Groups Discovery
t1140 Deobfuscate / Decode Files or Information t1057 Process Discovery
t1089 Disabling Security Tools t1063 Security Software Discovery
t1038 DLL Search Order Hijacking t1082 System Information Discovery
t1073 DLL Side-Loading t1016 System Network Configuration Discovery
t1107 File Deletion t0149 System Network Connections Discovery
t1054 Indicator Blocking t1033 System Owner/User Discovery
t1070 Indicator Removal on Host t1124 System Time Discovery
t1036 Masquerading t1497 Virtualization and Sandbox Evasion
t1112 Modify Registry
t1170 Mshta
Lateral Movement
t1027 Obfuscated Files or Information
t1075 Pass the Hash
t1055 Process Injection
t1076 Remote Desktop Protocol
t1014 Rootkit
t1105 Remote File Copy
t1085 Rundll32
t1064 Scripting
t1045 Software Packing Command and Control
t1099 Timestomp
t1043 Commonly Used Port
t1078 Valid Accounts
t1090 Connection Proxy
t1497 Virtualization and Sandbox Evasion
t1094 Custom Command and Control Protocol
t1102 Web Service
t1132 Data Encoding
t1001 Data Obfuscation
t1483 Domain Generation Algorithms
Credential Access
t1219 Remote Access Tools
t1098 Account Manipulation
t1105 Remote File Copy
t1110 Brute Force
t1071 Standard Application Layer Protocol
t1003 Credential Dumping
t1032 Standard Cryptographic Protocol
t1081 Credentials in Files
t1095 Standard Non-Application Layer Protocol
t1056 Input Capture
t1065 Uncommonly Used Port
t1145 Private Keys

Exfiltration
Collection
t1002 Data Compressed
t1119 Automated Collection
t1022 Data Encrypted
t1213 Data from Information Repositories
t1041 Exfiltration Over Command and Control Channel
t1005 Data from Local System
t1056 Input Capture
t1113 Screen Capture Impact
t1487 Data Encrypted for Impact
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 51

TECHNICAL ANNEX

Code-Signing Certificates
Used by APT41
Table 14. Code-signing certificates used by APT41.
Expiry
Serial Common Name Issue Date Status
Date
Guangzhou YuanLuo
0b:72:79:06:8b:eb:15:ff:e8:06:0d:2c:56:15:3c:35 6/12/12 6/12/13 Revoked
Technology Co.
18:63:79:57:5a:31:46:e2:6b:ef:c9:0a:58:0d:1b:d2 Webzen Inc. 8/2/11 9/30/13 Revoked

63:66:a9:ac:97:df:4d:e1:73:66:94:3c:9b:29:1a:aa xlgames 7/5/11 7/4/12 Revoked

5c:2f:97:a3:1a:bc:32:b0:8c:ac:01:00:59:8f:32:f6 Neowiz CORPORATION 11/16/11 12/15/12 Expired

01:00:00:00:00:01:30:73:85:f7:02 Mgame Corp 6/9/11 6/9/12 Expired

4c:0b:2e:9d:2e:f9:09:d1:52:70:d4:dd:7f:a5:a4:a5 Fuqing Dawu Technology Co. 1/31/13 1/31/14 Revoked

Guangzhou YuanLuo
14:0d:2c:51:5e:8e:e9:73:9b:b5:f1:b2:63:7d:c4:78 10/22/13 10/22/14 Revoked
Technology Co.
58:01:5a:cd:50:1f:c9:c3:44:26:4e:ac:e2:ce:57:30 Nanjing Ranyi Technology Co. 8/8/12 8/8/13 Revoked

7b:d5:58:18:c5:97:1b:63:dc:45:cf:57:cb:eb:95:0b XL Games Co. 6/21/12 6/21/13 Revoked

47:6b:f2:4a:4b:1e:9f:4b:c2:a6:1b:15:21:15:e1:fe Wemade Entertainment co. 3/2/14 1/9/16 Revoked

53:0c:e1:4c:81:f3:62:10:a1:68:2a:ff:17:9e:25:80 NetSarang Computer 10/13/16 11/12/18 Revoked

30:d3:c1:67:26:5b:52:0c:b8:7f:25:84:4f:95:cb:04 Shanda Games 10/29/13 12/27/16 Revoked

54:c6:c1:40:6f:b4:ac:b5:d2:06:74:e9:93:92:c6:3e GameUS Inc 5/15/14 7/13/16 Expired

1e:52:bb:f5:c9:0e:c1:64:d0:5b:e0:e4:16:61:52:5f En Masse Entertainment 2/3/15 4/5/17 Expired

fd:f2:83:7d:ac:12:b7:bb:30:ad:05:8f:99:9e:cf:00 Zepetto Co. 5/10/18 7/1/19 Expired

25:f8:78:22:de:56:d3:98:21:59:28:73:ea:09:ca:37 Electronics Extreme Limited 1/20/17 1/20/19 Expired

67:24:34:0d:db:c7:25:2f:7f:b7:14:b8:12:a5:c0:4d YNK JAPAN Inc 11/27/09 11/27/11 Revoked


52 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

TECHNICAL ANNEX

Additional Malware Overlaps


Background HIGHNOON
Throughout the course of our analysis, we consolidated HIGHNOON variants include HIGHNOON.LITE,
multiple malware families into a single family with variants HIGHNOON.BIN, HIGHNOON.PASTEBOY, HIGHNOON.
based on identified overlaps. Some of the malware CLI, and HIGHNOON.LINUX. Some of the variants, such as
families, such as HIGHNOON, are shared with other HIGHNOON.BIN, were used by multiple suspected Chinese
suspected Chinese espionage groups. The malware groups, including APT41 and APT17.
families contain similar functionalities, code overlaps,
and encoding routines. Detailed descriptions on specific HIGHNOON.BIN and HIGHNOON.LITE
malware families are listed as follows. HIGHNOON.BIN (MD5:
2862c9bff365dc8d51ba0c4953869d5d) and HIGHNOON.
LITE (MD5: b5120174d92f30d3162ceda23e201cea) contain
an identical in memory DLL loading function, which can be
seen in Figure 20.

Figure 20: HIGHNOON.


BIN and HIGHNOON.LITE
in memory DLL loading
function.

char *v8; // ecx char *v7; // [esp+60h] [ebp-Ch]


int v9; // eax _DWORD *v8; // [esp+68h] [ebp-4h]
char *v10; // eax
char *v11; // [esp+10h] [ebp-4h] 8 if ( !a1 )
9 return 0;
v1 = (char *)a1 + a1[15]; 10 v7 = (char *)a1 + a1[15];
v2 = (char *)VirtualAlloc(*((LPVOID *)v1 + 13), *((_DWORD *)v1 + 20), 0x2000u, 0x40u); 11 IpAddress = (char *)VirtualAlloc(*((LPVOID *)v7 + 13), *((_DWORD *)v7 + 20), 0x2000u, 0x40u);
v11 = v2; 12 if ( !IpAddress )
if ( !v2 ) 13 IpAddress = (char *)VirtualAlloc(0, *((_DWORD *)v7 + 20), 0x2000u, 0x40u);
{ 14 if ( !IpAddress )
result = (char ")VirtualAlloc(0, *((_DWORD *)v1 + 20), 0x2000u, 0x40u); 15 return 0;
v11 = result; 16 v2 = GetProcessHeap():
if ( !result ) 17 v8 = HeapAlloc(v2, 0, 0x14u);
return result; 18 v8[1] = IpAddress;
v2 = result; 19 v8[3] = 0;
} 20 v8[2] = 0;
v4 = GetProcessHeap(); 21 v8[4] = 0;
v5 = (int *)HeapAlloc(v4, 0, 0x14u); 22 VirtualAlloc(IpAddress, *((_DWORD *)v7 + 20), 0x1000u, 0x40u);
v5[1] = (int)v2; 23 Dst = (char *)VirtualAlloc(IpAddress, *((_DWORD *)v7 + 21), 0x1000u, 0x40u
v5[3] = 0; 24 memcpy(Dst, a1, *((_DWORD *)v7 + 21) + a1[15]);
v5[2] = 0; 25 *v8 = &Dst[a1[15]];
v5[4] = 0; 26 *(_DWORD *)(*v8 + 52) = IpAddress;
VirtualAlloc(v2, *((_DWORD *)v1 + 20), 0x1000u, 0x40u); 27 sub_4020A0(a1, v7, v8);
v6 = (char *)VirtualAlloc(v2, *((_DWORD *)v1 + 21), 0x1000u, 0x40u); 28 v4 = (int)&IpAddress[-*((_DWORD *)v7 + 13)];
qmemcpy(v6, a1, a1[15] + *((_DWORD *)v1 + 21)); 29 if ( v4 )
v7 = (int)&v6[a1[15]]; 30 sub_402320(v8, v4);
*v5 = v7; 31 if ( sub_402320(v8) )
*(_DWORD *)(v7 + 52) = v11; 32 {
sub_10002150((int)a1, (int)v1, v5); 33 sub_4021C0(v8);
v8 = (char *)*((_DWORD *)v1 + 13); 34 if ( !*(_DWORD *)(*v8 + 40) )
if ( v11 != v8 ) 35 return v8;
sub_10002370(v5, v11 - v8); 36 v3 = &IpAddress[*(_DWORD *)(*v8 + 40)];
if ( !sub_100023F0(v5) ) 37 if ( v3 && ((int (__stdcall *)(char *, int, _DWORD))v3)(IpAddress, 1, 0) )
goto LABEL_10; 38 {
sub_100022B0(v5); 39 v8[4] = 1;
v9 = *(_DWORD *)(*v5 + 40); 40 return v8;
if ( v9 ) 41 }
{ 42 }
v10 = &v11[v9]; 43 sub_402740(v8);
if ( !v10 || !((int (__stdcall *)(char *, int, _DWORD))v10)(v11, 1, 0) ) 44 return 0;
{ 45 }
ABEL _10 46
sub_100025B0(v5); 47
return 0; 48
}
v5[4] = 1;
}
return (char *)v5;

000021BF sub_1000020B0;52 (100021BF) 00002084 t_in_memory_DLL_loader;46 (402084)


SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 53

HIGHNOON (MD5: df143c22465b88c4bdb042956fef8121) • HIGHNOON and HIGHNOON.LITE also share the same
uses an API hashing algorithm to resolve its imports at configuration encoding routine.
runtime, but the layout of the in-memory DLL loading
• HIGHNOON, HIGHNOON.LITE, and HIGHNOON.BIN
functionality is identical between HIGHNOON, HIGHNOON.
BIN, and HIGHNOON.LITE samples (Figure 21). The specific store a unique host identifier under the registry key
samples of HIGHNOON, HIGHNOON.BIN, and HIGHNOON. HKLM\SOFTWARE\Microsoft\HTMLHelp
LITE referenced previously are not attributed to APT41 but
are instead used by other suspected Chinese groups.

resolve_APIS():
Figure 21: v3 = (_DWORD *)((char *)a1 + a1[15]);
v4 = (_DWORD *)VirtualAlloc(v3[13], v3[20]. 0x2000, 0x40);
HIGHNOON DLL if ( !v4 )
loading function. {
result = (_DWORD *)VirtualAlloc(0, v3[20], 0x2000, 0x40);
if ( !result )
return result;
v4 = result;
}
v6 = (void *)GetProcessHeap(0, 0x14);
v7 = HeapAlloc(v6, v13, v14);
v7[1] = v4;
v7[3] = 0;
v7[2] = 0;
v7[4] = 0;
VirtualAlloc(v4, v3[20], 0x1000, 0x40);
v8 = (char *)VirtualAlloc(v4, v3[21], 0x1000, 0x40);
qmemcopy(v8, a1, a1[15] + v3[21]);
v9 = (int)&v8[*(_DWORD *)(a3 + 60)];
*v7 = v9;
*(_DWORD *)(v9 + 52) = a1;
sub_100016A0(a3, v3, v7);
v10 = (char *)v3[13];
if ( a1 != (_DWORD *)v10 )
sub_10001830(v7, (char *)a1 - v10);
if ( !sub_10001770(v7) )
return 0;
sub_10001770(v7);
v11 = *(_DWORD *)(*v7 + 40);
if ( v11 )
{
v12 = (char *)a1 + v11;
if ( !v12 || !((int (cdec1 *)(_DWORD *, int, _DWORD))v12)(a1, 1, 0) )
return 0;
v7[4] = 1;
}
return v7;
}
54 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

HIGHNOON.LINUX and HIGHNOON Shellcode Component Overlaps


HIGHNOON.LINUX is a Linux variant of HIGHNOON that • The shellcode that handles C&C messages uses the
shares multiple component overlaps with HIGHNOON. same function in both families.
–– Interestingly, additional functions used for C&C in
• HIGHNOON.LINUX and HIGHNOON share a message
CROSSWALK.BIN are present within CROSSWALK
component that use the same headers and XOR encoding.
but unused.
• The two share a transport component that provides
–– This suggests the families are slightly different builds
HTTP, Fake TLS, and raw protocol options.
originating from the same codebase.
• HIGHNOON.LINUX and HIGHNOON share a similar
• CROSSWALK.BIN's user-mode shellcode and the
commands component. The code for processing the
shellcode appended at the end of CROSSWALK contain
commands "Tunnel" and "Plus" (to add plugins) are
approximately three-fourths of the same code.
nearly identical.
• Both CROSSWALK and CROSSWALK.BIN's backdoors
CROSSWALK and CROSSWALK.BIN
are implemented through user-mode shellcode.
CROSSWALK and CROSSWALK.BIN share several notable
overlaps. Significantly, the two code families share a large
amount of code in their respective shellcode components
(Figure 22).
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 55

Figure 22: CROSSWALK (left) and CROSSWALK.BIN (right) shellcode.

37 __int64 v37; // [rsp+58h] [rbp+10h] 39 __int64 v39; // [rsp+58h] [rbp+10h]


38 40
39 v37 = a2; 41 v39 = a2;
40 v2 = 0; 42 v2 = 0;
41 v3 = a1[47] == 1; 43 v3 = a1[47] == 1;
42 v4 = a1; 44 v4 = a1;
43 strcopy(&v36, "ok1234\n"); 45 strcopy(&v38, "ok1234\n");
44 if ( v3 ) 46 if ( v3 )
45 { 47 {
46 LABEL_14: 48 LABEL_14:
47 if ( cgp_dyn_resolve_maybe_03(v4) <= 0 ) 49 if ( cgp_dyn_resolve_maybe_03(v4) <= 0 )
48 return v2; 50 return v2;
49 v24 = v4[24]; 51 v24 = v4[24];
50 v25 = *(v4 + 13); 52 v25 = *(v4 + 13);
51 v26 = v4[48]; 53 v26 = v4[48];
52 *(v4 + 11) = v4; 54 *(v4 + 11) = v4;
53 *(v4 +10) = v4 - v24; 55 *(v4 +10) = v4 - v24;
54 v27 = v4 + v25 - v24; 56 v27 = v4 + v25 - v24;
55 v28 = (*(v4 + 31))(0i64, v26, 4096i64, 4i64); 57 v28 = (*(v4 + 31))(0i64, v26, 4096i64, 4i64);
56 *(v4 + 25) = v28; 58 *(v4 + 25) = v28;
57 if ( !v28 ) 59 if ( !v28 )
58 return v2; 60 return v2;
59 v29 = v4[25]; 61 v29 = v4[25];
60 v30 = *(v4 + 28); 62 v30 = *(v4 + 28);
61 if ( v29 > 0 ) 63 if ( v29 > 0 )
62 { 64 {
63 v31 = v27; 65 v31 = v27;
64 do 66 do
65 { 67 {
66 *v31++ ^= v30; 68 *v31++ ^= v30;
67 --v29: 69 --v29:
68 } 70 }
69 while ( v29 ); 71 while ( v29 );
70 } 72 }
71 if ( sub_BBA0(v4, v27) <= 0 ) 73 if ( sub_8C58(v4, v27) <= 0 )
72 return v2; 74 return v2;
73 v32 = v4[25]; 75 v32 = v4[25];
74 v33 = *(v4 + 28); 76 v33 = *(v4 + 28);
75 if ( v32 > 0 ) 77 if ( v32 > 0 )
76 { 78 {
77 do 79 do
78 { 80 {
79 *v27++ ^= v33; 81 *v27++ ^= v33;
80 --v32: 82 --v32:
81 } 83 }
82 while ( v32 ); 84 while ( v32 );
83 } 85 }
84 *(*(v4 + 25) + 2032i64) = *(v4 + 17) + *v4 + 10); 86 *(*(v4 + 25) + 2032i64) = *(v4 + 17) + *v4 + 10);
85 *(v4 + 35) = *(v4 + 17) + *(v4 + 10); 87 *(v4 + 35) = *(v4 + 17) + *(v4 + 10);
86 (*(*(v4 + 25) + 752i644))(32775i64); 88 (*(*(v4 + 25) + 752i644))(32775i64);
87 v34 = (*(*(v4 + 25) + 32i64))(0i64, 0i64, *(v4 + 10) + *(v4 + 95), v4, 0, 0i64); 89 v34 = (*(*(v4 + 25) + 32i64))(0i64, 0i64,
88 (*(v4 + 35))(&v36); 90 (*(v4 + 35))(&v38);
89 (*(*(v4 + 25) + 272i64))(v34, 0xFFFFFFFFi64); 91 (*(*(v4 + 25) + 272i64))(v36, 0xFFFFFFFFi64);
90 (*(*(v4 + 25) + 48i64))(v24); 92 (*(*(v4 + 25) + 48i64))(v36);
91 v2 = 1; 93 v2 = 1;
92 return v2; 94 return v2;
93 } 95 }
94 v5 = a1[12]; 96 v5 = a1[12];
95 v6 = a1[13]; 97 v6 = a1[13];
96 v7 = a1[11]; 98 v7 = a1[11];
97 v8 = v4[24]; 99 v8 = v4[24];
98 v9 = v4[19]; 100 v9 = v4[19];
99 v10 = v4[25]; 101 v10 = v4[25];
100 v4[12] = v7; 102 v4[12] = v7;
101 v11 = v10 + v9 + v8; 103 v11 = v10 + v9 + v8;
102 v4[13] = v7; 104 v4[13] = v7;
103 v12 = 0; 105 v12 = 0;
104 v13 = v10 + v9 + v8; 106 v13 = v10 + v9 + v8;
105 v14 = v4 - v8; 107 v14 = v4 - v8;
106 do 108 do
107 { 109 {
108 v15 = *v14++; 110 v15 = *v14++;
109 v12 = v15 + __ROR4__(v12, v7); 111 v12 = v15 + __ROR4__(v12, v7);
110 --v13; 112 --v13;
111 } 113 }
112 while ( v13 ); 114 while ( v13 );
113 if ( v6 != v12 ) 115 if ( v6 != v12 )
114 return v2; 116 return v2;
115 v16 = v4 + 48; 117 v16 = v4 + 48;
116 v17 = v9 + v10 - 192; 118 v17 = v9 + v10 - 192;
117 v18 = v17; 119 v18 = v17;
118 if ( v17 > 0 ) 120 if ( v17 > 0 )
119 { 121 {
120 v19 = v4[14]; 122 v19 = v4[14];

0000B60A cgp_decode_shellcode:62 (B60A) 00008590 cgp_decode_shellcode:49 (8590)


56 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Obfuscation and Anti-Analysis Overlaps However, there are differences between the two malware
• Both code families share the same function at the start families, including how they communicate to C&C servers.
of their shellcode to de-obfuscate subsequent shellcode.
• CROSSWALK beacons with HTTP GET and POST requests,
• A key function within the shellcode component that while CROSSWALK.BIN uses a custom binary protocol.
generates a semi-random XOR key and is used in
multiple code locations for decoding is identical in • CROSSWALK.BIN contains a driver component for
CROSSWALK and CROSSWALK.BIN. covert C&C, which CROSSWALK lacks.

• Both use the same function for import resolution via an • Both families contain similar code to process identical
ASCII hash. message types, but their answers differ.
–– CROSSWALK.BIN answers to 0x78 and 0x7A
message types by calling large functions wrapping
the business logic.

strcpy(&v22, "r c:%d,l:%d\n");


–– CROSSWALK has different, much shorter code
v11 = 0i64; embedded directly in the "case" statement.
Figure 23: v12 = 0;
(*(v3 + 2032))(&v22, v8, v5);
switch ( *msg_type )
CROSSWALK (left) {
case 0x64u:
and CROSSWALK. if ( msg_type[1] != 216 )
BIN (right) code {
v16 = 100;
for answering goto LABEL_37;
}
different C&C v21 = (*(v9 + 248))(0i64, 216i64, 4096i64, 4i64);
if ( !v21 )
message types. return 0;
(*(*(v9 + 200) + 1856i64))(v21, v7, msg_type[1]);
if ( (*(*(v9 + 200) + 928i64))(*(v9 + 832), 100i64, v21, msg_type[1]) >
0 )
return 1;
v10 = 0;
v14 = (*(*(v9 + 200) + 320i64))();
v15 = 7021i64;
goto LABEL_42;
case 0x6Eu:
return 1;
case 0x78u:
if ( msg_type[1] != 16 )
{
v16 = 120;
goto LABEL_37;
}
v20 = (*(v9 + 248))(0i64, 16i64, 4096i64, 4i64);
if ( !v20 )
return 0;
(*(*(v9 + 200) + 1856i64))(v21, v7, msg_type[1]);
if ( (*(*(v9 + 200) + 928i64))(*(v9 + 832), 100i64, v21, msg_type[1]) >
0 )
return 1;
v10 = 0;
v14 = (*(*(v9 + 200) + 320i64))();
v15 = 7021i64;
goto LABEL_42; strcpy(&fmt_msg, "r c%d,l:%d\n"):
case 0x7Au: if ( !v3 )
v19 = msg_type[1]; goto LABEL_48
if ( v19 <= 0x1000 ) v6 = sub_3398();
{ v2 = v6;
if ( v19 ) if ( v6 == 2 )
} return 1;
v11 = (*(v9 + 248))(0i64, 16i64, 4096i64, 4i64); if ( v6 <= 0 )
if ( !v11 ) return v2;
return 10; LABEL_48:
(*(*(v9 + 200) + 1856i64))(v11, v7, msg_type[1]); v7 = (msg_type + 11);
v12 = msg_type[1]; (*(*(v5 + 200) + 1872i64))(&fmt_msg, *msg_type, msg_type[1]);
} switch ( *msg_type )
if ( (*(*(v9 + 200) + 928i64))(*(v9 + 832), 122i64, v11, v12) > 0 ) {
return 1; case 0x64u:
v14 = (*(*(v9 + 200 + 320i64))(); (*(*(v5 + 200 + 1872i64))(v5 + 1320, 22i64);
v15 = 7023i64 v13 = cgp_cb_msgtype_0x64_wrapper(v5, (msg_type + 11));
goto LABEL_42 v9 = v5;
} if ( v13 > 0 )
v16 = 122; {
goto LABEL_37; *(v5 + 760) = 1;
case 0x82u: if ( sub_5F44(v5) > 0 )
return 1;
v9 = v5;
}
v11 = 100;
goto LABEL_43;
case 0x6Eu:
return 1;
case 0x78u:
v10 = cgp_cb_msgtype_0x78(v5, v8, msg_type + 11);
goto LABEL_38;
case 0x7Au;
v10 = cgp_cb_msgtype_07A(v5, v8, (msg_type + 11));
goto LABEL_38;
}
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 57

TECHNICAL ANNEX

Malware Used by APT41


Table 15. Malware used by APT41.

Malware Description Detected as

ACEHASH is a credential theft/password hash dumping


ACEHASH utility. The code may be based in Mimikatz and appears to FE_Trojan_AceHash
be publicly available.
FE_APT_Backdoor_Linux64_ADORE_1
ADORE.XSEC is a Linux backdoor that may be used with
ADORE.XSEC FE_APT_Rootkit_Linux64_ADORE_1
the ADORE rootkit.
FE_APT_Rootkit_ADORE
FE_Webshell_ASPX_ASPXSPY_1
ASPXSPY is a publicly available web shell that may contain FE_Webshell_ASPX_ASPXSPY_2
ASPXSPY
the text "ASPXSpy Ver: 2009." FE_Webshell_ASPX_ASPXSPY_3
FE_Webshell_ASPX_ASPXSPY_4
BEACON malware is a backdoor that is commercially
available as part of the Cobalt Strike software platform,
commonly used for pen-testing network environments. The FE_Backdoor_Win_BEACON_1
BEACON
malware supports several capabilities, such as injecting FE_Trojan_PS1_BEACON_1
and executing arbitrary code, uploading and downloading
files, and executing shell commands.
CHINACHOP is a simple code injection web shell that can
execute Microsoft .NET code within HTTP POST commands.
This allows CHINACHOP to upload and download files, FE_Webshell_JSP_CHOPPER_1
execute applications with web server account permissions, FE_Webshell_Java_CHOPPER_1
CHINACHOP list directory contents, access Active Directory, access
databases, and perform any other action allowed by the FE_Webshell_MSIL_CHOPPER_1
.NET runtime. CHINACHOP is composed of at least two
parts: a small bit of code on a server and a client that
provides C&C.
FE_APT_Trojan_COLDJAVA_Dropper
FE_APT_Trojan_COLDJAVA_64
COLDJAVA is a backdoor that drops shellcode and a
COLDJAVA FE_APT_Trojan_COLDJAVA_32
BLACKCOFFEE variant payload into the Windows registry.
FE_APT_Backdoor_COLDJAVA
FE_APT_Trojan_COLDJAVA_Launcher
CRACKSHOT is a downloader that can download files,
including binaries, and run them from the hard disk or FE_Backdoor_Win32_CRACKSHOT_1
CRACKSHOT
execute them directly in memory. It is also capable of Backdoor.Win.CRACKSHOT
placing itself into a dormant state.
CROSSWALK is a skeletal, modular backdoor capable of FE_APT_Backdoor_Win_CROSSWALK_1
CROSSWALK system survey and adding modules in response to C&C FE_APT_Loader_Win_CROSSWALK_1
replies. APT.Backdoor.Win.CROSSWALK

CROSSWALK.BIN is a kernel driver that can implement FE_APT_Dropper_Win64_CROSSWALK_1


CROSSWALK.BIN firewall-level filters to detect tasking packets and covertly FE_APT_Dropper_Win64_CROSSWALK_2
send data. FE_APT_Trojan_Win64_CROSSWALK_1
58 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Table 15. Malware used by APT41.

Malware Description Detected as

DEADEYE is a downloader that is installed as a Service FE_APT_Loader_Win64_DEADEYE_1


DEADEYE DLL. It can use RC5 encryption to decrypt and install
payloads obtained from its C&C server. FE_APT_Loader_Win64_DEADEYE_2

DOWNTIME is a backdoor dropped as an embedded PE file


to a variety of locations on disk or loaded and executed in FE_Dropper_Win32_DOWNTIME_1
DOWNTIME
memory. The final payload is a DLL used to install, manage, FE_Loader_Win32_DOWNTIME_1
and execute plugin DLLs.
EASYNIGHT is a loader observed used with several
malware families, including HIGHNOON and HIGHNOON.
EASYNIGHT FE_APT_Loader_Win_EASYNIGHT_1
LITE. The loader often acts as a persistence mechanism via
search order hijacking.
ENCRYPTORRAAS (Encryptor RaaS) is a ransomware that
encrypts all files on the system that match an included
file extensions list. As is typical of most ransomware,
a combination of both public-key and symmetric-key
cryptography is used to encrypt the data. File data is FE_Ransomware_Win32_ENCRYPTORRAAS_1
encrypted using RC6, with the RC6 key for each file being
ENCRYPTORRAAS FE_Ransomware_Win32_ENCRYPTORRAAS_2
encrypted with RSA. A ransom note in the form of a text
file, typically named "readme_liesmich_encryptor_raas.
txt," is dropped in every directory in which a file was
encrypted. Encryptor RaaS was sold via a RaaS operation
that was available around the 2015–2016 time frame via a
Tor (.onion) website.
FRONTWHEEL is a driver for the HIGHNOON.BIN
FRONTWHEEL FE_APT_Rootkit_Win64_FRONTWHEEL_1
backdoor.
GEARSHIFT is a memory-only dropper for two keylogger
GEARSHIFT DLLs. It is designed to replace a legitimate Fax Service FE_APT_Keylogger_GEARSHIFT
DLL.
Gh0st is a remote access tool (RAT) derived from publicly
available source code. It provides threat actors with the Backdoor.APT.Gh0stRat
ability to perform screen and audio captures, enable a
GH0ST Backdoor.APT.Gh0st Trojan.Ghost
webcam, list and kill processes, open a command shell,
wipe event logs, and create, manipulate, delete, launch,
and transfer files.
GOODLUCK is a credential-stealing DLL that modifies the
registry, so it loads when a user logs on to the system. It
GOODLUCK Hacktool.APT.GOODLUCK
steals credentials from the logon screen and saves the
information to a local file.
FE_APT_Backdoor_Win64_HIGHNOON_1
HIGHNOON is a backdoor that may consist of multiple FE_APT_Dropper_HIGHNOON_B
components. The components may include a loader, a FE_APT_Loader_Win64_HIGHNOON_2
DLL, and a rootkit. Both the loader and the DLL may be
HIGHNOON FE_APT_Loader_Win64_HIGHNOON_3
dropped together, but the rootkit may be embedded in the
DLL. The HIGHNOON loader may be designed to run as a FE_APT_Rootkit_Win64_HIGHNOON_1
Windows service. FE_APT_Rootkit_Win64_HIGHNOON_2
FE_APT_Rootkit_Win64_HIGHNOON_3
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 59

Table 15. Malware used by APT41.

Malware Description Detected as

FE_APT_Trojan_Win32_HIGHNOON_1
HIGHNOON.BIN is a modified version of the Windows DLL FE_APT_Loader_Win32_HIGHNOON_1
apphelp.dll, which is loaded via search order hijacking. FE_APT_Loader_Win64_HIGHNOON_1
HIGHNOON.BIN
HIGHNOON.BIN contains a malicious shellcode backdoor FE_APT_Trojan_Win32_HIGHNOON_2
that is loaded into memory at runtime. APT.Backdoor.Win.HIGHNOON
APT.Backdoor.Win.HIGHNOON
HIGHNOON.LITE is a standalone, non-persistent variant of
the HIGHNOON backdoor. This version accepts a hostname
and port on the command line. If no port is specified, the FE_APT_Trojan_Win32_HIGHNOON_7
HIGHNOON.LITE
malware will use port 80 by default. HIGHNOON.LITE
can download and execute additional memory-resident
modules after it authenticates with the C&C server.
HIGHNOON.LINUX is a Linux backdoor designed to FE_APT_Trojan_Linux64_HIGHNOON_1
operate with a rootkit and can launch and establish
HIGHNOON.LINUX FE_APT_Rootkit_Linux64_HIG
persistence for an sshd client whose presence and activity
is hidden by the rootkit. HNOON_1

HIGHNOON.PASTEBOY is a variant of HIGHNOON that


HIGHNOON.
utilizes legitimate websites hosting encoded base64 TROJAN.APT.PASTEBOY
PASTEBOY
strings that decode to the actual C2 address.
HKDOOR (aka Hacker's Door) is a remote administration
tool designed as a DLL that can either run as a service
or with rundll32.exe. HKDOOR drops and installs a
kernel rootkit and has a variety of capabilities, including
HKDOOR Backdoor.APT.HKDOOR
manipulating files and processes, connecting to URLs, and
shutting down the compromised system. All HKDOOR's
string resources are encoded with a transposition
algorithm.
FE_APT_HOMEUNIX_1
FE_APT_HOMEUNIX_2
FE_APT_HOMEUNIX_3
FE_APT_HOMEUNIX_4
FE_APT_HOMEUNIX_5
FE_APT_HOMEUNIX_6
FE_APT_HOMEUNIX_7
HOMEUNIX is primarily a generic launcher for downloaded
FE_APT_HOMEUNIX_8
plugins. The plugins are stored in a memory buffer and
then loaded and linked manually by the malware, meaning FE_APT_HOMEUNIX_9
HOMEUNIX the plugins never have to touch disk. However, HOMEUNIX FE_APT_HOMEUNIX_10
may also store and save plugins. The plugins will run after FE_APT_HOMEUNIX_11
the system is rebooted without the actor having to send
FE_APT_HOMEUNIX_12
them again to the victim system.
FE_APT_HOMEUNIX_13
FE_APT_HOMEUNIX_14
FE_APT_HOMEUNIX_15
FE_APT_HOMEUNIX_16
APT.Backdoor.Win.HOMEUNIX
Backdoor.HOMEUNIX.SNK.DNS
Trojan.APT.9002, Backdoor.APT.9002
60 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Table 15. Malware used by APT41.

Malware Description Detected as

HOTCHAI is a backdoor that receives and XOR-decodes a


HOTCHAI FE_APT_Backdoor_HOTCHAI
DNS response message to retrieve the true C&C IP address.
JUMPALL is a malware dropper that has been observed FE_Dropper_Win_JUMPALL_1
JUMPALL
dropping HIGHNOON/ZXSHELL/SOGU. FE_Dropper_Win_JUMPALL_2
LATELUNCH is a loader that decodes a file specified on the
LATELUNCH FE_Loader_Win64_LATELUNCH_1
command line and loads and executes it in memory.
FE_APT_Dropper_Win32_LIFE
LIFEBOAT is a backdoor that has the capability to
LIFEBOAT BOAT_1 FE_APT_Downloader_Win32_
communicate with its C&C over HTTP.
LIFEBOAT_1 APT.Downloader.Win.LIFEBOAT

LOWKEY is a passive backdoor that utilizes a user mode FE_APT_ROOTKIT_WIN64_LOWKEY_1


rootkit to provide covert communications with the FE_APT_LOADER_WIN64_LOWKEY_1
LOWKEY
backdoor component by forwarding packets in between a FE_APT_BACKDOOR_WIN64_LOWKEY_1
TCP Socket and a named pipe. APT.BACKDOOR.Win.LOWKEY
Trojan.Njrat
Backdoor.Bladabindi
Trojan.Bladabindi
Backdoor.MSIL.Bladabindi
njRAT is a RAT project that was in development possibly Trojan.Bladabindi.F
as early as 2010, and it has seen a number of incremental Trojan.Bladabindi.njRat
updates since that time. The author of njRAT is widely
Trojan.Bladabindi.DNS
believed to be a Kuwaiti actor using the handle "njq8."
njq8, whose real name is believed to be Naser Al Mutairi, Backdoor.Bladabindi.DNS
NJRAT and who has previously used the handles "NJN" and Backdoor.Ratenjay
"xNJQ8x," has been involved in the development of Backdoor.LV
multiple hacking tools, including RATs, worms, crypters,
Backdooor.njRat.MVX
and binders. He is, however, primarily known as the
developer of njRAT, which he has distributed on private Backdoor.njRat.MVX
hacking forums and more visibly via Twitter. Win.Worm.Njrat-2
Trojan.NjRAT, Win.Worm.Njrat
Malware.DTI.Bladabindi,
Trojan.MSIL.Bladabindi
Hacktool.Bladabindi
PACMAN is a backdoor designed to run as a service. Once
active, PACMAN calls out to a hard-coded C&C domain.
PACMAN has the following capabilities: retrieve drive FE_Backdoor_Win32_PACMAN_1
PACMAN types, terminate processes, create directories, obtain a
directory listing, move files, return file attributes, remove Backdoor.Win.PACMAN
directories, create files, read files, and copy files. PACMAN
can also extract credentials from Internet Explorer.
PHOTO is a DLL backdoor that can obtain directory, file,
and drive listings, create a reverse shell, perform screen
captures, record video and audio, list, terminate, and create Backdoor.APT.PHOTO
PHOTO processes, enumerate, start, and delete registry keys and
values, log keystrokes, return user names and passwords FE_APT_Photos_Metadata
from protected storage, and rename, delete, copy, move,
read, and write to files.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 61

Table 15. Malware used by APT41.

Malware Description Detected as

POISONPLUG is a highly obfuscated modular backdoor


with plug-in capabilities. The malware is capable of registry Backdoor.Win.POISONPLUG
or service persistence, self-removal, plug-in execution, and
POISONPLUG APT.Backdoor.Win.POISONPLUG
network connection forwarding. POISONPLUG has been
observed using social platforms to host encoded C&C
commands.
POISONPLUG.SHADOW is a modular backdoor with plugin
capabilities. The first stage is shellcode, observed within
compromised legitimate software. It connects to a C&C FE_Backdoor_Win_POISONPLUG_1
POISONPLUG. server for validation and configuration information to
FE_Backdoor_Win32_POISONPLUG_1
SHADOW download the second stage. The second stage is a modular
backdoor that can download plugins for additional FE_Backdoor_Win_POISONPLUG_2
functionality. POISONPLUG.SHADOW is assessed as an
evolution of the POISONPLUG family.
POTROAST is a backdoor that connects to a hard- FE_APT_Backdoor_Win_POTROAST_1
POTROAST coded C&C server. Its capabilities include downloading,
uploading, and executing files and creating a reverse shell. APT.Backdoor.Win.POTROAST

ROCKBOOT can access and write to the compromised


system's hard disk drive beneath the operating system
and file system to bypass the normal MBR boot sequence FE_APT_Backdoor_ROCKBOOT
ROCKBOOT and execute malware prior to the host operating system
being initialized. ROCKBOOT does not contain a malicious FE_Loader_Win_ROCKBOOT_1
payload but relies on a secondary payload for malicious
activities, which is specified at install time.
SAGEHIRE is a multistage implant that decodes each stage
SAGEHIRE FE_APT_Sunshop_Dialog
using shellcode and includes keylogging capabilities.
FE_APT_Downloader_Win32_SWEETCANDLE_1
SWEETCANDLE is a downloader that can download and
SWEETCANDLE FE_APT_Downloader_Win32_SWEETCANDLE_2
execute a payload received from the C&C server.
APT.Downloader.Win.SWEETCANDLE
SOGU is a backdoor that is capable of file upload and
download, arbitrary process execution, filesystem and Backdoor.APT.SOGU
registry access, service configuration access, remote
SOGU Backdoor.APT.Kaba
shell access, and implementing a custom VNC/RDP-like
protocol to provide the C&C server with graphical access Trojan.Plugx
to the desktop.
TERA is a backdoor that uses legitimate services, such FE_APT_Backdoor_Win32_TERA_1
as Google Translate and Yahoo! Babel Fish, as proxies to FE_APT_Backdoor_Win32_TERA_2
download C&C configurations. It also uses a rootkit to
TERA FE_APT_Backdoor_Win32_TERA_3
mask network activity. After resolving the IP address of
its C&C server, TERA will provide an input output control FE_APT_Backdoor_Win64_TERA_1
(IOCTL) code to its driver (rootkit component). FE_APT_Rootkit_Win64_TERA_1
TIDYELF is a dropper for the WINTERLOVE backdoor.
WINTERLOVE has been observed embedded within a
resource within TIDYELF. TIDYELF will load the main
TIDYELF WINTERLOVE component by injecting it into the iexplore. FE_APT_Dropper_Win32_TIDYELF_1
exe process. It will then create a registry key named
HKLM\SOFTWARE\RAT to store configuration data for
WINTERLOVE components to use.
62 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Table 15. Malware used by APT41.

Malware Description Detected as

WIDETONE is a command-line tool that can perform


network-based reconnaissance tasks, including port scans,
service banner scans, and pingscans. WIDETONE can FE_Trojan_Win_WIDETONE_1
WIDETONE brute-force credentials for SQL servers and Inter-Process
Communication (IPC) shares. WIDETONE can also query FE_Trojan_Win32_WIDETONE_1
Windows host information and perform dictionary and
brute-force attacks.
FE_APT_Loader_Win32_WINTERLOVE_1
WINTERLOVE is a backdoor used by suspected Chinese FE_APT_Keylogger_Win32_WINTERLOVE_1
cyber espionage actors. WINTERLOVE attempts to load
WINTERLOVE FE_APT_Loader_Win32_WINTERLOVE_2
and execute remote code in a running process and can
enumerate system files and directories. FE_APT_Trojan_Win32_WINTERLOVE_1
FE_APT_Backdoor_Win32_WINTERLOVE_1
X-Door is a full-featured remote administration tool (RAT)
with a configurable deployment and plug-in architecture. It
is freely downloadable through a Chinese website, and the
deployment interface and server use the Chinese language. FE_APT_Backdoor_XDOOR
XDOOR X-Door contains functionality for keylogging, audio and
video capture, file transfers, acting as a proxy, retrieving Backdoor.APT.XDOOR
system information, providing a reverse command
shell, injecting DLLs, and downloading and launching
commands.
XMRIG is an open-source Monero cryptocurrency miner. It FE_Trojan_Win_XMRMiner_1
XMRIG
has variants for CPU, NVIDIA GPU, and AMD GPU mining. FE_PUP_Win_XMRig_1
Backdoor.APT.ZXShell
FE_APT_Backdoor_ZXShell
FE_APT_ZXSHELL_1
ZXSHELL is a backdoor that can be downloaded from FE_APT_ZXSHELL_2
the internet, particularly Chinese hacker websites. The FE_APT_ZXSHELL_3
backdoor can launch port scans, run a keylogger, capture FE_APT_ZXSHELL_4
screenshots, set up an HTTP or SOCKS proxy, launch a FE_APT_ZXSHELL_5
reverse command shell, cause SYN floods, and transfer/
ZXSHELL FE_APT_ZXSHELL_6
delete/run files. The publicly available version of the tool
provides a graphical user interface that malicious actors Backdoor.APT.ZXShell.SYSINFO_Command
can use to interact with victim backdoors. Simplified Backdoor.APT.ZXShell.GETCMD_Command
Chinese is the language used for the bundled ZXSHELL Backdoor.APT.ZXShell.FILEMG_Command
documentation.
Backdoor.APT.ZXShell.TRANSFILE_Command,
ZXSHELL RAT, Trojan.ZxShell
Backdoor.APT.Viper
FE_APT_VIPER
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 63

TECHNICAL ANNEX

APT41 IOCs
Table 16. CRACKSHOT

File MD5 File SHA1 File SHA256

993d14d00b1463519fea78ca65d852966
04fb0ccf3ef309b1cd587f609ab0e81e 44260a1dfd92922a621124640015160e621f32d5
3f487cd76b67b3fd35440bcdf7a8e31
049a2d4d54c511b16f8bc33dae670736bf
0b2e07205245697a749e422238f9f785 dde82093decde6371eb852a5e9a1aa4acf3b56ba
938c3542f2342192ad877ab38a7b5d
d00b3edc3fe688fa035f1b919ef6e8f4
272537bbd2a8e2a2c3938dc31f0d2461 a045939f53c5ad2c0f7368b082aa7b0bd7b116da
51a9c2197ef83d9bac3fa3af5e752243
7096f1fdefa15065283a0b7928d1ab9792
dd792f9185860e1464b4346254b2101b a260dcf193e747cee49ae83568eea6c04bf93cb3
3688c7974f98a33c94de214c675567
c667c9b2b9741247a56fcf0deebb4dc52
fcfab508663d9ce519b51f767e902806 8272c1f41f7c223316c0d78bd3bd5744e25c2e9f
b9ab4c0da6d9cdaba5461a5e2c86e0c

Table 17. GEARSHIFT

File MD5 File SHA1 File SHA256

7e0c95fc64357f12e837112987333cdaf
5b26f5c7c367d5e976aaba320965cc7f c2fb50c9ef7ae776a42409bce8ef1be464654a4e
8c1208ef8c100649eba71f1ea90c1db
4aa6970cac04ace4a930de67d4c18106c
f8c89ccd8937f2b760e6706738210744 f3c222606f890573e6128fbeb389f37bd6f6bda3
f4004ba66670cfcdaa77a4c4821a213

Table 18. HIGHNOON

File MD5 File SHA1 File SHA256

42d138d0938494fd64e1e919707e7201
46a557fbdce734a6794b228df0195474 41bac813ae07aef41436e8ad22d605f786f9e099
e6675b1122bf30ab51b1ae26adaec921
7566558469ede04efc665212b45786a
77c60e5d2d99c3f63f2aea1773ed4653 ad77a34627192abdf32daa9208fbde8b4ebfb25c
730055770f6ea8f924d8c1e324cae8691
7cd17fc948eb5fa398b8554fea036bdb
849ab91e93116ae420d2fe2136d24a87 3f1dee370a155dc2e8fb15e776821d7697583c75
3c0045880e03acbe532f4082c271e3c5
64 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Table 19. HIGHNOON.BIN

File MD5 File SHA1 File SHA256

1036a7088b060250bb66b6de91f0c6ac462 490c3e4af829e85751a44d21b25de1781
36711896cfeb67f599305b590f195aec
dc24c cfe4961afdef6bb5759d9451f530994
63e8ed9692810d562adb80f27bb1aeaf
7d51ea0230d4692eeedc2d5a4cd66d2d 5ee7c57dc84391f63eaa3824c53cc10eafc9e388
48849e468bf5fd157bc83ca83139b6d7
79190925bd1c3fae65b0d11db40ac8e6
a0a96138b57ee24eed31b652ddf60d4e 03de2118aac6f20786043c7ef0324ef01dcf4265
1fb9326ccfed9b7e09084b891089602d

Table 20. JUMPALL

File MD5 File SHA1 File SHA256

adde0644a572ed593e8b0566698d4e3de0fe c51c5bbc6f59407286276ce07f0f7ea9
ba08b593250c3ca5c13f56e2ca97d85e
fb8a 94e76216e0abe34cbf20f1b1cbd9446d

Table 21. POISONPLUG

File MD5 File SHA1 File SHA256

e65d39fa659f64a57ee13e8a638abd9
223e4cc4cf5ce049f300671697a17a01 1835c7751436cc199c55b42f34566d25fe6104ca
031fa1486311d2782f32e979d5dee1ca5
2eea29d83f485897e2bac9501ef000cc
37e100dd8b2ad8b301b130c2bca3f1ea 32466d8d232d7b1801f456fe336615e6fa5e6ffb
266ffe10019d8c529555a3435ac4aabd
5d971ed3947597fbb7e51d806647b37d
557ff68798c71652db8a85596a4bab72 971bb08196bba400b07cf213345f55ce0a6eedc8
64d9fe915b35c7c9eaf79a37b82dab90
70c03ce5c80aca2d35a5555b0532eede
830a09ff05eac9a5f42897ba5176a36a 2366d181a1697bcb4f368df397dd0533ab8b5d27
de24d4cc6bdb32a2c8f7e630bba5f26e
3e6c4e97cc09d0432fbbbf3f3e424d4a
b0877494d36fab1f9f4219c3defbfb19 4dc5fadece500ccd8cc49cfcf8a1b59baee3382a
a967d3073b6002305cd6573c47f0341f
9283703dfbc642dd70c8c76675285526
c8403fabda4d036a55d0353520e765c9 d0429abec299ddfee7e1d9ccff1766afd4c0992b
90e998bcb3f3374273c0b5c90c0d1366
f4d57acde4bc546a10cd199c70cdad0
ff8d92dfbcda572ef97c142017eec658 6f065eea36e28403d4d518b8e24bb7a915b612c3
9f576fdfe66a36b08a00c19ff6ae19661
0055dfaccc952c99b1171ce431a02abf
ffd0f34739c1568797891b9961111464 82072cb53416c89bfee95b239f9a90677a0848df
ce5c6f8fb5dc39e4019b624a7d03bfcb
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 65

Table 22. POISONPLUG.SHADOW

File MD5 File SHA1 File SHA256

faedf9fef6edac2f0565882112b2eae14e
72584d6b7dd10c82d9118567b548b2b1 f067443c2c4d99dc6577006a2f105e51af731659
dda024239d3218a9fe9ac7e0b12db6
462a02a8094e833fd456baf0a6d4e18
97363d50a279492fda14cbab53429e75 f1a181d29b38dfe60d8ea487e8ed0ef30f064763
bb7dab1a9f74d5f163a8334921a4ffde8
92cb362ae8d24c05f368d13036534fe01
a6c7db170bc7a4ee2cdb192247b59cd6 5a85d1e19e0414fc59e454ccbaef0a3c6bb41268
4344994d46031a0a8636a7ca0b792c6

Phishing Payloads

Table 23. 中東呼吸器症候群(MERS)の予防.7z

File MD5 File SHA1 File SHA256

354c174e583e968f0ecf86cc20d59ecd
5e87b09f9a3f1b728c9797560a38764b 67c957c268c1e56cc8eb34b02e5c09eae62680f5
6e0f9d21800428453b8db63f344f0f22

Table 24. Documents.7z

File MD5 File SHA1 File SHA256

bae8f4f5fc959bff980d6a6d12797b0d
8c6cceae2eea92deb6f7632f949293f0 b193ff40a98cd086f92893784d8896065faa3ee3
647e97cc811c5b9e827d0b985d87f68f
66 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Domains Email Addresses

• agegamepay[.]com • akbklxp@126[.]com
• ageofwuxia[.]com • akbklxp@163[.]com
• ageofwuxia[.]info • hackershby@126[.]com
• ageofwuxia[.]net • hrsimon59@gmail[.]com
• ageofwuxia[.]org • injuriesa@126[.]com
• bugcheck.xigncodeservice[.]com • injuriesa@163[.]com
• byeserver[.]com • injuriesa@gmail[.]com
• dnsgogle[.]com • injuriesa@hotmail[.]com
• gamewushu[.]com • injuriesa@qq[.]com
• gxxservice[.]com • kbklxp@126[.]com
• ibmupdate[.]com • petervc1983@gmail[.]com
• infestexe[.]com • ravinder10@126[.]com
• kasparsky[.]net • ravinder10@hotmail[.]com
• linux-update[.]net • ravinder10@sohu[.]com
• macfee[.]ga • wolf_zhi@yahoo[.]com
• micros0ff[.]com
• micros0tf[.]com
• notped[.]com
• operatingbox[.]com
• paniesx[.]com
• serverbye[.]com
• sexyjapan.ddns[.]info
• symanteclabs[.]com
• techniciantext[.]com
• win7update[.]net
• xigncodeservice[.]com

URLs



To learn more about FireEye, visit: www.FireEye.com

FireEye, Inc. About FireEye, Inc.


601 McCarthy Blvd. Milpitas, CA 95035 FireEye is the intelligence-led security company. Working as a
408.321.6300/877.FIREEYE (347.3393) seamless, scalable extension of customer security operations, FireEye
[email protected] offers a single platform that blends innovative security technologies,
© 2019 FireEye, Inc. All rights reserved. FireEye is nation-state grade threat intelligence, and world-renowned Mandiant®
a registered trademark of FireEye, Inc. All other consulting. With this approach, FireEye eliminates the complexity and
brands, products, or service names are or may be
trademarks or service marks of their respective burden of cyber security for organizations struggling to prepare for,
owners. SP.APT41.2019.US-EN-000209-01 prevent, and respond to cyber attacks.

You might also like