Earth Lamia is an active China-nexus APT group exploiting web application vulnerabilities to target organizations primarily in Brazil, India, and Southeast Asia since 2023. They use customized hacking tools and backdoors like PULSEPACK and BypassBoss, shifting targets across industries from financial services to IT, universities, and government entities. #EarthLamia #PULSEPACK #BypassBoss
Keypoints
- Earth Lamia exploits SQL injection and multiple CVEs (e.g., CVE-2017-9805, CVE-2025-31324) to access public-facing servers and SQL databases.
- The group customizes open-source hacking tools and employs DLL sideloading techniques to evade detection, using tools such as âBypassBossâ and loaders for Cobalt Strike and Brute Ratel.
- They developed the modular .NET backdoor PULSEPACK, which evolved to use WebSocket communication and dynamically loads plugins from the C2 server.
- Targets have shifted over time from financial services to logistics, online retail, and most recently IT companies, universities, and government organizations mainly in Brazil, India, and Southeast Asia.
- Lateral movement tactics include privilege escalation (using GodPotato and JuicyPotato), creating administrative accounts, network scanning, credential dumping, and executing backdoors like VShell and Cobalt Strike.
- Earth Lamiaâs infrastructure and tactics overlap with intrusion sets REF0657 and activities linked to campaigns STAC6451 and CL-STA-0048, though the group has not been observed deploying ransomware.
- Trend Vision One⢠detects and blocks Earth Lamia IOCs and provides hunting queries, threat insights, and intelligence reports to enhance organizational defense.
MITRE Techniques
- [T1595.001] Active Scanning: Scanning IP Blocks â Earth Lamia conducts vulnerability scans on targetsâ websites (âfrequently conducted vulnerability scans to identify possible SQL injection vulnerabilitiesâ).
- [T1595.002] Active Scanning: Vulnerability Scanning â The actor scans for vulnerabilities in public-facing servers (exploiting CVE-2017-9805, CVE-2021-22205, and others).
- [T1592] Gather Victim Host Information â Plugins collect system version, usernames, and antivirus software info (âcollects the information of the infected machineâ).
- [T1583.001] Acquire Infrastructure: Domains â Uses domains like âchrome-online.siteâ for C2 infrastructure (âCobalt Strike sample connects to âchrome-online[.]siteââ).
- [T1190] Exploit Public-Facing Application â Uses SQL injection and exploits multiple vulnerabilities to gain initial access (âprimarily targets the SQL injection vulnerabilities on web applicationsâ).
- [T1078] Valid Accounts â Creates accounts such as âsysadmin123â on SQL servers with administrator privileges (âCREATE LOGIN sysadmin123 WITH PASSWORD âŚâ).
- [T1059.001] Command and Scripting Interpreter: PowerShell â Uses PowerShell for downloading tools and execution (âUsing âpowershell.exeâ to download additional toolsâ).
- [T1059.003] Command and Scripting Interpreter: Windows Command Shell â Executes commands via âcmd.exeâ subprocesses for backdoor control (âthe backdoor process can create a subprocess called âcmd.exeââ).
- [T1098.007] Account Manipulation: Additional Local or Domain Groups â Adds created accounts to local administrators (âadding it to the administratorsâ local groupâ).
- [T1136.001] Create Account: Local Account â Creates new local user accounts like âhelpdeskâ.
- [T1053.005] Scheduled Task/Job: Scheduled Task â Uses scheduled tasks for persistence (âcreates a scheduled task to launch the executable after a system rebootâ).
- [T1505.003] Server Software Component: Web Shell â Deploys webshells to website applications (âDeploying webshells to website applicationsâ).
- [T1068] Exploitation for Privilege Escalation â Uses exploits like GodPotato and JuicyPotato for privilege escalation.
- [T1078.003] Valid Accounts: Local Accounts â Uses local accounts for defense evasion and persistence.
- [T1140] Deobfuscate/Decode Files or Information â Deobfuscates RC4 and AES encrypted shellcode payloads (âuses RC4 encryption to protect the malicious shellcodeâ).
- [T1574.001] Hijack Execution Flow: DLL Sideloading â Employs DLL sideloading to launch malicious DLLs via legitimate executables (âpackages hacking tools into DLL files launched via DLL sideloadingâ).
- [T1562.001] Impair Defenses: Disable or Modify Tools â Removes or obfuscates static strings in tools to evade detection.
- [T1070.001] Indicator Removal: Clear Windows Event Logs â Cleans event logs using âwevtutil.exeâ.
- [T1036.005] Masquerading: Match Legitimate Resource Name or Location â Uses legitimate binaries from security vendors for sideloading.
- [T1620] Reflective Code Loading â Loads plugins and backdoor components in memory using âAssembly.Loadâ.
- [T1003.001] OS Credential Dumping: LSASS Memory â Dumps credentials from LSASS memory.
- [T1003.002] OS Credential Dumping: Security Account Manager â Extracts SAM and SYSTEM hives for credentials.
- [T1087.001] Account Discovery: Local Account â Searches for local accounts (âAccount Discovery: Local Accountâ).
- [T1087.002] Account Discovery: Domain Account â Discovers domain accounts.
- [T1482] Domain Trust Discovery â Collects domain controller info (âCollecting domain controller information with ânltest.exeâ and ânet.exeââ).
- [T1570] Lateral Tool Transfer â Transfers tools laterally inside the network.
- [T1005] Data from Local System â Collects data locally on compromised systems.
- [T1132.001] Data Encoding: Standard Encoding â Uses Base64 encoding for plugin delivery.
- [T1573.001] Encrypted Channel: Symmetric Cryptography â Uses AES encryption for communication and plugin payloads.
- [T1008] Fallback Channels â Uses fallback C2 communication methods.
- [T1105] Ingress Tool Transfer â Downloads tools onto compromised hosts.
- [T1104] Multi-Stage Channels â Utilizes multi-stage plugin loading from C2.
- [T1095] Non-Application Layer Protocol â Switches from TCP socket to WebSocket for C2 communication.
- [T1571] Non-Standard Port â Uses non-standard TCP ports for C2.
- [T1041] Exfiltration Over C2 Channel â Exfiltrates victim data over command and control channels.
Indicators of Compromise
- [IP Address] Earth Lamia infrastructure and C2 servers â 43.247.135.53, 103.30.76.206 (used for Cobalt Strike C2 and exploitation).
- [Domain] Command and Control domains â chrome-online.site (Cobalt Strike C2 domain linked to REF0657 / Earth Lamia), sentinelones.com (C2 domain associated with related campaigns).
- [File Hash] Malware samples â SHA256 1d0b246f8d43442ea0eaecde5cfa7fcd8139a9ba93496cd82a8ac056f7393bcf (mscoree.dll malicious loader), SHA256 bb6ab67ddbb74e7afb82bb063744a91f3fecf5fd0f453a179c0776727f6870c7 (VShell sample).
- [File Name] Malware and tool names â AppLaunch.exe (legitimate binary used for DLL sideloading), Sophosx64.exe (GodPotato privilege escalation tool), USERENV.dll (Cobalt Strike loader).
Read more: https://www.trendmicro.com/en_us/research/25/e/earth-lamia.html