Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years

Aoqin Dragon is a long-running Chinese-speaking APT tracked by SentinelLabs, active since 2013 and targeting government, education, and telecom organizations in Southeast Asia and Australia. The group uses document exploits, fake removable devices, DLL hijacking, Themida packing, and DNS tunneling to maintain access and evade detection, with links to UNC94 suspected. Hashtags: #AoqinDragon #Mongall #Heyoka #UNC94 #SentinelLabs #Themida

Keypoints

  • Aoqin Dragon operates since 2013, focusing on espionage against government, education, and telecom targets in Southeast Asia and Australia.
  • Initial access is gained via document exploits and social engineering using lure documents with pornographic themes.
  • The actor uses a combination of DLL hijacking, Themida packing, and DNS tunneling to evade defenses and maintain covert operations.
  • Backdoors dropped include Mongall and a modified Heyoka, with a DLL loader and DLL-test loader used to manage infection.
  • The infection chain evolved into a removable-device-based spread industry, with a worm-like component named “upan” that copies modules to removable media.
  • Two primary backdoors (Mongall and modified Heyoka) provide C2 capabilities, remote shell features, and data exfiltration via multiple channels, including HTTP and DNS.

MITRE Techniques

  • [T1566.001] Phishing – Spearphishing Attachment – “Using a document exploit and tricking the user into opening a weaponized Word document to install a backdoor.” We’ll quote: “Using a document exploit and tricking the user into opening a weaponized Word document to install a backdoor.”
  • [T1091] Replication Through Removable Media – “Copies malware to removable media and infects other machines.” We’ll quote: “The worm infection strategy using a removable device to carry the malware into the target’s host and facilitate a breach into the secure network environment.”
  • [T1569] System Service – “Modified Heyoka will set itself as a service permission.” We’ll quote: “The malware sets the auto start function with the value ‘EverNoteTrayUService’.”
  • [T1204] User Execution – “Lures victims to double-click on decoy files.” We’ll quote: “Luring users into double-clicking a fake Anti-Virus to execute malware in the victim’s host.”
  • [T1547] Boot or Logon Autostart Execution – “Settings to automatically execute a program during logon.” We’ll quote: “The malware sets the auto start function with the value ‘EverNoteTrayUService’.”
  • [T1055] Process Injection – “Mongall has injected an install module into a newly created process.” We’ll quote: “The loader injects the decrypted payload into memory and runs it persistently.”
  • [T1055.001] DLL Injection – “Mongall has injected a DLL into rundll32.exe.” We’ll quote: “The payload … injects itself into rundll32’s memory.”
  • [T1211] Exploitation for Defense Evasion – “Uses document exploits to bypass security features.” We’ll quote: “Uses document exploits to bypass security features.”
  • [T1027] Obfuscated Files or Information – “Themida packer to pack the malwares.” We’ll quote: “using Themida packer to pack the malwares.”
  • [T1574.001] DLL Search Order Hijacking – “DLL hijacking to load the malicious loader as explorer.exe.” We’ll quote: “use DLL hijacking to load the malicious encrashrep.dll loader as explorer.exe.”
  • [T1033] System Owner/User Discovery – “Collecting user account and send back to C2.” We’ll quote: “Collecting user account and send back to C2.”
  • [T1082] System Information Discovery – “Collecting OS system version and MAC address.” We’ll quote: “Collecting OS system version and MAC address.”
  • [T1560] Archive Collected Data – “Dropper uses rar to archive specific file format.” We’ll quote: “rar.exe a -apC -r -ed -tk -m5 … C:*.doc C:*.DOCX”
  • [T1071.001] Application Layer Protocol: Web Protocols – “Mongall communicates over HTTP.” We’ll quote: “Mongall communicates over HTTP.”
  • [T1071.004] Application Layer Protocol: DNS – “Modified Heyoka has used DNS tunneling for C2 communications.” We’ll quote: “DNS tunneling for C2 communications.”
  • [T1571] Non-Standard Port – “Mongall uses port 5050,1352, etc. to communicates with C2.” We’ll quote: “Mongall uses port 5050,1352, etc. to communicates with C2.”
  • [T1132] Data Encoding – “Mongall uses base64 or RC4 to encode or encrypt data to make the content of command and control traffic more difficult to detect.” We’ll quote: “uses base64 or RC4 to encode or encrypt data to make the content of command and control traffic more difficult to detect.”

Indicators of Compromise

  • [SHA1] Mongall hashes – a96caf60c50e7c589fefc62d89c27e6ac60cdf2c, cccccf5e131abe74066b75e8a49c82373414f5d95, and 2 more hashes
  • [File name] – DLL-test.dll, encrashrep.dll
  • [Domain] – back.satunusa.org, baomoi.vnptnet.info
  • [Domain] – bbw.fushing.org, bkavwelikejack.net
  • [IP Address] – 10.100.0.34, 172.111.192.233
  • [IP Address] – 45.77.11.148

Read more: https://www.sentinelone.com/labs/aoqin-dragon-newly-discovered-chinese-linked-apt-has-been-quietly-spying-on-organizations-for-10-years/