Double Dragon: APT41, A Dual Espionage and Cyber Crime Operation
Double Dragon: APT41, A Dual Espionage and Cyber Crime Operation
Double Dragon
APT41, a dual espionage and
cyber crime operation
2 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION SPECIAL REPORT | APT40 2
Table of Contents
Overview...........................................................................................4 Links to Other Known Chinese Espionage
Operators....................................................................................... 34
Case Study: Video Game Industry Targeting.............17 Technical Annex: Attack Lifecycle...................................... 42
Initial Compromise............................................................. 43
Third-Party Access.................................................................... 20 Establish Foothold............................................................. 44
Escalate Privileges............................................................. 45
Overlaps Between Espionage and Financial Technical Annex: Code-Signing Certificates Used by
Operations.....................................................................................27 APT41................................................................................................51
Background............................................................................52
Status as Potential Contractors........................................... 33 HIGHNOON............................................................................52
HIGHNOON.BIN and HIGHNOON.LITE........................52
HIGHNOON.LINUX and HIGHNOON........................... 54
CROSSWALK and CROSSWALK.BIN.......................... 54
Executive Summary
FireEye Threat Intelligence assesses with high confidence that APT41 is a Chinese
state-sponsored espionage group that is also conducting financially motivated activity for
personal gain.
The group's operations against higher education, travel services, and news/media firms
provide some indication that the group also tracks individuals and conducts surveillance.
FireEye Threat Intelligence assesses with high confidence that APT41 carries out an array
of financially motivated intrusions, particularly against the video game industry, including
stealing source code and digital certificates, virtual currency manipulation, and attempting
to deploy ransomware.
APT41 has executed multiple software supply chain compromises, gaining access to
software companies to inject malicious code into legitimate files before distributing updates.
4 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
Overview
FireEye Threat Intelligence assesses with high confidence that APT41 is
a prolific cyber threat group that carries out Chinese state-sponsored
espionage activity in addition to financially motivated activity potentially
outside of state control. Activity traces back to 2012 when individual
members of APT41 conducted primarily financially motivated operations
focused on the video game industry before expanding into likely state-
sponsored activity. This is remarkable because explicit financially motivated
targeting is unusual among Chinese state-sponsored threat groups, and
evidence suggests these two motivations were balanced concurrently from
2014 onward.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 5
• APT41 is unique among tracked China-based actors in • The group's distinct use of supply chain compromises to
that it leverages non-public malware typically reserved target select individuals, consistent use of compromised
for espionage operations in what appears to be activity digital certificates, and deployment of bootkits (rare
that falls outside the scope of state-sponsored missions. among APT operators), highlight a creative and well-
resourced adversary.
• Based on early observed activity, consistent behavior,
and APT41's unusual focus on the video game industry, • Some of the early operations driven by personal gain
we believe the group's cyber crime activities are most used techniques that would later be pivotal in executing
likely motivated by personal financial gain or hobbyist supply chain compromises.
interests. • Learning to access video game production environments
enabled APT41 to develop the tactics, techniques, and
This contrasts with the state-sponsored goals that likely
procedures (TTPs) that were later leveraged against
drive the group's healthcare, high-tech, and politically
software companies to inject malicious code into
related targeting.
software updates.
• We believe that APT41 is highly sophisticated and
APT41 campaigns include most of the incidents previously
innovative. Its history of financially motivated targeting
attributed in FireEye Threat Intelligence reporting to
of the video game industry has ultimately supported the
GREF Team and a number of additional clusters that were
group's state-sponsored activity.
previously unnamed.
6 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
Targeting
Like other Chinese espionage operators, APT41 targets
industries in a manner generally aligned with China's
Five-Year economic development plans. However, some
campaigns attributed to APT41 indicate that the group is
also deployed to gather intelligence ahead of imminent
events, such as mergers and acquisitions (M&A) and
political events. Directly targeted verticals include:
Industries Targeted
Figure 1:
Countries and Automotive Financial Pharmaceuticals
industries targeted
directly by APT41. Business Services Healthcare Retail
• We believe that like other Chinese espionage operators, APT41 has moved
toward strategic intelligence collection and establishing access, but away from
direct intellectual property theft. This shift, however, has not affected the group's
consistent interest in targeting the video game industry for financially motivated
reasons.
–– We have not observed evidence of IP theft since late 2015.
–– In 2014, APT41 was observed carrying out espionage campaigns
concurrently with financially motivated intrusions, demonstrating that they
could balance different objectives simultaneously.
• Espionage operations occurred while the group was still carrying out
financially motivated campaigns, including longer-term intrusions, which
typically extended for more than a year.
–– In one instance, APT41 was attempting to steal data from a healthcare target
while also attempting to deploy ransomware at a video game studio.
• Compromising organizations in different sectors concurrently provides some
indication that they are fulfilling specific assigned tasks.
–– Campaigns have expanded into additional industries including telecoms,
the automotive sector, higher education, and travel services.
–– In 2015, we observed a time period in which eight organizations in six
different industries were compromised simultaneously.
• Since 2017, APT41's activities have included a series of supply chain
compromises. The operation injects malware into legitimate server software
packages used by hundreds of companies worldwide but limits deployment
of additional payloads to select targets.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 9
Figure 2: Timeline
of industries
targeted by APT41.
Video Game Video Game Video Game Video Game Video Game Retail Video Game Education
Video Game Video Game Video Game Video Game Telecom Telecom Telecom
Related Related Related Related
–– This was the first instance we have observed of APT41 • In 2015, APT41 targeted a Japanese media organization
targeting pro-democracy groups in Hong Kong. with a lure document (Figure 3) titled “中東呼吸器症候
群(MERS)の予防,” which translates to "Prevention of
APT41 frequently leverages timely news stories as the
Middle East Respiratory Syndrome (MERS)." The fear of
lure content in their spear-phishing emails, although
respiratory infections and a potential pandemic provide
social engineering content does not always correlate with
particularly effective lure material against targets in the
targeted users or organizations.
Asia-Pacific region that had first-hand experience with
prior SARS and avian flu outbreaks.
Figure 3:
MERS-themed lure document leveraging for C&C (MD5: 5e87b09f9a3f1b728c9797560a38764b).
12 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
CASE STUDY
The targeting of these organizations just ahead of the –– A keylogger dubbed GEARSHIFT was first deployed at
release of products requiring a long R&D cycle can confer the medical device company. A digital certificate from
a significant market advantage to a competitor. The the victim was compromised and used to sign malware
observed activities are indicative of ongoing efforts to used in an operation against a separate biotech
support China's own R&D efforts in support of Made in company detailed below.
China 2025. • A biotech company undergoing acquisition was
targeted by APT41 in May 2015. Highly sensitive
• Between July 2014 and May 2016, APT41 targeted a
information about corporate operations, including
medical devices subsidiary of a large corporation.
human resources data, tax information, and acquisition-
–– Although APT41 initially targeted the parent company, related documents, were targeted.
30 percent of the victimized hosts were related to
–– Clinical trials data of developed drugs, academic data,
a subsidiary specialized in manufacturing medical
and R&D funding-related documents were exfiltrated.
devices. Password strings and spoofed domains
leveraged in the operation signify a narrow tasking –– The time frame, use of the same GEARSHIFT sample,
to target the subsidiary instead of the parent and a digital certificate from the aforementioned
corporation. medical device company provide some indication that
these two campaigns were conducted by the same
–– We have some indication based on the nature of hosts
operator concurrently.
targeted that APT41 was interested in information
technology employees and software used by the • In 2018, we observed APT41 target a third healthcare
medical device subsidiary. company, although their goals during this compromise
were unclear.
14 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
Operational times at gaming targets are most frequent between 18:00 and
07:00 (UTC +8), providing some indication that the group is moonlighting. Note
that this is based on data collected over years and does not represent a daily
schedule.
• The typical working hours in China for tech workers is a "996" work schedule
(9:00 a.m. to 9:00 p.m., six days a week), which is consistent with APT41's
operational activity observed over time.
• Operational times at targets not related to video games (and therefore, almost
certainly in support of state-sanctioned missions) are more frequent between
14:00 and 22:00 (China Standard Time (CST), UTC +8), closer to conventional
working hours (Figure 4).
• Analysis of compile times for all portable executable (PE) files suggests that
APT41's average working hours fall between 10:00 to 23:00 (UTC +8),
highlighting that the financially motivated activity is most likely extraneous
to their espionage operations.
• Compile times for samples used in suspected financial gain missions are skewed
toward later in the evening, roughly 19:00 to 00:00 (UTC +8). However, there
is significant overlap with the compile times of PE files deployed at espionage
targets between 15:00 to 19:00 (UTC +8).
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 15
Operational Times at
Gaming Targets
Operational Times at
Non-Gaming Targets
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
The group has also targeted cryptocurrencies, including at Giardino, which is likely a reference to an employee at
least one case in which there was a connection between Valve, an American video game developer responsible
cryptocurrency and an online video gaming platform. for the software distribution platform Steam and
various video games. The body of the email (Figure 6)
• In June 2018, APT41 sent spear-phishing emails using an also mentions gaming offerings. This provides another
invitation lure to join a decentralized gaming platform connection between the targeting of the cryptocurrency
linked to a cryptocurrency service (Figure 5) that had organizations and video game targeting.
positioned itself as a medium of exchange for online
• In October 2018, the group compiled an instance
games and gambling sites. The malicious emails were
of XMRig, a Monero cryptocurrency mining tool,
sent from an email address listed with the name Tom
demonstrating a continued interest in cryptocurrency.
16 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
Figure 5:
Screenshot of
invitation to join
the FairWin online
gaming platform.
CASE STUDY
The group leverages many TTPs during the targeting • We have also observed APT41 limitedly deploy rootkits
of video game-related organizations, which are likewise on Linux systems and Master Boot Record (MBR)
employed in their espionage operations. bootkits, such as ROCKBOOT, on Windows systems to
hide their malware and maintain persistence on victim
• Since at least 2012, APT41 has repeatedly gained access systems. Selective deployment of ROCKBOOT suggests
to game development environments within affected that APT41 reserves more advanced TTPs and malware
companies, including online multiplayer networks, as only for high-value targets.
well as targeting of production database administrators.
–– Bootkits are a stealthy means of installing malware
–– The group is competent in both Linux and Windows because the code resides outside of the OS. Because
environments and can pivot easily between bootkits are initialized prior to the OS and operate in
both environments within a single operation, kernel mode, OS applications and security tools may
including compromising intermediary servers that have great difficulty detecting bootkits.
provide access to separated Windows and Linux
–– The use of bootkits among threat actors, however,
environments.
is rare. It is more common for threat actors to rely
–– In October 2012, APT41 used captured credentials to on techniques such as DLL search order hijacking
compromise a jump server and access a production or modifying Windows registry keys to achieve
environment where they deployed a Linux version of persistence.
PHOTO. Based on the machines targeted, we have
–– The group used the Adore-NG rootkit on older Linux
some indication that APT41 specifically sought to
operating systems to hide their Linux backdoor
access production machines used in the development
ADORE.XSEC. Note that the Adore-ng rootkit is
of an upcoming online game.
no longer in development and would likely not run
–– In 2014, APT41 used a variant of SOGU that is capable successfully on modern Linux systems, but APT41
of connecting to Windows and Linux systems via SSH deployed this on a legacy game server.
and Samba/CIFS.
APT41 is well-known for leveraging compromised digital
–– APT41 has been observed inserting malicious code certificates from video game studios to sign malware. The
into legitimate video game files to distribute malware. group has abused at least 19 different certificates in this
In 2018, the group inserted CRACKSHOT malware into way. Additional details on code-signing certificates are
game files that were signed with legitimate code- provided in the section "Use of Code Signing Certificates."
signing certificates, most likely indicating access
to the production environment, which facilitated a • In 2012, APT41 used a code-signing certificate from
supply chain compromise. Mgame, a South Korean game publisher, against other
gaming industry entities. The serial number for this
§§ A highly similar incident in 2014 suggests that
certificate was:
APT41 (or a closely affiliated actor) has a history
of carrying out such operations against the video
01:00:00:00:00:01:30:73:85:f7:02
game industry.
–– APT41's experience gaining access to production
environments may have been a precursor to more
recent supply chain compromises. The insertion of
malware into a build environment for later distribution
with legitimate software is a natural extension of
the group's earliest activities. Additional details are
provided in the section "History of Supply Chain
Compromises."
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 19
• A different Mgame digital certificate has been used ransomware. We suggest that APT41 sought to target
by several other Chinese operators, including APT17, in-game currency but found they could not monetize
APT20, and APT31. It is unclear if this certificate the specific targeted game, so the group resorted to
was compromised at the same time as the one used ransomware to attempt to salvage their efforts and
by APT41 (or if it was stolen by APT41 and shared profit from the compromise.
with these other groups). The serial number for this –– This ransomware was sold via a Ransomware-as-
certificate was: a-Service (RaaS) operation that was available via a
Tor (.onion) website. Users of the ransomware were
4e:eb:08:05:55:f1:ab:f7:09:bb:a9:ca:e3:2f:13:cd charged a 20 percent fee for any collected ransom.
–– Since this was not the group's typical method
APT41 has blatantly engaged in financially motivated of choice for collecting money from a victim
activity targeting the video game industry, including environment, it is possible that APT41 turned to a pay-
manipulating virtual currencies. These activities for-service ransomware to avoid having to develop
demonstrate established connections to underground such a tool or set up the associated payment and
marketplaces and familiarity with monetization and infrastructure associated with collecting the ransom.
laundering techniques.
–– APT41 attempted to deploy the ransomware through
• Using its access to a game production environment, in a group policy (GPO) scheduled task. However, the
less than three hours the group generated tens of millions malware was unsuccessfully deployed because of a
of dollars of a popular game's virtual currency. The simple typo.
money was credited to more than 1,000 accounts and –– Figure 7 shows the ransom note associated with
most likely sold and laundered in underground markets. Encryptor RaaS, which contains default messages in
• APT41 has targeted payment services specializing in both English and German (the instruction links have
handling in-game transactions and real money transfer been redacted). Given that this is the default message,
(RMT) purchases. the languages in the note should not be considered
when determining actor origin or location.
• In a highly unusual case, APT41 attempted to extort
a game company by deploying the Encryptor RaaS
ATTENTION!
Figure 7: The files on your computer have been securely encrypted.
Screenshot of To get access to your files again, follow the instructions at:
ransomware note.
ACHTUNG!
Die Dateien auf Ihrem Computer wurden ischer verschluesselt.
Um den Zugriff auf Ihre Dateien wiederzuerlangen, folgen Sie der Anleitung auf:
20 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
Third-Party Access
In multiple instances, APT41 targeted third parties and leveraged this access to
target additional victims. APT41's exploitation of third parties varied. In some
instances, APT41 moved laterally from one victim environment to another in
order to initiate compromise. APT41 has also used credentials compromised in
previous operations.
December 2014
In December 2014, installers for three online games • Use of the same malware families (HIGHNOON.BIN,
published by a Southeast Asian video game distributor HIGHNOON.LITE, EASYNIGHT, FRONTWHEEL)
were injected with the SOGU backdoor. The installer for • Use of HIGHNOON.BIN samples with the same
these popular games was replaced by a malicious file compile times
that dropped the SOGU backdoor along with the normal
game installer. • Overlap in domain resolution to the same IP netblock
(61.38.186.0/24) during the same time frame in 2012
• The video game distributor operates servers in East • Video game-related supply chain targeting
and Southeast Asia for some of the most popular
online games, including the three games that were Despite these compelling overlaps, the actors responsible
compromised: Path of Exile, League of Legends, and for this compromise leverage additional unique tools not
FIFA Online 3 (Table 2). observed with APT41 or any other Chinese espionage
We have observed many similarities between TTPs group, suggesting that they are either part of APT41 and
involved in this compromise and APT41, including: maintain their own toolset, or a close affiliate of APT41 that
shares both tools and taskings.
• Targeting the same victim organization 31 days apart
• Use of code-signing certificates from the same video
game-related issuer organizations
March 2017
In March 2017, suspected Chinese espionage operators algorithms (DGA) for C&C, use of dead drop resolvers
targeted CCleaner, a utility that assists in the removal of (DDR), and use of shellcode as primary payloads.
unwanted files from a computer. According to the parent However, FireEye malware analysis of the compromised
company, Avast, the infected CCleaner was downloaded CCleaner samples and associated COLDJAVA samples
by 2.27 million customers. While we have identified some did not reveal shared code with the POISONPLUG and
overlaps between the CCleaner activity and APT41, we do POISONPLUG.SHADOW malware samples used in
not have enough information to attribute the CCleaner similar supply chain incidents by APT41.
compromise to APT41 at this time. –– DIRTCLEANER uses DGA to generate new C&C
domains each month. This is similar to first-stage
• Both APT41 and the actors in the CCleaner incident
malware used in the Netsarang compromise described
used TeamViewer during initial compromise. According
below.
to Avast, the actors used TeamViewer to compromise a
developer workstation and used VBScript (x64.vbs) to –– The BLACKCOFFEE sample reaches out to actor-
drop a malicious payload. controlled profiles hosted on legitimate websites to
retrieve encoded commands for C&C, a technique
• The compromised CCleaner update (which we call
known as DDR. The malware parses the content of
DIRTCLEANER) is believed to download a second-stage
the websites (listed in Table 3), looking for 12 bytes
loader (MD5: 748aa5fcfa2af451c76039faf6a8684d) that
contained between the tags: "BSM1cr0S0ft" and
contains a 32-bit and 64-bit COLDJAVA DLL payload.
"SBM1cr0Soft." APT41 POISONPLUG samples have
The COLDJAVA payload contains shellcode that loads a
also used DDR for C&C.
variant of BLACKCOFFEE (Figure 8).
–– The POISONPLUG and POISONPLUG.SHADOW
–– While COLDJAVA has been used by APT41,
samples in similar supply chain incidents use a
BLACKCOFFEE has been used by other Chinese
shellcode format that resembles PE files, while the
cyber espionage groups, including APT17 and APT40.
BLACKCOFFEE backdoor that was delivered in the
It is possible that COLDJAVA may also be shared
CCleaner compromise uses a traditional PIC blob.
between distinct cyber espionage operators.
Additionally, there is apparent code reuse between
• Malware samples identified in the CCleaner incident observed POISONPLUG and POISONPLUG samples
included notable shared design decisions observed in not observed in the CCleaner samples.
APT41 malware, including the use of domain generation
3ca2a13f646690481
dc15d78bac6d829
July 2017
In July 2017, APT41 injected malicious code into a software –– Alternatively, it is also possible that APT41 injected
update package maintained by Netsarang and signed it malicious code into the package prior to compilation,
with a legitimate Netsarang certificate in an operation circumventing the need to steal the code-signing
referred to as "ShadowPad" by Kaspersky. The software certificate and compile it on their own.
package is reportedly used by hundreds of companies • The first stage of the malware uses DGA, which changes
worldwide. its C&C servers monthly. The use of shifting network
infrastructure is most likely intended to add operational
• We observed numerous opportunistic infections
robustness and to reduce detection.
associated with POISONPLUG.SHADOW spanning 13
countries and a variety of industries, demonstrating the • The second-stage shellcode is initialized only after it
broad impact of this operation. However, we have not is activated using a decryption key retrieved from the
observed the associated second-stage at any victim first-stage DNS communications. This likely allows
organizations. Open-source reporting indicated one APT41 to selectively activate the payload on specific
victim was identified in Hong Kong. victim systems. The second-stage payload contains the
default C&C server, notped.com, which overlaps with
• Signing the malicious update with a legitimate
other APT41 C&C infrastructure. Other reported APT41
NetSarang certificate is consistent with APT41's pattern
domains that may also be related to the second-stage
of using legitimate certificates. In this case, all updates
payload can be found in Table 4.
were required to be signed by Netsarang, which means
APT41 had to use the code-signing certificate to subvert
the update mechanism.
June 2018
In June 2018, a utility used to update ASUS sequence of events, we confirm the reported stage-
computers was compromised in an operation dubbed two POISONPLUG backdoor is attributed to APT41,
"ShadowHammer" by Kaspersky. Open-source contained several gaming references, and was likely
reporting indicated that more than 50,000 systems used to target the gaming industry.
installed the malicious update, yet the malware was • The POISONPLUG sample (MD5:
only designed to execute and retrieve second-stage 37e100dd8b2ad8b301b130c2bca3f1ea) attempts to
malware on a designated list of approximately 600 connect to a Google document that was created under
systems, demonstrating this was a targeted campaign. the same name and email address (Tom Giardino and
Public reporting on the incident noted that many of the ) that was used to target the
targeted MAC addresses were associated with wireless cryptocurrency organization. It also attempts to connect
adapters from various vendors, partially indicating the to a Steam community page (Table 5).
operation's targeting strategy.
• The POISONPLUG payload uses DDR and parses the
• Although we have limited visibility into the intended Google document for a C&C command. The Steam
targets of this operation, we observed one of the community page is likely used as a fallback mechanism.
whitelisted MAC addresses on a system at a telecom • FireEye malware analysis of the POISONPLUG sample
company. indicates the malware is likely designed to run only
• Kaspersky's analysis of the infected machines revealed one system with a C: drive volume serial number of
that a POISONPLUG backdoor was installed as a result 0xc25cff4c.
of the malicious update. While we have been unable to • Additional POISONPLUG samples located in Table 6 also
attribute the DAYJOB malware used in the incident to leverage Google Document and Steam Community Pages
APT41 due to an inability to independently confirm this for C&C.
37e100dd8b2ad8b301b130c2bca3f1ea
557ff68798c71652db8a85596a4bab72
ff8d92dfbcda572ef97c142017eec658
b0877494d36fab1f9f4219c3defbfb19
ffd0f34739c1568797891b9961111464
26 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
July 2018
Beginning in July 2018, APT41 appeared to have directly • APT41 used a C&C domain that masquerades as
targeted several East and Southeast Asia-based video Xigncode, , in the
game developers and distributors to inject legitimate compromise of the video game PointBlank. Ironically,
executables with the CRACKSHOT backdoor. Xigncode is a service intended to prevent hacking and
cheating in online games.
• Like other high-profile supply chain compromises
attributed to APT41, these incidents included the • We attribute these compromises (also reported by both
ESET and Kaspersky) to APT41 based on the unique
incorporation of malicious code into legitimate
use of the CRACKSHOT backdoor and tactics consistent
executables and the signing of these files using
with APT41 operations. A list of related indicators is in
legitimate digital certificates from the same
Table 7.
compromised organization.
Figure 9:
Email overlaps
between
espionage and
financial activity.
ATTACHMENT ATTACHMENT
Documents.7z FairWin.chm
8c6cceae2eea92deb6f7632f949293f0 223e4cc4cf5ce049f300671697a17a01
28 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
>50K
victims
100s
of victims
Compromise of a
U.S. Video Game Company
SH
Identified at
AR
D Stage 1
E
CO
D E shellcode loader
a6c7db170bc7a4ee2cdb192247b59cd6
1
Telecom
Victim
Stage 2
shellcode loader
72584d6b7dd10c82d9118567b548b2b1
C&C C&C
STAGE 2
activated at
1
unknown
victim in
Hong Kong
Speculated Connection
Confirmed Connection
Unconfirmed
Confirmed
• FireEye malware analysis identified source code overlaps § Both loaders use the same API hashing algorithm
between malware used by APT41 in May 2016 targeting to resolve routines from system libraries (Figure
of a U.S.-based game development studio and the 11 and Figure 12). The routine uses byte-wise
malware observed in supply chain compromises in 2017 operations to compute a hash, including byte-wise
and 2018. rotate-right by eight bytes, byte-wise binary, OR
with 0x2, and byte-wise XOR using the four-byte
–– In May 2016, APT41 deployed a POISONPLUG
key 0x7C35D9A3. Using this routine, the hash for
sample at a U.S.-based game development studio.
The stage-one loader for this sample (MD5: kernel32.dll, a common DLL provided by Microsoft
Windows, is 0xFD5B1261.
830a09ff05eac9a5f42897ba5176a36a) shares code
overlaps with the stage-one shellcode loader (MD5: • FireEye analysis of a separate POISONPLUG payload
a6c7db170bc7a4ee2cdb192247b59cd6) used in the (MD5: c8403fabda4d036a55d0353520e765c9)
Netsarang compromise, first reported by Kaspersky compiled in July 2017 and the POISONPLUG.
as ShadowPad. These connections, illustrated in SHADOW stage-two shellcode loader (MD5:
Figure 10, led us to identify the malware used in the 72584d6b7dd10c82d9118567b548b2b1) identified
Netsarang incident as a variant of POISONPLUG multiple additional plug-in similarities.
(therefore: POISONPLUG.SHADOW). –– Core plug-in IDs between the samples are the same,
–– The POISONPLUG and POISONPLUG.SHADOW including 100, 101, 102, 103, 104, and 201.
variants share the observed commonalities: –– Core plug-in names are the same including Plugins,
§ The entrypoint functions for both loaders use the Online, Config, Install, and HTTP.
same instructions, constants, and structures to pass –– C&C plug-in IDs and names between both samples
control to loading routines. are the same, including 200/TCP, 201/HTTP, 202/UDP,
§ The layout of functions and data within the 203/DNS, 204/HTTPS, and 205/SSL.
loaders are the same; for example, following the –– Both samples parse the C&C response by searching
entrypoint, both loaders contain an unusual region for "$" characters and decoding the result.
of structured data 0x60 bytes long.
30 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
Attribution
We assess with high confidence that APT41 is attributable ––
to Chinese individuals who are working on behalf of the ––
Chinese state in conducting cyber espionage operations,
and that these actors are also running financially ––
motivated campaigns for personal gain. ––
Zhang Xuguang (张旭光) registered more than a dozen
domains masquerading as video games or companies ––
with trusted relationships with video game developers/
distributors. Long-running activity provides a catalog of
Zhang's efforts to improve his skills and expertise over time. In 2005, Zhang posted personal information on “华夏黑
客同盟” (Chinese Hackers Alliance), a popular Chinese
• Additional names include: kbkxlp, akbkxlp, injuriesa, online forum, that listed his date of birth as 1989, that he
ravinder10, Addison Lau, and addison jack previously lived in Inner Mongolia, and that he specialized
• Associated email addresses: in script hacking (Figure 13). Zhang's profile indicated
he was 16, going on 17, and he was applying to be the
–– administrator of a script hacking forum.
––
• Spoofed domains most likely targeted players of games
–– such as "Age of Wuxia," a massively multiplayer online
–– role-playing game (MMORPG) themed on cultural
references to dynastic China. Zhang Xugang's interest
––
in these games is also apparent in his registration and
–– posting on a forum dedicated to the Age of Wuxia
–– (Figure 14).
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 31
Figure 13:
Screenshot of
Zhang's profile,
with "Zhang
Xuguang"
highlighted in
orange.
Figure 14:
Zhang posting
to Age of Wuxia
forum, with his
alias "injuriesa"
highlighted in
yellow.
32 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
Wolfzhi is linked to a 2017 profile on a data science • Examples of domains registered under the wolf_zhi alias:
community page, which indicated that he had 10 years ––
working experience at the time of the posting, with
significant experience in Oracle and Python. Other ––
documents linked to his email accounts also highlight his ––
programming skills and database experience.
• Posts in a forum provide some indication he is from
• Additional aliases include: wolf_zhi, wolfjiao, jiaozhiq, Beijing or Hebei, the surrounding Chinese province. This
and jiaozhiqiang is also consistent with information found in early domain
registrations created by Wolfzhi (Figure 15).
Domain:
Figure 15:
Domain Registrant
registration by Wolfzhi
Wolfzhi. Wolfzhi ( )
beijingxxxdaxia
beijing
beijing, 100000
US
Tel. +86.2011111111
Additional indicators of Chinese attribution include: the • Compiled HTML (.chm) files used in targeting contained
reliance on malware used exclusively by Chinese espionage a language code set to "Chinese (Simplified)" despite
operators, the use of Chinese-language strings, time zone the lure content being in the target region's language
and operational time analysis, and targeting consistent (English or otherwise).
with Beijing's interests. • Compile and operational times of APT41 activity
suggest the bulk of the group's work hours, 10:00
• The use of tools leveraged only by several other
and 23:00 (UTC +8), are consistent with the Chinese
Chinese operators such as HOMEUNIX and HIGHNOON
workday, especially for tech sector employees on a "996
provides some indication that APT41 relies on the similar
schedule."
resources and support as these other Chinese groups.
APT41 also leverages PHOTO (aka "Derusbi") and SOGU –– Figure 4 shows a breakdown of all of the operational
(aka "Destroy RAT" and "PlugX"), tools shared much activity within victim environments, separated
more widely among Chinese espionage groups. See the between gaming and espionage (non-gaming)
section "Links to Other Known Chinese Operators" for activity. Analysis of the times where APT41 modified
more details. or accessed a file within a victim environment, shows
a concentration between 10:00 and 18:00 (UTC+8).
• An APT41 HIGHNOON sample (MD5:
36711896cfeb67f599305b590f195aec) from 2012 • Targeting of healthcare, semiconductors, and telecoms
contained a process debugging path (.pdb) with the is consistent with Chinese state interests and parallels
Chinese-language directory "D:\桌面\木马," which activity from other Chinese espionage groups.
translates to "D:\Desktop\trojan."
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 33
Figure 16:
Ocean injection
tool posted by
Zhang.
34 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
Certificate Overlap
A digital certificate issued by YNK Issuer: CN=VeriSign Class 3 Code Signing 2009-2 CA
Japan that was publicly reported Subject: CN=YNK JAPAN Inc
as being used by Winnti has been Serial Number: 67:24:34:0d:db:c7:25:2f:7f:b7:14:b8:12:a5:c0:4d
used by multiple Chinese espionage Issue-Date: 11/27/09 , Expiration-Date: 11/27/11
operators, including APT17, and
APT20, and APT41.
Launcher Overlap
The use of DLL side-loading has been a source of executable allows actors to bypass host-based security
continued confusion when used as an indicator for distinct measures. For this reason, it continues to be popular
operations. This technique uses a legitimate and often mechanism used by multiple groups. This also explains
digitally signed executable to essentially trick a system why the use of these DLL filenames is not a unique
into launching a malicious DLL because it has been given indicator for distinct APT operators. Table 9 contains
the same name as a legitimate DLL normally loaded by legitimate executables used by APT41 and selected other
the executable. The use of a valid and digitally signed Chinese cyber espionage groups for DLL side-loading:
Table 9. Legitimate files used by different APT groups for DLL side-loading.
09b8b54f78a10c435cd319070aa13c28 nvSmartEx.exe X X X X
26a196afc8e6aff6fc6c46734bf228cb form.exe X X
A significant number of non-public tools used by –– HIGHNOON, one of the main code families observed
APT41 are shared with other distinct Chinese espionage being used by APT41, was also used by APT17 in 2015
operators. Source code overlaps between observed to target semiconductor and chemical manufacturers.
code families indicate potential access to shared code –– HOMEUNIX, another popular backdoor used by
repositories or common developers between groups. APT41, has been used by at least 14 separate Chinese
espionage groups, including APT1, APT10, APT17,
• APT41 has used several malware families that have
APT18, and APT20.
also been used by other Chinese espionage operators,
including variants of HIGHNOON, HOMEUNIX, PHOTO, –– JUMPALL is a dropper that has been observed
SOGU, and ZXSHELL, among others. Table 10 illustrates dropping variants of the HIGHNOON, ZXSHELL, and
some of overlap between malware families used by SOGU code families attributed to APT17 and APT41.
APT41 and other APT groups. Note that this is only for
illustration purposes and is not indicative of all observed
malware families used by these APT groups or all groups
that have used those families.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 37
Table 10. Code family overlap among different Chinese espionage groups.
BLACKCOFFEE X X X
CHINACHOP X X X
COLDJAVA X
HIGHNOON X X
HIGHNOON.BIN X X
HIGHNOON.LITE X
HOMEUNIX X X X X X
JUMPALL X X
Table 11. CLASSFON sample with internal name "DrvDll.dll" and contains reference to "PlusDll.dll".
• APT41 has not only shared the same tools with other –– PDB paths identified in related APT41 HIGHNOON.
Chinese espionage operators but also appears to have BIN samples contain the name "RBDoor," which
access to shared source code or developers as well. has also been identified in samples of HIGHNOON,
HIGHNOON.LITE, HIGHNOON.CLI, and GEARSHIFT
–– APT41 has used CROSSWALK.BIN, a kernel driver,
(Figure 17). APT41 files containing PDB paths
to circumvent firewalls and covertly send data.
referencing "RBDoor" are listed in Table 13. At least
Another Chinese espionage group used a similar
two of these malware families, HIGHNOON.CLI and
tool, CLASSFON, to covertly proxy network
GEARSHIFT, have been used by APT17 and another
communications in 2011.
suspected Chinese espionage group.
§§ CLASSFON (MD5:
• Further information regarding code family overlaps
9e1a54d3dc889a7f0e56753c0486fd0f) has an
between variants can be found in "Technical Annex:
internal name of DrvDll.dll and an embedded device
Additional Malware Overlaps."
driver that is internally named PlusDll.dll (Table 11).
The PlusDll.dll filename has also been identified in
APT41 HIGHNOON.BIN samples (Table 12).
38 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
H:\Double-V1\stone_srv\Bin\RbDoor64.pdb
Figure 17: H:\Double\Door_wh\AppInit\x64\Release\AppInit.pdb
PDB paths H:\Double\Door_wh\RbDoorX64\x64\Release\RbDoorX64.pdb
containing
"RBDoor".
H:\Double\door_wh_kav\Bin\RbDoor64.pdb
H:\RBDoor\Anti_winmm\AppInit\AppInit\Release\AppInit.pdb
H:\RBDoor\Anti_winmm\AppInit\AppInit\x64\Release\AppInit.pdb
H:\RBDoor\Anti_winmm\AppInit\ShutDownEvent\x64\Release\ShutDownEvent.pdb
H:\RbDoor\Anti_winmm\AppInit\AppInit\Release\AppInit.pdb
H:\RbDoor\Anti_winmm\AppInit\RbDoorX64\Release\RbDoor.pdb
H:\RbDoor\Anti_winmm\AppInit\ShutDownEvent\Release\ShutDownEvent.pdb
H:\RbDoor\Lib\WMI_SSL\RemoteLib\bin\TestRjLib.pdb
H:\Svn\Double-V1\stone_srv\Bin\RbDoor64.pdb
46a557fbdce734a6794b228df0195474 HIGHNOON
77c60e5d2d99c3f63f2aea1773ed4653 HIGHNOON
a0a96138b57ee24eed31b652ddf60d4e HIGHNOON.BIN
7d51ea0230d4692eeedc2d5a4cd66d2d HIGHNOON.BIN
849ab91e93116ae420d2fe2136d24a87 HIGHNOON.BIN
ba08b593250c3ca5c13f56e2ca97d85e JUMPALL
f8c89ccd8937f2b760e6706738210744 GEARSHIFT
5b26f5c7c367d5e976aaba320965cc7f GEARSHIFT
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 39
Zepetto Co.
En Masse Entertainment
GameUS Inc.
Shanda Games
NetSarang Computer
XL Games Co.
Mgame Corp
xlgames
Neowix Corporation
Webzen Inc.
TECHNICAL ANNEX
Attack Lifecycle
Maintain Presence Move Laterally
Figure 19:
APT41 attack
• ADORE.XSEC • HIGHNOON
lifecycle.
• CROSSWALK • SOGU
• CROSSWALK.BIN • Brute-force local
• FRONTWHEEL admin account
• HIGHNOON • Creation of user accounts
• HIGHNOON.BIN added to User and
• HIGHNOON.LINUX Admin groups
• HOMEUNIX • Modification of the
• PACMAN legitimate WMI
• PHOTO Performance Adapter
• POISONPLUG • RDP
• POWERSPLOIT • Scheduled tasks
• ROCKBOOT • Stolen credentials
• SOGU
• Scheduled tasks
• Startup files
• Sticky Keys Vulnerability
• Windows Registry
modifications
Initial Compromise Establish Foothold Escalate Privilege Internal Reconnaisance Complete Mission
• In a campaign running almost one year, APT41 compromised hundreds of systems and
used close to 150 unique pieces of malware including backdoors, credential stealers,
keyloggers, and rootkits.
• We have observed TeamViewer credentials used as an entry point in multiple intrusions
across industries. In these instances, APT41 leveraged TeamViewer to transfer malware
into the compromised environment, although we do not have direct evidence of APT41
compromising TeamViewer.
–– In July 2017, APT41 initiated a TeamViewer session and transferred files that were
later deleted. Filenames and creation times indicate that these may have been the
HIGHNOON backdoor.
–– In May 2018, APT41 used TeamViewer for initial entry in the compromise of a healthcare
company. During this intrusion, APT41 started a TeamViewer session and shortly
after transferred DLL files associated with the CROSSWALK backdoor to the victim
environment before deploying CROSSWALK.
The group has leveraged several exploits in their operations. Notably, APT41 was observed
using proof-of-concept exploit code for CVE-2019-3396 within 23 days after the
Confluence vulnerability was announced.
Observed Vulnerabilities
• CVE-2012-0158
• CVE-2015-1641
• CVE-2017-0199
• CVE-2017-11882
• CVE-2019-3396
Establish APT41 uses a variety of malware and tools, both public and unique to the group, to
Foothold establish a foothold with a victim's environment, including:
APT41 has been observed using Linux and Windows variants of the same malware families,
such as PHOTO and HIGHNOON. The group often initially installs its backdoors to c:\
windows\temp.
We have observed APT41 attempting to masquerade their files and domains as popular
anti-virus software:
•
•
•
APT41 appears to use the commercially available Beacon backdoor that is part of the
Cobalt Strike pen-testing software platform. In at least one instance, a server used for
Beacon C&C was also leveraged for CROSSWALK C&C.
On multiple occasions, APT41 leveraged the Sticky Keys vulnerability and PowerShell to
deploy malware families in victims' environments.
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 45
Escalate APT41 escalates its privileges in systems by leveraging custom-made and publicly available
Privileges tools to gather credentials and dump password hashes. The tools include:
• ACEHASH • NTDSDump
• GEARSHIFT • PHOTO
• GOODLUCK • PwDump
• Mimikatz • WINTERLOVE
• WIDETONE is capable of conducting port scans and password brute-force attacks and
collecting network information. It contains an embedded variant of a publicly available
enumeration tool and can be run with the following options:
–– "-hscan" scans the specified IP range for IPC and SQL services.
–– "-enum" queries a Windows host for requested information, such as users, groups/
members, policies, and more.
46 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
APT41 assesses the network architecture of an organization and identifies pivotal systems
for enabling further access. The group has repeatedly identified intermediary systems that
provide access to otherwise segmented parts of an organization's network (as outlined
in Case Study: Video Game Industry Targeting). Once APT41 has identified intermediary
systems, it moves quickly to compromise systems. In one case, hundreds of systems across
several geographic regions were compromised in as little as two weeks.
APT41 frequently uses the publicly available utility WMIEXEC to move laterally across
an environment. WMIEXEC is a tool that allows for the execution of WMI commands on
remote machines. Examples of commands executed by the utility include:
• Hours after a victimized organization made changes to thwart APT41, the group
registered a new C&C domain, compiled a new SOGU backdoor variant, and deployed
the new backdoor to several systems across multiple geographic regions.
• APT41 sent spear-phishing emails to multiple HR employees three days after the
compromise had been remediated and systems were brought back online. Within hours
of a user opening the malicious attachment dropping a HOMEUNIX backdoor, APT41
regained a foothold within the environment by installing PHOTO on the organization's
servers across multiple geographic regions.
48 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
APT41 has been observed creating a RAR archive of targeted files for exfiltration. The group
has also manipulated in-game currencies using the targets' databases after compromising
production environments. During multiple engagements, APT41 attempted to remove
evidence of some of its activity by deleting Bash histories, clearing Windows security and
Complete system events, and modifying DNS management to avoid anti-virus detections.
Mission In at least one instance, the group attempted to deploy Encryptor RaaS. However, an
operator's typo prevented the ransomware from executing in the victim's environment.
TECHNICAL ANNEX
Exfiltration
Collection
t1002 Data Compressed
t1119 Automated Collection
t1022 Data Encrypted
t1213 Data from Information Repositories
t1041 Exfiltration Over Command and Control Channel
t1005 Data from Local System
t1056 Input Capture
t1113 Screen Capture Impact
t1487 Data Encrypted for Impact
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 51
TECHNICAL ANNEX
Code-Signing Certificates
Used by APT41
Table 14. Code-signing certificates used by APT41.
Expiry
Serial Common Name Issue Date Status
Date
Guangzhou YuanLuo
0b:72:79:06:8b:eb:15:ff:e8:06:0d:2c:56:15:3c:35 6/12/12 6/12/13 Revoked
Technology Co.
18:63:79:57:5a:31:46:e2:6b:ef:c9:0a:58:0d:1b:d2 Webzen Inc. 8/2/11 9/30/13 Revoked
Guangzhou YuanLuo
14:0d:2c:51:5e:8e:e9:73:9b:b5:f1:b2:63:7d:c4:78 10/22/13 10/22/14 Revoked
Technology Co.
58:01:5a:cd:50:1f:c9:c3:44:26:4e:ac:e2:ce:57:30 Nanjing Ranyi Technology Co. 8/8/12 8/8/13 Revoked
TECHNICAL ANNEX
HIGHNOON (MD5: df143c22465b88c4bdb042956fef8121) • HIGHNOON and HIGHNOON.LITE also share the same
uses an API hashing algorithm to resolve its imports at configuration encoding routine.
runtime, but the layout of the in-memory DLL loading
• HIGHNOON, HIGHNOON.LITE, and HIGHNOON.BIN
functionality is identical between HIGHNOON, HIGHNOON.
BIN, and HIGHNOON.LITE samples (Figure 21). The specific store a unique host identifier under the registry key
samples of HIGHNOON, HIGHNOON.BIN, and HIGHNOON. HKLM\SOFTWARE\Microsoft\HTMLHelp
LITE referenced previously are not attributed to APT41 but
are instead used by other suspected Chinese groups.
resolve_APIS():
Figure 21: v3 = (_DWORD *)((char *)a1 + a1[15]);
v4 = (_DWORD *)VirtualAlloc(v3[13], v3[20]. 0x2000, 0x40);
HIGHNOON DLL if ( !v4 )
loading function. {
result = (_DWORD *)VirtualAlloc(0, v3[20], 0x2000, 0x40);
if ( !result )
return result;
v4 = result;
}
v6 = (void *)GetProcessHeap(0, 0x14);
v7 = HeapAlloc(v6, v13, v14);
v7[1] = v4;
v7[3] = 0;
v7[2] = 0;
v7[4] = 0;
VirtualAlloc(v4, v3[20], 0x1000, 0x40);
v8 = (char *)VirtualAlloc(v4, v3[21], 0x1000, 0x40);
qmemcopy(v8, a1, a1[15] + v3[21]);
v9 = (int)&v8[*(_DWORD *)(a3 + 60)];
*v7 = v9;
*(_DWORD *)(v9 + 52) = a1;
sub_100016A0(a3, v3, v7);
v10 = (char *)v3[13];
if ( a1 != (_DWORD *)v10 )
sub_10001830(v7, (char *)a1 - v10);
if ( !sub_10001770(v7) )
return 0;
sub_10001770(v7);
v11 = *(_DWORD *)(*v7 + 40);
if ( v11 )
{
v12 = (char *)a1 + v11;
if ( !v12 || !((int (cdec1 *)(_DWORD *, int, _DWORD))v12)(a1, 1, 0) )
return 0;
v7[4] = 1;
}
return v7;
}
54 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
Obfuscation and Anti-Analysis Overlaps However, there are differences between the two malware
• Both code families share the same function at the start families, including how they communicate to C&C servers.
of their shellcode to de-obfuscate subsequent shellcode.
• CROSSWALK beacons with HTTP GET and POST requests,
• A key function within the shellcode component that while CROSSWALK.BIN uses a custom binary protocol.
generates a semi-random XOR key and is used in
multiple code locations for decoding is identical in • CROSSWALK.BIN contains a driver component for
CROSSWALK and CROSSWALK.BIN. covert C&C, which CROSSWALK lacks.
• Both use the same function for import resolution via an • Both families contain similar code to process identical
ASCII hash. message types, but their answers differ.
–– CROSSWALK.BIN answers to 0x78 and 0x7A
message types by calling large functions wrapping
the business logic.
TECHNICAL ANNEX
FE_APT_Trojan_Win32_HIGHNOON_1
HIGHNOON.BIN is a modified version of the Windows DLL FE_APT_Loader_Win32_HIGHNOON_1
apphelp.dll, which is loaded via search order hijacking. FE_APT_Loader_Win64_HIGHNOON_1
HIGHNOON.BIN
HIGHNOON.BIN contains a malicious shellcode backdoor FE_APT_Trojan_Win32_HIGHNOON_2
that is loaded into memory at runtime. APT.Backdoor.Win.HIGHNOON
APT.Backdoor.Win.HIGHNOON
HIGHNOON.LITE is a standalone, non-persistent variant of
the HIGHNOON backdoor. This version accepts a hostname
and port on the command line. If no port is specified, the FE_APT_Trojan_Win32_HIGHNOON_7
HIGHNOON.LITE
malware will use port 80 by default. HIGHNOON.LITE
can download and execute additional memory-resident
modules after it authenticates with the C&C server.
HIGHNOON.LINUX is a Linux backdoor designed to FE_APT_Trojan_Linux64_HIGHNOON_1
operate with a rootkit and can launch and establish
HIGHNOON.LINUX FE_APT_Rootkit_Linux64_HIG
persistence for an sshd client whose presence and activity
is hidden by the rootkit. HNOON_1
TECHNICAL ANNEX
APT41 IOCs
Table 16. CRACKSHOT
993d14d00b1463519fea78ca65d852966
04fb0ccf3ef309b1cd587f609ab0e81e 44260a1dfd92922a621124640015160e621f32d5
3f487cd76b67b3fd35440bcdf7a8e31
049a2d4d54c511b16f8bc33dae670736bf
0b2e07205245697a749e422238f9f785 dde82093decde6371eb852a5e9a1aa4acf3b56ba
938c3542f2342192ad877ab38a7b5d
d00b3edc3fe688fa035f1b919ef6e8f4
272537bbd2a8e2a2c3938dc31f0d2461 a045939f53c5ad2c0f7368b082aa7b0bd7b116da
51a9c2197ef83d9bac3fa3af5e752243
7096f1fdefa15065283a0b7928d1ab9792
dd792f9185860e1464b4346254b2101b a260dcf193e747cee49ae83568eea6c04bf93cb3
3688c7974f98a33c94de214c675567
c667c9b2b9741247a56fcf0deebb4dc52
fcfab508663d9ce519b51f767e902806 8272c1f41f7c223316c0d78bd3bd5744e25c2e9f
b9ab4c0da6d9cdaba5461a5e2c86e0c
7e0c95fc64357f12e837112987333cdaf
5b26f5c7c367d5e976aaba320965cc7f c2fb50c9ef7ae776a42409bce8ef1be464654a4e
8c1208ef8c100649eba71f1ea90c1db
4aa6970cac04ace4a930de67d4c18106c
f8c89ccd8937f2b760e6706738210744 f3c222606f890573e6128fbeb389f37bd6f6bda3
f4004ba66670cfcdaa77a4c4821a213
42d138d0938494fd64e1e919707e7201
46a557fbdce734a6794b228df0195474 41bac813ae07aef41436e8ad22d605f786f9e099
e6675b1122bf30ab51b1ae26adaec921
7566558469ede04efc665212b45786a
77c60e5d2d99c3f63f2aea1773ed4653 ad77a34627192abdf32daa9208fbde8b4ebfb25c
730055770f6ea8f924d8c1e324cae8691
7cd17fc948eb5fa398b8554fea036bdb
849ab91e93116ae420d2fe2136d24a87 3f1dee370a155dc2e8fb15e776821d7697583c75
3c0045880e03acbe532f4082c271e3c5
64 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
1036a7088b060250bb66b6de91f0c6ac462 490c3e4af829e85751a44d21b25de1781
36711896cfeb67f599305b590f195aec
dc24c cfe4961afdef6bb5759d9451f530994
63e8ed9692810d562adb80f27bb1aeaf
7d51ea0230d4692eeedc2d5a4cd66d2d 5ee7c57dc84391f63eaa3824c53cc10eafc9e388
48849e468bf5fd157bc83ca83139b6d7
79190925bd1c3fae65b0d11db40ac8e6
a0a96138b57ee24eed31b652ddf60d4e 03de2118aac6f20786043c7ef0324ef01dcf4265
1fb9326ccfed9b7e09084b891089602d
adde0644a572ed593e8b0566698d4e3de0fe c51c5bbc6f59407286276ce07f0f7ea9
ba08b593250c3ca5c13f56e2ca97d85e
fb8a 94e76216e0abe34cbf20f1b1cbd9446d
e65d39fa659f64a57ee13e8a638abd9
223e4cc4cf5ce049f300671697a17a01 1835c7751436cc199c55b42f34566d25fe6104ca
031fa1486311d2782f32e979d5dee1ca5
2eea29d83f485897e2bac9501ef000cc
37e100dd8b2ad8b301b130c2bca3f1ea 32466d8d232d7b1801f456fe336615e6fa5e6ffb
266ffe10019d8c529555a3435ac4aabd
5d971ed3947597fbb7e51d806647b37d
557ff68798c71652db8a85596a4bab72 971bb08196bba400b07cf213345f55ce0a6eedc8
64d9fe915b35c7c9eaf79a37b82dab90
70c03ce5c80aca2d35a5555b0532eede
830a09ff05eac9a5f42897ba5176a36a 2366d181a1697bcb4f368df397dd0533ab8b5d27
de24d4cc6bdb32a2c8f7e630bba5f26e
3e6c4e97cc09d0432fbbbf3f3e424d4a
b0877494d36fab1f9f4219c3defbfb19 4dc5fadece500ccd8cc49cfcf8a1b59baee3382a
a967d3073b6002305cd6573c47f0341f
9283703dfbc642dd70c8c76675285526
c8403fabda4d036a55d0353520e765c9 d0429abec299ddfee7e1d9ccff1766afd4c0992b
90e998bcb3f3374273c0b5c90c0d1366
f4d57acde4bc546a10cd199c70cdad0
ff8d92dfbcda572ef97c142017eec658 6f065eea36e28403d4d518b8e24bb7a915b612c3
9f576fdfe66a36b08a00c19ff6ae19661
0055dfaccc952c99b1171ce431a02abf
ffd0f34739c1568797891b9961111464 82072cb53416c89bfee95b239f9a90677a0848df
ce5c6f8fb5dc39e4019b624a7d03bfcb
SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION 65
faedf9fef6edac2f0565882112b2eae14e
72584d6b7dd10c82d9118567b548b2b1 f067443c2c4d99dc6577006a2f105e51af731659
dda024239d3218a9fe9ac7e0b12db6
462a02a8094e833fd456baf0a6d4e18
97363d50a279492fda14cbab53429e75 f1a181d29b38dfe60d8ea487e8ed0ef30f064763
bb7dab1a9f74d5f163a8334921a4ffde8
92cb362ae8d24c05f368d13036534fe01
a6c7db170bc7a4ee2cdb192247b59cd6 5a85d1e19e0414fc59e454ccbaef0a3c6bb41268
4344994d46031a0a8636a7ca0b792c6
Phishing Payloads
354c174e583e968f0ecf86cc20d59ecd
5e87b09f9a3f1b728c9797560a38764b 67c957c268c1e56cc8eb34b02e5c09eae62680f5
6e0f9d21800428453b8db63f344f0f22
bae8f4f5fc959bff980d6a6d12797b0d
8c6cceae2eea92deb6f7632f949293f0 b193ff40a98cd086f92893784d8896065faa3ee3
647e97cc811c5b9e827d0b985d87f68f
66 SPECIAL REPORT | DOUBLE DRAGON: APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION
• agegamepay[.]com • akbklxp@126[.]com
• ageofwuxia[.]com • akbklxp@163[.]com
• ageofwuxia[.]info • hackershby@126[.]com
• ageofwuxia[.]net • hrsimon59@gmail[.]com
• ageofwuxia[.]org • injuriesa@126[.]com
• bugcheck.xigncodeservice[.]com • injuriesa@163[.]com
• byeserver[.]com • injuriesa@gmail[.]com
• dnsgogle[.]com • injuriesa@hotmail[.]com
• gamewushu[.]com • injuriesa@qq[.]com
• gxxservice[.]com • kbklxp@126[.]com
• ibmupdate[.]com • petervc1983@gmail[.]com
• infestexe[.]com • ravinder10@126[.]com
• kasparsky[.]net • ravinder10@hotmail[.]com
• linux-update[.]net • ravinder10@sohu[.]com
• macfee[.]ga • wolf_zhi@yahoo[.]com
• micros0ff[.]com
• micros0tf[.]com
• notped[.]com
• operatingbox[.]com
• paniesx[.]com
• serverbye[.]com
• sexyjapan.ddns[.]info
• symanteclabs[.]com
• techniciantext[.]com
• win7update[.]net
• xigncodeservice[.]com
URLs
To learn more about FireEye, visit: www.FireEye.com