In Chinese APT, Russia was the playground of IceFog with other country like Kazaghstan, Tadjikistan or Mongolia.

Into the Fog — The Return of ICEFOG APT — Speaker Deck

Now many report of APT, many campaigns target those countries by TA428 with many TTPs similare:

  • DNS dynamic
  • Sideloading
  • Using same encryption
  • Mirage, PlugX, Poison Ivy

Dr web has pusblished two reports very similare Study of targeted attacks on Russian research institutes ( and Study of the APT attacks on state institutions in Kazakhstan and Kyrgyzstan (

In Februrary, Record Futur publishes an article about a campaign against the Indian Power Sector Amid Heightened Border Tensions by RedEcho

After my investigation with the RiskIQ passive DNS, I found many IOCs interesting.

The domain is the most interesting. This domains has been resolved on two IPs : and

And this IPs have two certificates SSL linked 2d2d79c478e92a7de25e661ff1a68de0833b9d9b and 0a71519f5549b21510410cdf4a85701489676ddb.

With theses certificates, we can found many IPs published in the article of Record Future.

And a new IP published yesterday:

RedEcho group parks domains after public exposure | The Record by Recorded Future

So these two certificates are more important to have a good view of the Infrastruscture of RedEcho. But, these certificates are linked to ShadowPad Infrastructure which used by others APT chineses groups.

Overview of the infrastructure

A new document royal road v7 installs a backdoor in .NET. a first executable is dropped \os03C2.tmp. This exe has many similarities with older campaigns using by Operation LagTime or Tonto Team.


The decoy document is a document about infection of covid19 in Russia send to the Mongolia Authorities. The document is fake signed A. Amarsaikhan.

This technics was used by Operation LagTime and another APT Chinese.

Backdoor Analysis

The backdoor is installed C:\MSBuild\WindowsUpdate\S-1–2 and the name of file is csrss.exe like the legit process of Windows

The configuration of the backdoor is stored in a ressource .NET.


a new babuk ransomware was uploaded on Virustotal. bc4066c3b8d2bb4af593ced9905d1c9c78fff5b10ab8dbed7f45da913fb2d748

This version is packed with the same technics of GandGrab described here.

Threat Profile: GandCrab Ransomware (


The first stage is a first shellcode loaded with GloballAlloc and VirtualProtect in function 0042df00

the file f5a78a155a219582db8959c3a96a1d91ed891801663b1cce0c599779773bc3f5 uses the version 7 of royal road document.

This file drops in memory a new backdoor rewriting the process EQNEDT32.EXE.

This document refers to the ceasefire between Armenia and Azerbaijan and seems to be send by the Mongolian authorities.

Analysis of the backdoor in memory

This backdoor is a state machine launching different threads. (function 00401640)

the decoy document 74aa6fff407dee851f224329489232a8e7f2d6046aaff3c9cebfff81b7d5db22 uses a version of royal road to drop a new bakdoor developped on MFC C++.


The dectection rate on virustotal is very low:

The backdoor is packed with a home made packer. The real entrypoint is call by a thread with the function AfxWinMain at FUN_00432cc8 and the entry of this thread is at 401740.

In my last article on Chinoxy backdoor, this version has its configuration in a resource called NNKK and it is deciphered. The purpose of this article is to explain the unpacking and deciphering of the configuration of this backdoor.

The backdoor is loading with the program confax.exe, a utility of Logitech for the Bluetooth.

The function called by confax.exe is LGBT_Launch.

In checking this function,

This article is a bit different of the others. The goal is to show how to follow your virustotal hunting with Yeti and Pandas.

With Virustotal Hunting, you can follow samples submitted by the users with yara rules. If a sample matches with a rule, you receive a notification and you can follow the notifications in the virus total console.

For this example, i use a rule to catch backdoor Chinoxy. In a first post, I have linked this backdoor with WINNTI.

and a second post, I have link this backdoor with Vicious Panda.

and I have done a…

Last year I’ve analyzed a chinoxy backdoor dropped by an royal road RTF targeting Vietnam.

The 17 march 2019, a campaign using royal road RTF targetted the Kirghistan with a lure document COVID19 about financial consideration of the world Bank.

5 years of Chinoxy implemention

This backdoor is very similar with it used for the Vietnam.

We have the same protocole HTTPs custom.

The state machine of the backoors are similare.

The cert of Malaysia made an advisory the 5th february.

It’s published many TTPs and IOCs on this group:

There is many links interessisting:

the first are this IP and In my yeti, I found many relative observables on it:

hxxp:// and hxxp://

this Urls were used by a campaign discovered by ClearSky

targeting Malaysia. The victimology is interesting because it’s concerning transport industry.

Another link interesting with this advisories is the link wit another campaign in November

found by

Malware used here is Dadjoke.

APT40 is an active Chinese group in South Asia, near of the MSS (Intelligence Service of China) according Intrusion Truth


OSINT, Python,Malware Analysis, Botnet Tracker, SIEM and IPS/IDS and Threats Expert / co-organizer #BotConf / co-creator of #FastIR/ Researcher at @Epita

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store