Hydrochasma targets medical laboratories and shipping organizations in Asia in an intelligence-gathering campaign that relies on publicly available tools and living-off-the-land techniques. The operation, active since October 2022, appears focused on information gathering rather than data exfiltration, leveraging phishing lures and a mix of legitimate utilities to gain persistent access and move laterally.
Keypoints
- Hydrochasma is a newly identified threat actor focusing on Asia-based medical and shipping sectors.
- Campaign appears to aim at intelligence gathering rather than data theft, with no exfiltration observed by Symantec in this activity.
- Phishing is the presumed initial access vector, featuring lure documents in victims’ native language (e.g., “Product Specification-Freight-Company Qualification Information wps-pdf Export.pdf.exe”).
- After initial access, attackers deploy FRP to expose internal services and install Meterpreter for remote access.
- Tools observed include FRP, Meterpreter, Cobalt Strike Beacon, GoGo/AlliN/Fscan/Dogz/SoftEtherVPN, Procdump, BrowserGhost, Gost proxy, Ntlmrelay, Task Scheduler, Go-strip, HackBrowserData, and a shellcode loader.
- The activity emphasizes persistence, privilege escalation, and lateral movement, with indicators pointing to intelligence gathering as the motivation.
MITRE Techniques
- [T1566.001] Phishing: Attachment – The infection vector is likely phishing with lure documents in the victim’s language; for example, a lure titled “[TRANSLATED FROM THE ORIGINAL] Product Specification-Freight-Company Qualification Information wps-pdf Export.pdf.exe”.
- [T1090.001] External Proxy – Fast Reverse Proxy (FRP) is used to expose a local server to the internet, enabling remote access; quote: “the attackers were seen dropping Fast Reverse Proxy (FRP), a tool that can expose a local server that is sitting behind an NAT or firewall to the internet.”
- [T1219] Remote Access Tools – Meterpreter and Cobalt Strike Beacon provide remote access, process injection, and command execution; quote: “This file is actually Meterpreter, a tool that is part of the Metasploit framework and which can be used for remote access.” and “Cobalt Strike Beacon: An off-the-shelf tool that can be used to execute commands, inject other processes, elevate current processes, or impersonate other processes.”
- [T1046] Network Service Discovery – Multiple scanning tools (Gogo, AlliN, Fscan) indicate discovery of network services and lateral movement opportunities; quote: “Gogo scanning tool: An automated scanning engine originally designed for use by red teams.”
- [T1003.001] OS Credential Dumping – Process Dumper (lsass.exe) used to dump domain passwords; quote: “Process Dumper (lsass.exe): A tool that allows attackers to dump domain passwords.”
- [T1053] Scheduled Task – Task Scheduler enables automated tasks and persistence; quote: “Task Scheduler: Allows tasks to be automated on a computer.”
- [T1572] Protocol Tunneling – Gost proxy and similar tools enable tunneling to bypass network restrictions; quote: “Gost proxy: A tunneling tool.”
- [T1550] Use of Credentials – NTLM relay used to intercept and reuse authentication; quote: “Ntlmrelay: An NTLM relay attack allows an attacker to intercept validated authentication requests in order to access network services.”
- [T1071.001] Web Protocols – Cobalt Strike Beacon C2 communications leverage web protocols; quote: “Cobalt Strike Beacon C&C” (as part of command and control using web protocols).
- [T1560] Archive Collected Data – Not explicitly detailed, but the stealthy, living-off-the-land approach aligns with minimizing data fingerprints and exfiltration risk; quote: “living-off-the-land and publicly available tools can help make an attack stealthier, while also making attribution more difficult.”
- [T1105] Ingress Tool Transfer – Tools and payloads are moved to the victim environment as part of initial access and follow-on actions; quote: multiple tools and DLL/PE dropper deployments described.
- [T1059] Command and Scripting Interpreter – Meterpreter and Cobalt Strike capabilities imply command execution within compromised hosts; quote: “execute commands, inject other processes, elevate current processes, or impersonate other processes.”
- [T1218] Signed Binary Proxy Execution – Use of legitimate-looking binaries (e.g., Edge update) as a cover for malicious activity; quote: “drops a legitimate Microsoft Edge update file: %TEMP%MicrosoftEdgeUpdate.exe” and “%TEMP%msedgeupdate.dll” used for remote access.
- [T1120] Peripheral Device Discovery – Not explicitly present, included for completeness in listing broad toolset; no direct quote.
Indicators of Compromise
- [File hash] – File Indicators – 409f89f4a00e649ccd8ce1a4a08afe03cb5d1c623ab54a80874aebf09a9840e5 (Fast Reverse Proxy); 47d328c308c710a7e84bbfb71aa09593e7a82b707fde0fb9356fb7124118dc88 (GoGo Scanning Tool)
- [File hash] – 6698a81e993363fab055085c339d9a20a25d159aaa9c4b91f60bb4a68627132 (Dropper)
- [File hash] – 7229bd06cb2a4bbe157d72a3734ba25bc7c08d6644c3747cdc4bcc5776f4b5b9 (Process Dumper lsass.exe)
- [File hash] – 72885373e3e8404f1889e479b3d46dd8111280379c4065bfc1e62df093e42aba (Fast Reverse Proxy)
- [File hash] – 72bc8b30df3cdde6c58ef1e8a3eae9e7882d1abe0b7d4810270b5a0cc077bb1a (Cobalt Strike Beacon)
- [File hash] – 7b410fa2a93ed04a4155df30ffde7d43131c724cdf60815ee354988b31e826f8 (Fast Reverse Proxy)
- [File hash] – 7f0807d40e9417141bf274ef8467a240e20109a489524e62b090bccdb4998bc6 (Process Dumper lsass.exe)
- [File hash] – 8c0f0d1acb04693a6bdd456a6fcd37243e502b21d17c8d9256940fc7943b1e9a (Cobalt Strike Beacon)
- [File hash] – 8e32ea45e1139b459742e676b7b2499810c3716216ba2ec55b77c79495901043 (Fast Reverse Proxy)
- [File hash] – 981e5f7219a2f92a908459529c42747ac5f5a820995f66234716c538b19993eb (GoGo Scanning Tool)
- [File hash] – 9ebd789e8ca8b96ed55fc8e95c98a45a61baea3805fd440f50f2bde5ffd7a372 (Fast Reverse Proxy)
- [File hash] – 9f5f7ba7d276f162cc32791bfbaa0199013290a8ac250eb95fd90bc004c3fd36 (Cobalt Strike Beacon)
- [File hash] – a0f5966fcc64ce2d10f24e02ae96cdc91590452b9a96b3b1d4a2f66c722eec34 (AllIn Scanning Tool)
- [File hash] – cb03b5d517090b20749905a330c55df9eb4d1c6b37b1b31fae1982e32fd10009 (Fscan)
- [File hash] – d1c4968e7690fd40809491acc8787389de0b7cbc672c235639ae7b4d07d04dd4 (Shellcode Loader)
- [File hash] – de01492b44372f2e4e38354845e7f86e0be5fb8f5051baafd004ec5c1567039f (Cobalt Strike Beacon)
- [File hash] – e378d8b5a35d4ec75cae7524e64c1d605f1511f9630c671321ee46aa7c4d378b (PE File)
- [File hash] – eba22f50eedfec960fac408d9e6add4b0bd91dd5294bee8cff730db53b822841 (Dropper)
- [File hash] – fc4b5f2ee9da1fe105bb1b7768754d48f798bf181cbc53583387578a5ebc7b56 (Dogz Proxy Tool)
- [IP] – Network Indicators – 39.101.194.61, 47.92.138.241, 106.14.184.148, 180.119.234.147
- [Domains] – Domains – alidocs.dingtalk.com.wswebpic.com, csc.zte.com.cn.wswebpic.com, taoche.cn.wswebpic.com
- [URLs] – URLs – hxxp://47.92.138.241:8090/update.exe, hxxp://47.92.138.241:8000/agent.exe, hxxp://47.92.138.241:8000/update.exe, hxxp://47.92.138.241:8000/ff.exe, hxxp://47.92.138.241:8000/aa.exe, hxxp://47.92.138.241:8000/runas.exe, hxxp://47.92.138.241:8090/a.exe, hxxp://47.92.138.241:8000/t.exe, hxxp://47.92.138.241:8080/t.png, hxxp://47.92.138.241:8000/frp.exe