Keypoints
- Earth Krahang focuses on government targets globally, abusing compromised government infrastructure to host payloads and send spear-phishing from legitimate accounts.
- Reconnaissance uses open-source scanners, recursive searches of .git/.idea, directory brute-forcing, and vulnerability scanners like sqlmap and nuclei to find exploitable servers.
- Initial access is achieved via exploitation of public-facing applications (e.g., CVE-2023-32315, CVE-2022-21587) and spear-phishing attachments/links delivering backdoors.
- Delivered tooling includes custom backdoors RESHELL and XDealer (Windows and Linux), Cobalt Strike (with RedGuard proxying), PlugX, and ShadowPad; XDealer often delivered via DLL loaders and LNK/installer chains.
- Post-exploitation includes installing SoftEther VPN (via certutil), enabling RDP, persistence via scheduled tasks/services, credential theft (LSASS/SAM), network scanning (Fscan), and lateral movement (WMIC, remote services).
- Email exfiltration performed by brute-forcing OWA/ActiveSync (custom Python scripts and ruler), and mailbox export from Zimbra using stolen authenticated cookies.
- Evidence shows infrastructure overlap and lateral-stage connections with Earth Lusca; XDealer loaders were sometimes code-signed with abused GlobalSign certificates.
MITRE Techniques
- [T1595.001] Active Scanning: Scanning IP Blocks â used to discover public-facing servers and scan targets (âscanning of public-facing serversâ).
- [T1595.002] Active Scanning: Vulnerability Scanning â used with tools like sqlmap, nuclei, xray to find exploitable web server vulnerabilities (âvulnerability scanning with tools like sqlmap, nuclei, xrayâŚâ).
- [T1595.003] Active Scanning: Wordlist Scanning â used for recursive searches and wordlist/directory bruteforce to find sensitive files (ârecursive searches of folders such as .git or .ideaâ and âbrute-forcing directoriesâ).
- [T1592] Gather Victim Host Information â enumerating host files and paths to find credentials or config details (âidentify files that may contain sensitive information such as file paths or passwordsâ).
- [T1590] Gather Victim Network Information â examining subdomains and network exposure to locate unmaintained servers (âtend to examine the subdomains of their targetsâ).
- [T1583.001] Acquire Infrastructure: Domains â acquiring/using domains to stage payloads and host C2 or download links (abuse of compromised government domains to host backdoors).
- [T1583.003] Acquire Infrastructure: Virtual Private Server â using VPS or compromised servers to host tooling and VPNs (SoftEther installed on compromised public-facing servers).
- [T1586.002] Compromise Accounts: Email Account â brute-forcing and hijacking government email accounts to send spear-phishing (âused a compromised mailbox from a government entity to send a malicious attachmentâ).
- [T1584.004] Compromise Infrastructure: Server â exploiting public-facing servers and installing web shells/backdoors (âdrop web shells, and install backdoorsâ).
- [T1588.001] Obtain Capabilities: Malware â obtaining or developing custom backdoors like RESHELL and XDealer (âidentified two unique malware families ⌠RESHELL and XDealerâ).
- [T1588.003] Obtain Capabilities: Code Signing Certificates â abusing stolen code-signing certs to sign XDealer loaders (âsigned with valid code signing certificates issued by GlobalSignâ).
- [T1608.001] Stage Capabilities: Upload Malware â hosting and uploading malware to compromised servers to serve targets (âcompromised government webservers to host their backdoorsâ).
- [T1608.002] Stage Capabilities: Upload Tool â uploading tools like SoftEther, Cobalt Strike components, and loaders to victim servers (âdropped PlugX and ShadowPad samples in victim environmentsâ).
- [T1608.005] Stage Capabilities: Link Target â crafting download links on legitimate government domains sent via spear-phishing (âsend download links to other government entities via spear phishing emailsâ).
- [T1190] Exploit Public-Facing Application â exploiting CVEs such as CVE-2023-32315 and CVE-2022-21587 to gain access to servers (âabused the following vulnerabilities multiple timesâ).
- [T1566.001] Phishing: Spearphishing Attachment â sending RAR/LNK/EXE attachments that deploy backdoors (LNK deploying XDealer installer and opening a decoy document).
- [T1566.002] Phishing: Spearphishing Link â sending links hosted on compromised government domains to download payloads (âmalicious link uses a legitimate government domainâ).
- [T1199] Trusted Relationship â abusing trust between government entities by using their infrastructure and accounts to target peers (âabuses the trust between governments to conduct their attacksâ).
- [T1078] Valid Accounts â use of discovered or brute-forced credentials to log in and exfiltrate emails or send phishing (âlikely discovered the weak credentials ⌠using brute-forcing toolsâ).
- [T1059.001] Command and Scripting Interpreter: PowerShell â using certutil and scripting to download/install SoftEther and other tooling (use of certutil commands cited).
- [T1059.003] Command and Scripting Interpreter: Windows Command Shell â running system commands and installers as part of deployment and persistence activities.
- [T1059.006] Command and Scripting Interpreter: Python â custom Python scripts used to send spear-phishing and to exfiltrate mailboxes (âThe Python script used by Earth Krahang to send spear-phishing emailsâ and mailbox exfiltration scripts).
- [T1203] Exploitation for Client Execution â LNKs and malicious documents used to trick users into executing backdoors (âRAR archive containing an LNK file that deployed the Xdealer malwareâ).
- [T1569.002] System Services: Service Execution â installing services or running server components such as SoftEther renamed to tasklist.exe to appear legitimate (âSoftEther server executable is renamed to either taskllst.exe, tasklist.exeâŚâ).
- [T1204.002] User Execution: Malicious File â social engineering lures (geopolitical document names) to induce user execution (âbackdoor filenames are usually related to geopolitical topicsâ).
- [T1047] Windows Management Instrumentation â use of WMIC for lateral code execution (âLateral code execution via WMICâ).
- [T1543.003] Create or Modify System Process: Windows Service â persistence via services and task scheduling to maintain backdoors and VPN components (âMaintaining backdoor persistence with task schedulingâ and service execution behaviors).
- [T1133] External Remote Services â deploying SoftEther VPN and using external services to access internal networks (âbuild VPN servers on compromised public-facing servers to establish access into the private networkâ).
- [T1053.005] Scheduled Task/Job: Scheduled Task â persistence via scheduled tasks to maintain active backdoors (âMaintaining backdoor persistence with task schedulingâ).
- [T1505.003] Server Software Component: Web Shell â deploying web shells on compromised servers to drop tools and backdoors (âdeployed via web shell on compromised serversâ).
- [T1068] Exploitation for Privilege Escalation â exploiting local/Linux CVEs for privilege escalation (CVE-2021-4034, CVE-2021-22555, CVE-2016-5195 cited).
- [T1078.003] Valid Accounts: Local Accounts â using local account credentials for privilege escalation and persistence (âValid Accounts: Local Accountsâ).
- [T1140] Deobfuscate/Decode Files or Information â loaders and DLLs decode encrypted shellcode/C2 payloads (faultrep.dll decodes encoded shellcode stored in faultrep.dat).
- [T1574.002] Hijack Execution Flow: DLL Side-Loading â side-loading DLLs (fontsets.exe + faultrep.dll) to load Cobalt Strike shellcode (âDLL side-loading vulnerability ⌠fontsets.exe ⌠side-load the DLL file faultrep.dllâ).
- [T1656] Impersonation â using legitimate-sounding filenames, email subjects, and government domains to impersonate trusted entities (geopolitical lure filenames and trusted government domains used in emails).
- [T1036.005] Masquerading: Match Legitimate Name or Location â renaming executables (tasklist.exe, curl) to appear legitimate (ârenamed to either taskllst.exe, tasklist.exe ⌠or curlâ).
- [T1036.007] Masquerading: Double File Extension â using names like .doc.exe to trick users (ââŚDraft Cabinet status ⌠.doc.exeâ examples).
- [T1112] Modify Registry â enabling RDP by modifying fDenyTSConnections in the registry (âEnabling Remote Desktop connections by modifying the Windows Registry âfDenyTSConnectionsââ).
- [T1110.003] Brute Force: Password Spraying â brute-force attacks against OWA/ActiveSync using common passwords and ruler/custom scripts (âbrute force attacks on Exchange servers via their Outlook on the web portalsâ).
- [T1003.001] OS Credential Dumping: LSASS Memory â dumping LSASS with Mimikatz or ProcDump to retrieve credentials (âAccessing credentials by dumping Local Security Authority Subsystem Service (LSASS) with Mimikatz or ProcDumpâ).
- [T1003.002] OS Credential Dumping: Security Account Manager â dumping SAM database (HKLM/sam) to obtain credentials (âAccessing credentials by dumping the SAM database (HKLM/sam)â).
- [T1539] Steal Web Session Cookie â use of authenticated cookies to export Zimbra mailboxes (âpackage the victimâs mailbox via the mail server API using an authenticated cookie stolen by the threat actorâ).
- [T1087.001] Account Discovery: Local Account â discovery of local accounts during reconnaissance and lateral exploration (âAccount Discovery: Local Accountâ).
- [T1087.002] Account Discovery: Domain Account â enumerating domain accounts to plan lateral movement (âAccount Discovery: Domain Accountâ).
- [T1069.002] Permission Groups Discovery: Domain Groups â discovery of domain groups to map permissions (âPermission Groups Discovery: Domain Groupsâ).
- [T1057] Process Discovery â enumerating running processes during post-exploitation (âProcess Discoveryâ).
- [T1033] System Owner/User Discovery â identifying system owner/user context during discovery (âSystem Owner/User Discoveryâ).
- [T1007] System Service Discovery â enumerating services to identify persistence opportunities (âSystem Service Discoveryâ).
- [T1210] Exploitation of Remote Services â exploitation of remote services to move laterally (âExploitation of Remote Servicesâ).
- [T1534] Internal Spearphishing â sending spear-phishing internally using compromised government accounts (âsend spear-phishing emails to government-related targets using compromised government email accountsâ).
- [T1021.006] Remote Services: Windows Remote Management â use of remote management for lateral movement (âRemote Services: Windows Remote Managementâ).
- [T1119] Automated Collection â automated harvesting and packaging of emails for exfiltration (âAutomated Collectionâ).
- [T1114] Email Collection â targeted email collection and mailbox export from Zimbra and Exchange (âEmail Collectionâ and mailbox export scripts shown).
- [T1071.001] Application Layer Protocol: Web Protocols â C2 over web protocols for backdoors and Cobalt Strike (âApplication Layer Protocol: Web Protocolsâ).
- [T1573] Encrypted Channel: Symmetric Cryptography â C2 communications encrypted with AES for RESHELL and others (âC&C communication is encrypted with the AES algorithmâ).
- [T1105] Ingress Tool Transfer â transferring tools and payloads into victim environments (âdropped PlugX and ShadowPad samples in victim environmentsâ).
- [T1572] Protocol Tunneling â installing SoftEther VPN to tunnel/proxy access into private networks (âbuild VPN servers on compromised public-facing serversâ).
- [T1020] Automated Exfiltration â automated exfiltration of mailboxes and data using scripts and tools (âThe Python script used by Earth Krahang to exfiltrate the victimâs mailboxâ).
Indicators of Compromise
- [IP Address] lateral-stage download and C2 â 45.32.33.17, 207.148.75.122 (used to download malware and linked to Earth Lusca)
- [Domain] infrastructure/hosting â googledatas[.]com (infrastructure overlap), and the report IOC list link (i.e., ioc_earth_krahang.txt)
- [File Hash] Cobalt Strike side-load files â fontsets.exe SHA256: 97c668912c29b8203a7c3bd7d5d690d5c4e5da53, faultrep.dll SHA256: a94d0e51df6abbc4a7cfe84e36eb8f38bc011f46
- [File Names] loader/side-load and payload artifacts â faultrep.dat, conf.data, RuntimeInit.exe, GoogleUpdate.exe (used in DLL side-loading and installer chains)
- [CVE] exploited vulnerabilities â CVE-2023-32315 (OpenFire command execution), CVE-2022-21587 (Oracle Web Applications Desktop Integrator command execution)
- [Certificate Hash] abused code-signing certs â be9de0d818b4096d80ce7d88110917b2a4e8273f, be31e841820586e9106407d78ae190915f2c012d (GlobalSign certs abused to sign XDealer loaders)
Earth Krahangâs technical procedure begins with extensive reconnaissance of public-facing infrastructure: recursive searches of developer folders (.git, .idea), directory brute-forcing, subdomain enumeration, and active vulnerability scanning using tools such as sqlmap, nuclei, xray, vscan, pocsuite, and wordpressscan to locate exploitable web servers and sensitive files. The actor repeatedly exploited known CVEs (e.g., CVE-2023-32315, CVE-2022-21587) and used discovered paths or web shells to upload backdoors and tools onto compromised servers.
For initial access and delivery, Earth Krahang used spear-phishing attachments and links with geopolitical lures and leveraged compromised government domains and email accounts to increase trust. Delivered tooling included RESHELL (.NET backdoor packed with ConfuserEX and AES-encrypted C2), XDealer (Windows/Linux DLL-based backdoor with stealer modules delivered via LNK/installer chains), Cobalt Strike (deployed via DLL side-loading loaders such as fontsets.exe + faultrep.dll + faultrep.dat), PlugX, and ShadowPad; some XDealer loaders were signed with abused GlobalSign certificates to evade detection.
Post-exploitation actions focused on establishing sustained, covert access and harvesting credentials: installing SoftEther VPN (downloaded via certutil and renamed to tasklist.exe/curl) to tunnel into internal networks, enabling RDP by modifying fDenyTSConnections, establishing persistence via scheduled tasks/services, dumping credentials from LSASS or the SAM database with Mimikatz/ProcDump, scanning and moving laterally using Fscan/WMIC/remote services, and exfiltrating mailboxes using custom Python scripts and tools (ActiveSync brute-force, ruler, and Zimbra mailbox export via stolen authenticated cookies). Read more: https://www.trendmicro.com/en_us/research/24/c/earth-krahang.html