CYFIRMA attributes a targeted multi-stage, fileless espionage campaign to APT36 (Transparent Tribe) that uses weaponized LNK files masquerading as PDFs to deliver HTA loaders and in-memory .NET deserialization payloads. The operation deploys configuration and RAT payloads (ReadOnly/WriteOnly -> ki2mtmkl.dll, iinneldc.dll), adapts persistence based on detected AV products, and maintains encrypted C2 communications to 2.56.10.86 for surveillance and data exfiltration. #APT36 #ReadOnly
Keypoints
- APT36 (Transparent Tribe) conducted a spear-phishing campaign delivering a ZIP archive (âOnline JLPT Exam Dec 2025.zipâ) containing an oversized .pdf.lnk shortcut that embeds full PDF content to masquerade as a legitimate document.
- The LNK launches mshta.exe to retrieve and execute a remote HTA loader (https://innlive.in/assets/public/01/jlp/jip.hta) which implements Base64/XOR decryption and in-memory reconstruction of payloads.
- Multi-stage, fileless execution: a ReadOnly configuration payload weakens .NET deserialization safeguards (XAML/ObjectDataProvider abuse), and a WriteOnly/fileless DLL (ki2mtmkl.dll â iinneldc.dll) executes entirely in memory as a RAT.
- The RAT provides extensive espionage capabilities: system profiling, remote command execution, file enumeration/exfiltration, screen capture, remote desktop, clipboard theft/manipulation, and stored-password harvesting.
- Persistence and evasion are AV-aware: the malware profiles installed antivirus products via WMI and selects tailored persistence paths (Startup shortcuts, HTA/batch files, registry changes) to survive in diverse environments.
- Command-and-control uses encrypted channels (AES with hardcoded key ZAEDF_98768_@$#%_QCHF) and communicates with C2 at 2.56.10.86:8621 for command retrieval and data exfiltration.
- Recommendations include blocking LNK attachments at gateways, enabling full file extension visibility, restricting mshta/PowerShell/HTA usage, deploying EDR/behavioral detection, and integrating IOCs and YARA rules into detection stacks.
MITRE Techniques
- [T1566.001 ] Phishing: Spear phishing Attachment â Initial delivery via a malicious ZIP archive containing a deceptive .pdf.lnk attachment (âthe threat actor uses a malicious ZIP archive titled âOnline JLPT Exam Dec 2025.zipâ as the initial delivery vectorâ)
- [T1059 ] Command and Scripting Interpreter â Abuse of scripting and system interpreters (mshta.exe, PowerShell, cmd.exe) to execute payloads and minimize artifacts (âUtilizes trusted Windows binaries (mshta.exe, PowerShell, cmd.exe) and in memory execution to minimize on disk artifacts and evade detectionâ)
- [T1059.001 ] Command and Scripting Interpreter: PowerShell â PowerShell used to invoke mshta and execute obfuscated payloads during persistence (âthe payload is then executed using the trusted Windows binary mshta.exe via a PowerShell invocationâ)
- [T1059.005 ] Command and Scripting Interpreter: Visual Basic â HTA/ActiveX and WScript objects used for environment interaction and execution (âThe HTA leverages ActiveX objects, particularly WScript.Shell, to interact with the Windows environment.â)
- [T1218.005 ] System Binary Proxy Execution: Mshta â Execution of remote HTA content via mshta.exe passed as a command-line argument (âit executes the legitimate Windows utility mshta.exe, passing a remote URL as a command line argumentâ)
- [T1547.001 ] Boot or Logon Autostart Execution: Startup Folder â Malware drops shortcuts and HTA/batch files into the Startup folder to establish persistence (âestablishes persistence by dropping a shortcut file in the userâs Startup folderâ)
- [T1112 ] Modify Registry â Queries and sets registry/environment variables (COMPLUS_Version) to adjust runtime behavior and as part of persistence fallback (âit queries registry values to determine the available .NET runtime and dynamically sets the COMPLUS_Version environment variable.â)
- [T1055 ] Process Injection â Fileless DLLs are deserialized and executed in memory, avoiding disk artifacts (âWriteOnly is a fileless DLL payload that is deserialized and executed entirely in memoryâ)
- [T1036 ] Masquerading â Use of double-extension .pdf.lnk and embedded PDF content to impersonate legitimate documents (âthe .lnk file convincingly masquerades as a legitimate PDF documentâ)
- [T1027 ] Obfuscated Files or Information â HTA loader implements custom Base64 and XOR decryption/obfuscation routines to conceal payloads (âthe script then defines several functions ⌠that collectively implement custom Base64 decoding and XOR-based decryption routinesâ)
- [T1070 ] Indicator Removal on Host â In-memory execution and minimized on-disk artifacts reduce forensic traces (âin memory execution to minimize on disk artifacts and evade detectionâ)
- [T1202 ] Indirect Command Execution â Use of intermediate scripts (batch/HTA/PowerShell) to indirectly execute malicious payloads (âwrites the HTA payload to disk and executes it indirectly through the batch scriptâ)
- [T1497 ] Virtualization / Sandbox Evasion â Techniques chosen to reduce detection and sandbox visibility (âThese tactics significantly reduce detection opportunities and enable prolonged, covert accessâ)
- [T1564.001 ] Hide Artifacts: Hidden Files and Directories â Archive contains a hidden usb directory (usbsyn.pim) likely used for runtime data/code (âthe archive also contains a hidden directory named usb, which includes a file named usbsyn.pimâ)
- [T1555 ] Credentials from Password Stores â Malware harvests stored passwords from the system as part of data collection (âharvesting stored passwordsâ)
- [T1539 ] Steal Web Session Cookie â Campaign includes web session cookie theft capability as listed in the capability set (âT1539 Steal Web Session Cookieâ)
- [T1082 ] System Information Discovery â Malware collects detailed host/system profiling information to fingerprint victims (âCollects detailed host information, including OS version, username, installed software, and active antivirus products.â)
- [T1057 ] Process Discovery â Malware enumerates running processes and can terminate selected processes (âLists running processes and terminates selected processesâ)
- [T1083 ] File and Directory Discovery â Recursive scanning of directories for sensitive documents for exfiltration (ârecursively scanning directories for sensitive document files, including Office documents, PDFs, text files, and database filesâ)
- [T1518.001 ] Software Discovery: Security Software Discovery â Uses WMI to enumerate installed antivirus products and adapt behavior (âqueries the Windows Management Instrumentation (WMI) rootSecurityCenter2 namespace to enumerate installed antivirus productsâ)
- [T1113 ] Screen Capture â Captures screenshots of the victimâs display, resizes/compresses them, and transmits to C2 (âcaptures a screenshot of the victimâs primary display using the CopyFromScreen() API ⌠then transmitted to the command-and-control serverâ)
- [T1115 ] Clipboard Data â Functions to read and overwrite clipboard contents for theft and manipulation (âThe getclipboardtext() function enables clipboard data theft ⌠The setclipboardtext() function enables clipboard manipulationâ)
- [T1005 ] Data from Local System â Systematic collection of local files (Office, PDF, DB files) for exfiltration (âCopySubfiles function performs systematic data theft by recursively scanning directories for sensitive document filesâ)
- [T1560 ] Archive Collected Data â Collected files are base64-encoded and AES-encrypted before transmission (âAll exfiltrated data is first Base64 encoded and then AES encrypted before transmissionâ)
- [T1071.001 ] Application Layer Protocol: Web â C2 communications performed over application-layer web protocols (âThis function maintains persistent C2 communication with IP 2.56.10.86 on TCP port 8621â and âreads encrypted command data from the attacker-controlled serverâ)
- [T1095 ] Non-Application Layer Protocol â Use of non-application-layer transport methods for C2 as enumerated in the ATT&CK mapping (âT1095 Non-Application Layer Protocolâ)
- [T1573 ] Encrypted Channel â Encrypted C2 channel using AES and hardcoded keys for confidentiality (âthe received data is decrypted using AES with a hardcoded key (âZAEDF_98768_@$#%_QCHFâ)â)
- [T1105 ] Ingress Tool Transfer â HTA and DLL payloads retrieved from remote URLs during initial stages (âHTA source: https://innlive.in/assets/public/01/jlp/jip.htaâ)
- [T1041 ] Exfiltration Over C2 Channel â Data exfiltration performed over the established C2 channel to the attacker server (âAll exfiltrated data is first Base64 encoded and then AES encrypted before transmission ⌠Send() handles final delivery to the attacker controlled command and control serverâ)
- [T1565.001 ] Data Manipulation: Stored Data â Malware can manipulate stored data and clipboard contents as part of its capabilities (âData Manipulation: Stored Dataâ capability and clipboard overwrite functions)
Indicators of Compromise
- [SHA-256 Hash ] Malware component hashes observed â 06fb22c743fcc949998e280bd5deaf8f80d616b371576b5e11fd5b1d3b23a5f2, c1f3dea00caec58c9e0f990366ff40ae59e93f666f92e1c218c03478bf3abe17, and 1 other hash
- [MD5 Hash ] Reported MD5s for distributed archive and components â Online 20JLPT 20Exam 20Dec 202025.zip: 30fda797535a0f367ea2809426760020, Online JLPT Exam Dec 2025.pdf.lnk: ceb715db684199958aa5e6c05dc5c7f0 (and other MD5s listed)
- [File Name ] Malicious file names and payloads used in the campaign â Online JLPT Exam Dec 2025.pdf.lnk (weaponized shortcut), jip.hta (HTA loader), ki2mtmkl.dll and iinneldc.dll (in-memory RAT payloads)
- [Domain ] Hosting and resource domains used for payloads/icons â innlive.in (HTA hosting: https://innlive.in/assets/public/01/jlp/jip.hta), drjagrutichavan.com (remote icon resource)
- [IP Address ] Command-and-control server â 2.56.10.86 (C2 on TCP port 8621)
- [YARA / Hardcoded Keys ] Embedded configuration/crypto strings and YARA-detectable keys â ZAEDF_98768_@$#%_QCHF, NMSOW_$^*$_68923_MOXOE (present in YARA rule and code)