Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government
Unit 42 identified a coordinated cyberespionage campaign targeting a Southeast Asian government entity, involving three distinct China-aligned threat clusters. The attackers utilized a variety of tools including USB worms, custom loaders, and multiple remote access Trojans (PUBLOAD, Masol, Gorem, FluffyGh0st) to establish persistent access, evade detection via DLL sideloading, and exfiltrate sensitive data.
Authors: Unit 42
Source:Palo Alto Networks
- domainlaichingte[.]netEggStremeFuel C2 server domain
- domainwebmail[.]rpcthai[.]comFluffyGh0st C2 server domain
- filenameC:\Program Files\Common Files\Bitdefender\SetupInformation\version.dllPath used for Hypnosis loader DLL sideloading
- sha25605995284b59ad0066350f43517382228f7eee63cd297e787b2a271f69ecf2dfcMasol RAT (AxInstSVs.dll)
- sha2561aa37a477c539edf25656a300002a28d4246ec83344422dd705b42d3443a2623EggStremeFuel backdoor (mscorsvc.dll)
- sha2564b29b74798a4e6538f2ba245c57be82953383dc91fe0a91b984b903d12043e92ClaimLoader / EVENT.dll used to load PUBLOAD backdoor
- sha2569d7c8d3bc4ac108fb2602424a1f4918c051c2443f0526bbb2c970c8e57dbd90dHypnosis loader (version.dll) sideloaded by Bitdefender executable
Key Takeaways
- Three distinct China-aligned threat clusters (Stately Taurus, CL-STA-1048, CL-STA-1049) conducted a coordinated cyberespionage campaign against a Southeast Asian government.
- Stately Taurus utilized the USBFect worm to propagate via removable media and deploy the PUBLOAD backdoor and CoolClient loader.
- CL-STA-1048 deployed a diverse espionage toolkit including EggStremeFuel, Masol RAT, Gorem RAT, and the TrackBak stealer.
- CL-STA-1049 used a novel DLL sideloading tool named Hypnosis loader to deploy the FluffyGh0st RAT, patching host process entry points to evade detection.
- The campaign demonstrated heavy reliance on DLL sideloading of legitimate binaries (e.g., Bitdefender's seccenter.exe) and in-memory execution techniques.
Affected Systems
- Windows OS
- Microsoft Edge (mscorsvw.exe)
- Bitdefender (seccenter.exe)
- MsMpEng.exe
- winlogon.exe
- rundll32.exe
Attack Chain
The campaign began with Stately Taurus using the USBFect worm to propagate via removable drives, dropping the ClaimLoader to execute the PUBLOAD backdoor in memory. Concurrently, CL-STA-1048 deployed a suite of tools including the EggStremeFuel backdoor, Masol RAT, and Gorem RAT, utilizing DLL sideloading and reflective injection into processes like MsMpEng.exe to establish persistence and exfiltrate data. Finally, CL-STA-1049 utilized a novel Hypnosis loader sideloaded via a legitimate Bitdefender executable (seccenter.exe) to deploy the FluffyGh0st RAT, patching the host process entry point with an infinite Sleep loop to evade detection and maintain stealth.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
The article does not provide specific detection rules (YARA, Sigma, etc.) but offers extensive IOCs including file hashes, domains, IPs, and file paths for threat hunting.
Detection Engineering Assessment
EDR Visibility: High — The attackers heavily rely on DLL sideloading, process injection (MsMpEng.exe, winlogon.exe), and dropping files to disk, which are highly visible to modern EDR solutions. Network Visibility: Medium — C2 communications use standard protocols (HTTP, TCP, gRPC) and fake TLS headers, which can blend in with legitimate traffic, though specific domains and IPs are identifiable. Detection Difficulty: Moderate — While the malware uses anti-disassembly and in-memory execution, the reliance on specific file paths, DLL sideloading of known legitimate binaries, and USB propagation provides solid detection opportunities.
Required Log Sources
- Event ID 1 (Process Creation)
- Event ID 7 (Image Loaded)
- Event ID 11 (File Create)
- Event ID 3 (Network Connection)
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Hunt for suspicious DLLs loaded by legitimate Microsoft or Bitdefender binaries (e.g., seccenter.exe, mscorsvw.exe) from unusual directories. | Event ID 7 (Image Loaded) combined with Event ID 1 (Process Creation) | Execution / Persistence | Low |
| Look for unexpected file creation events in removable media drives, specifically files named EVENT.dll or hidden directories. | Event ID 11 (File Create) on removable drives | Initial Access / Lateral Movement | Low |
| Monitor for processes establishing network connections to unknown external IPs using gRPC or mismatched TLS headers. | Network flow logs, Event ID 3 (Network Connection) | Command and Control | Medium |
| Detect anomalous modifications or creations of files in %APPDATA%\Microsoft\Windows\Cookies\ or %LOCALAPPDATA%\Microsoft\Windows\Explorer\thumbcache.dat. | Event ID 11 (File Create) and File Modification events | Collection / Command and Control | Low |
Control Gaps
- USB Device Control
- Application Control (allowing sideloading)
Key Behavioral Indicators
- DLL sideloading via seccenter.exe
- Infinite Sleep loop patching in host processes
- Fake TLS headers (17 03 03) over TCP
- CryptEnumOIDInfo API used for shellcode execution
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Block all identified C2 domains and IP addresses.
- Search endpoints for the provided file hashes and file paths.
- Isolate any systems exhibiting signs of USBFect or PUBLOAD infection.
Infrastructure Hardening
- Implement strict USB device control policies to prevent unauthorized removable media.
- Enforce application control to block unauthorized DLLs from loading, even by legitimate applications.
User Protection
- Deploy and tune EDR to detect DLL sideloading and process injection techniques.
- Ensure antivirus definitions are updated to catch known variants of PUBLOAD, Masol RAT, and FluffyGh0st.
Security Awareness
- Train users on the risks of plugging in untrusted USB drives.
- Educate staff on recognizing signs of unauthorized access or unusual system behavior.
MITRE ATT&CK Mapping
- T1091 - Replication Through Removable Media
- T1574.002 - Hijack Execution Flow: DLL Side-Loading
- T1055.001 - Process Injection: Dynamic-link Library Injection
- T1056.001 - Input Capture: Keylogging
- T1140 - Deobfuscate/Decode Files or Information
- T1071.001 - Application Layer Protocol: Web Protocols
- T1027 - Obfuscated Files or Information
Additional IOCs
- Ips:
103[.]15[.]29[.]17- Associated IPv4 address103[.]131[.]95[.]107- Associated IPv4 address103[.]122[.]164[.]106- Associated IPv4 address109[.]248[.]24[.]177- Associated IPv4 address120[.]89[.]46[.]135- Associated IPv4 address58[.]69[.]38[.]83- EggStremeFuel C2 IP address extracted from configuration
- Domains:
distrilyy[.]net- Associated domainfikksvex[.]com- Associated domainpopnike-share[.]com- Associated domainshepinspect[.]com- Associated domaintheuklg[.]com- Associated domainwebmail[.]homesmountain[.]com- FluffyGh0st C2 server domain
- File Hashes:
835795aa494021752f21fbef63c81227c1b934437a02aa1f2a258c9f60b0b7a3(SHA256) - CoolClient loader DLL851d57a2bf514202f54dafa1eb83a862653be7512b6e9535914b8d1d719d495f(SHA256) - CoolClient loader DLL6caa78943939bd7518f5e7eaa44fa778d0db8b822e260d7fe281cf45513f82d9(SHA256) - EggStreme loader (XblAuthManagers.dll)84e37e42312b9a502c40cf1f3fc181e3ebd4f3e35c58bbf182740dfe38d3b6b9(SHA256) - TrackBak infostealerc774fd7373084f93383593f0a40f56c8a8b95b73e59cd4fc7117daa6b7441e73(SHA256) - Likely final payload (bdusersy.dll) for Hypnosis loader35ca351a831c67f0e0a658a186be0065043e0977cb70771c03a24b0523edcf30(SHA256) - Malicious DLL masquerading as a log file ($FILE_NAME$.log)34bf325492614dd4d842ec24f22a402ab73908cb91a74846945eae4775290ff2(SHA256) - FluffyGh0st related DLLf07b2af21e3fab6af5166a44ca77ed0ebc7c9a3e623202a63d4c4492abce8d65(SHA256) - FluffyGh0st payload58ed0463d4cb393cd09198a6409591b39cae06bb0ba5f5d760186de88410f6b8(SHA256) - FluffyGh0st payload4e26aa1bb28874f0897ab9a08e61d4b99caaa395fe63cbe4398f7297371e388c(SHA256) - FluffyGh0st payload11c7728697d5ea11c592fee213063c6369340051157f71ddc7ca891f5f367720(SHA256) - FluffyGh0st payload found in ZIP with Hypnosis loader
- File Paths:
D:\WorkProject\2023\GJ0215\src\USBInfection\sln\USBFect\Release\USBFect.pdb- PDB path found in USBFect sampleD:\_\_\_\_\_\_\_\_\_\_\_\_\_\_\EVENT.dll- USBFect infection path on removable mediaProgramData\intel\_\$.ini- Staged file for PUBLOAD propagationProgramData\Intel\_\EVENT.dll- Staged file for PUBLOAD propagationProgramData\intel\_\u2ec.dll- Staged file for PUBLOAD propagationProgramData\intel\_\UsbConfig.exe- Staged file for PUBLOAD propagationC:\Users\Public\Libraries\Dialogui\EVENT.dll- Working directory for ClaimLoaderC:\ProgramData\GoogleUpdate\libvlc.dll- CoolClient loader DLL pathC:\Users\$USER$\AppData\LocalLow\Brother\PrtDrv\sangforvpnlibcrypto-1_1.dll- CoolClient loader DLL pathc:\programdata\GoogleUpdate\loader.ja- Encrypted file loaded by CoolClient%APPDATA%\Microsoft\Windows\Cookies\Cookies.dat- Encrypted C2 configuration storage for EggStremeFuelC:\Windows\System32\AxInstSVs.dll- Masol RAT deployment pathE:\Masol_https190228\x64\Release\Masol.pdb- PDB path found in Masol RATC:\Windows\System32\XblAuthManagers.dll- EggStreme loader deployment path%LOCALAPPDATA%\Microsoft\Windows\Explorer\thumbcache.dat- Output file for Gorem RAT keylogger moduleC:\Program Files\Common Files\Bitdefender\SetupInformation\bdusersy.dll- Likely final payload path for Hypnosis loaderC:\Program Files\Common Files\Bitdefender\SetupInformation\$FILE_NAME$.log- Malicious DLL masquerading as a log file