Dark Pink uses a modular toolset (Cucky, Ctealer, TelePowerBot, KamiKakaBot) for data theft and espionage, with cross-language tooling and registry-based persistence. The group relies on spear-phishing with ISO-delivery, Telegram-based command execution, and HTTP/webhook exfiltration, with activity linked to Vietnam and potentially Ocean Buffalo. hashtags: #DarkPink #OceanBuffalo

Keypoints

  • The Dark Pink toolkit includes Cucky (.NET info stealer), Ctealer (C/C++), TelePowerBot (registry implant with Telegram control), and KamiKakaBot (.NET version with data theft).
  • Initial access is achieved via spear-phishing emails that direct victims to a file-sharing site offering an ISO image to infect the network.
  • TelePowerBot acts as a registry-based implant that activates on boot and executes PowerShell commands from a Telegram channel.
  • KamiKakaBot extends TelePowerBot’s capabilities, adding data theft and Telegram-driven device control.
  • Data exfiltration has evolved from email/Dropbox to HTTP payloads via webhook services.
  • Origin indicators point to Vietnam, with speculation of ties to the Ocean Buffalo/Apt32 cluster.

MITRE Techniques

  • [T1566] Phishing – The attackers used spear-phishing emails to gain initial access. ‘A large part of the success of Dark Pink was down to the spear-phishing emails used to gain initial access. The emails contain a shortened URL linking to a free-to-use file sharing site, where the victim is presented with the option to download an ISO image that contains all the files needed for the threat actors to infect the victim’s network.’
  • [T1566.001] Spearphishing Attachment – The emails contain a shortened URL linking to a free-to-use file sharing site, where the victim is presented with the option to download an ISO image that contains all the files needed for the threat actors to infect the victim’s network. ‘The emails contain a shortened URL linking to a free-to-use file sharing site, where the victim is presented with the option to download an ISO image that contains all the files needed for the threat actors to infect the victim’s network.’
  • [T1204] User Execution – The spear-phishing workflow implies user interaction to download and potentially execute the malicious ISO payload. ‘…to infect the victim’s network.’
  • [T1059.001] PowerShell – TelePowerBot commands are executed via PowerShell. ‘[TelePowerBot] awaits PowerShell commands from this channel, which it then executes.’
  • [T1547] Boot or Logon Autostart Execution – TelePowerBot uses a registry implant that activates during system boot through a script. ‘A registry implant that activates during system boot through a script…’
  • [T1102] Web Service – Data exfiltration via HTTP and webhook services. ‘utilized the HTTP protocol and a Webhook service to exfiltrate the stolen data.’

Indicators of Compromise

  • [File] context – Cucky and related artifacts – MD5: 926027F0308481610C85F4E3E433573B; SHA1: 24F65E0EE158FC63D98352F9828D014AB239AE16; SHA256: 9976625B5A3035DC68E878AD5AC3682CCB74EF2007C501C8023291548E11301
  • [File] context – Actealer Loader – MD5: 728AFA40B20DF6D2540648EF845EB754; SHA1: D8DF672ECD9018F3F2D23E5C966535C30A54B71D; SHA256: C60F778641942B7B0C00F3214211B137B683E8296ABB1905D2557BFB245BF775
  • [File] names – wwlib.dll; COUNTERDRAFT MOU ON RICE TRADE INDONESIA-INDIA 15052023.DOC; MS Project file; ccc.gif; AccHelper.xll; ANALYS32.xll
  • [URL] – hXXps://webhook[.]site/288a834b-fd92-4531-82a5-b41e907daa56
  • [URL] – hXXps://webhook[.]site/2b733e31-70bb-4777-be4a-41a98f3559bf
  • [URL] – hXXp://raw.githubusercontent[.]com/peterlyly/zxcv/main/xxx.gif
  • [URL] – hXXp://raw.githubusercontent[.]com/peterlyly/zxcv/main/ccc.gif
  • [URL] – hXXp://raw.githubusercontent[.]com/peterlyly/zxcv/main/DDDD.gif
  • [URL] – hXXp://raw.githubusercontent[.]com/peterlyly/zxcv/main/eeeee.gif
  • [URL] – hXXps://raw.githubusercontent[.]com/peterlyly/zxcv/main/eeeee.gif
  • [URL] – hXXps://raw.githubusercontent[.]com/peterlyly/zxcv/main/xxx.gif
  • [URL] – hXXps://webhook.site/288a834b-fd92-4531-82a5-b41e907daa56
  • [Domain] – webhook.site
  • [Domain] – raw.githubusercontent.com
  • [IP] 176.10.80[.]38:8843

Read more: https://cyberint.com/blog/research/dark-pink-apt-attacks/