APT

China-Linked APT15 group is using a previously undocumented backdoor

ESET researchers reported that China-linked cyberespionage group APT15 has been using a previously undocumented backdoor for more than two years.

Security researchers at ESET reported that China-linked threat actor APT15 (aka Ke3chang, Mirage, Vixen Panda, Royal APT and Playful Dragon) has been using a previously undocumented backdoor for more than two years. APT15 has been active since at least 2010, it conducted cyber espionage campaigns against targets worldwide in several industries, including the defense, high tech, energy, government, aerospace, and manufacturing. The attackers demonstrated an increasing level of sophistication across the years, they used custom-malware and various exploits in their attacks.

Experts discovered that since December 2016, the APT15 group has been using the previously undocumented backdoor dubbed Okrum. The backdoor was used in attacks on targeted diplomatic missions in Slovakia, Belgium, Chile, Guatemala and Brazil throughout 2017.

“Second, we identified a previously undocumented malware family with strong links to the Ke3chang group – a backdoor we named Okrum. We first detected Okrum, through ESET telemetry, in December 2016; it targeted diplomatic missions in Slovakia, Belgium, Chile, Guatemala and Brazil throughout 2017.” reads the report published by ESET.

The hackers leverage the Okrum backdoor to deliver the Ketrican malware, which is derived from the BS2005 (operation Ke3chang malware) malicious code.

The Okrum backdoor supports several commands to implement several abilities, such as download/upload files, execute binaries, run shell commands, update itself, and adjust the time it sleeps after each backdoor command. 

Experts noticed that the backdoor supports only basic commands, likely because it is either a first-stage backdoor, or because its operators execute more complicated commands manually. 

Experts noticed that organizations infected with Okrum in 2017 were previously affected with other APT15 malware, a circumstance that suggests that the same APT group is behind these attacks. 

“In late 2016, we identified a previously unknown backdoor that we named Okrum. We discovered that the Okrum backdoor was used to deliver a Ketrican sample. This newly discovered Ketrican sample from 2017 has evolved from the Ke3chang group’s BS2005 malware family and is described in section 4.2.” continues the report. “Moreover, the entities where we detected Okrum in 2017 were previously affected with backdoors known to be attributed to the Ke3chang group – another hint that Okrum is the work of the same threat actor “

ESET has not been able to discover the initial attack vector and the dropper of the malware, anyway the experts have identified the following components used in the Okrum backdoor:

  • An optional stage 0 loader;
  • Stage 1 loader;
  • An installer component;
  • A PNG file with an embedded backdoor;

The backdoor is deployed in the form of a DLL, it communicates over the HTTP protocol using GET, POST and HEAD requests. 

The Okrum backdoor is not very complex, this implies that most of the malicious activity must be performed by manually typing shell commands, or by executing other available tools.

ESET also reported that the APT15 has been using the Ketrican backdoor since 2015, for downloading and uploading files, executing files and shell commands, and sleeping for a configurable time. 

Attackers also noticed that systems infected with the above two families were also targeted with the RoyalDNS malware that uses DNS to communicate with the C&C server. Once executed the command the backdoor returns output through DNS.

In 2018, the APT15 group used new Ketrican samples that implemented the ability to load DLLs and adopted the XOR cipher for encryption.

“Finally, the 2018 Ketrican backdoors share another feature common for Ke3chang group backdoors. They are known to modify specific registry keys and values in order to weaken some security settings of the compromised machine, which can help them further extend their malicious capabilities to provide those not available via the backdoor itself” continues the report.

Researchers also observed other two new Ketrican samples in 2019 that present many similatitied with instance observed in the past. The 2019 version also modifies the same rare combination of registry values as all earlier Ketrican samples.

“The Ke3chang APT group (a.k.a. APT15) has rightfully been on the radar of security researchers because of its decade-long operation, targeting high-value victims such as diplomatic entities, and other geopolitical aspects associated with them.” concludes ESET. “While ESET does not engage in attribution of these activities to a particular nation-state, we do attempt attribution of individual malware-driven cyberattacks to a particular APT group”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – APT15, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web

Resecurity researchers found 7.4 million records containing personally identifiable information (PII) of Paraguay citizens on…

3 hours ago

Apple confirmed that Messages app flaw was actively exploited in the wild<gwmw style="display: none; background-color: transparent;"></gwmw>

Apple confirmed that a security flaw in its Messages app was actively exploited in the…

10 hours ago

Trend Micro fixes critical bugs in Apex Central and TMEE PolicyServer

Trend Micro fixed multiple vulnerabilities that impact its Apex Central and Endpoint Encryption (TMEE) PolicyServer…

13 hours ago

Paragon Graphite Spyware used a zero-day exploit to hack at least two journalists’ iPhones<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

Security researchers at Citizen Lab revealed that Paragon's Graphite spyware can hack fully updated iPhones…

1 day ago

SinoTrack GPS device flaws allow remote vehicle control and location tracking

Two vulnerabilities in SinoTrack GPS devices can allow remote vehicle control and location tracking by…

1 day ago

U.S. CISA adds Wazuh, and WebDAV flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Wazuh, and WebDAV flaws to its Known…

1 day ago