Learn more about the APT41 group, the threat targeting Brazil

Main threat groups targeting Brazil: meet APT41

By Ismael Rocha: An advanced persistent threat(APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal private and secret information, damage IT systems and disrupt the functioning of vital systems. Defending against advanced persistent threats is a difficult task as they act stealthily and their intrusions can be difficult to recognize.

Brazil is a country with a wide variety of economic sectors, such as: education/research, finance, health, government/military, retail, energy, communication, technology, among others. These sectors generate large sums of money for governments and organizations, consequently arousing the interest of advanced threat groups. Thus, it is possible to note the great increase in cyber attacks for financial gain, access to secret and confidential files or country disruption by cybercriminals.

Countries and segments targeted by APT41

The APT group is known for targeting various countries around the world. Some of the regions where the threat has already been active include Asia, Europe, North America and South America. Some of the countries that are known targets of APT41 include:

Figure 1 - Map of the group's target countries

It's important to note that APT41 is a highly sophisticated and constantly evolving group, so the list may change over time. For this same reason, we stress that the list of target segments below may also change.

Figure 2 - APT41 target segments

Threat mode of operation

The APT41 advanced threat group's attack chain can vary depending on the target and the specific objectives of the attack, but generally involves the following steps:

Figure 3 - APT41 group operating mode
  1. Reconnaissance and information gathering: target research is carried out and information is gathered to understand the network infrastructure, technologies used and other relevant details;
  2. Delivery: a variety of techniques are used to deliver the malware or malicious payload to the organization's system or network, including phishing, spear phishing, malvertising, exploitation of vulnerabilities, among others;
  3. Exploitation: once the payload has been delivered, the group uses exploitation techniques to look for vulnerabilities in the organization's system or network in order to gain unauthorized access;
  4. Evasion of defenses: a presence is established on the organization's system or network, using evasion techniques to avoid detection;
  5. Lateral movement: the group moves laterally through the organization's system or network, looking for valuable information;
  6. Data exfiltration: APT41 collects and exfiltrates valuable data from the organization, including confidential information, intellectual property and other financial and strategic information;
  7. Persistence: APT41 maintains a persistent presence on the organization's system or network, allowing them to continue collecting information and carrying out malicious activities for an extended period;
  8. Impact and destruction: in some cases, APT41 can destroy data or carry out sabotage as part of its overall attack strategy.

It is important to note that the APT41 attack chain is highly sophisticated and constantly evolving, and may include other steps and/or variations depending on the target and the specific objectives of the attack.

Tools already used by APT41

It was identified that APT41 uses a variety of malware and tools, both public and exclusive to the group, to establish a foothold in the victim's environment, such as:

- ASPXSpy

- ACEHASH

- Beacon

- CHINACHOP

- COLDJAVA

- CRACKSHOT

- CROSSWALK

- DEADEYE

- DOWNTIME

- EASYNIGHT

- Gh0st

- HIGHNOON.LITE

- HIGHNOON.PASTEBOY

- HOTCHAI

- HKDOOR

- JUMPALL

- LATELUNCH

- LIFEBOAT

- LOWKEY

- njRAT

- POISONPLUG

- POISONPLUG.SHADOW

- POTROAST

- SAGEHIRE

- SOGU

- SWEETCANDLE

- TERA

- TIDYELF

- XDOOR

- WINTERLOVE

- ZXSHELL

TTPs - MITRE ATT&CK

TacticsTechniqueDetails
Defense Evasion Privilege EscalationT1134APT41 used a BADPOTATO exploit obfuscated by ConfuserEx to abuse the named channel representation for NT AUTHORITY\SYSTEM local privilege escalation.
PersistenceT1098User accounts have been added to the User and Admin groups.
Command and ControlT1071APT41 used HTTP to download payloads for the CVE-2019-19781 and CVE-2020-10189 exploits.
CollectionT1560A RAR archive of files targeted for exfiltration has been created.
Defense Evasion PersistenceT1197APT41 used BITSAdmin to download and install payloads.
Persistence Privilege EscalationT1547Initialization files for persistence have been created and modified. A registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost has been added to establish persistence for Cobalt Strike.
Credential AccessT1110Password brute force attacks were carried out on the local administrator account.
ExecutionT1059It took advantage of PowerShell to deploy malware families in victims' environments.
ImpactT1486Ransomware called Encryptor RaaS was used to encrypt files on the target systems and provide the user with a ransom note.
Privilege Escalation PersistenceT1546The APT41 took advantage of the grip keys to establish persistence.

Indicators of Commitment (IoCs)

ISH Technology handles several Indicators of Commitment collected through open sources, closed sources and also through analysis performed by the Heimdall security team. In light of this, below we list all Indicators of Commitments (IOCs) related to the analysis of the artifact(s) in this report.

Malicious/analyzed artifact compromise indicators
md5:04fb0ccf3ef309b1cd587f609ab0e81e
sha1:44260a1dfd92922a621124640015160e621f32d5
sha256:993d14d00b1463519fea78ca65d8529663f487cd76b67b3fd35440bcdf7a8e31
File name:VirusShare_04fb0ccf3ef309b1cd587f609ab0e81e
Malicious/analyzed artifact compromise indicators
md5:f8c89ccd8937f2b760e6706738210744
sha1:f3c222606f890573e6128fbeb389f37bd6f6bda3
sha256:4aa6970cac04ace4a930de67d4c18106cf4004ba66670cfcdaa77a4c4821a213
File name:24BJCTGH.exe
Malicious/analyzed artifact compromise indicators
md5:46a557fbdce734a6794b228df0195474
sha1:41bac813ae07aef41436e8ad22d605f786f9e099
sha256:42d138d0938494fd64e1e919707e7201e6675b1122bf30ab51b1ae26adaec921
File name: 
Malicious/analyzed artifact compromise indicators
md5:77c60e5d2d99c3f63f2aea1773ed4653
sha1:ad77a34627192abdf32daa9208fbde8b4ebfb25c
sha256:7566558469ede04efc665212b45786a730055770f6ea8f924d8c1e324cae8691
File name:7566558469ede04efc665212b45786a730055770f6ea8f924d8c1e324cae8691.vir
Malicious/analyzed artifact compromise indicators
md5:849ab91e93116ae420d2fe2136d24a87
sha1:3f1dee370a155dc2e8fb15e776821d7697583c75
sha256:7cd17fc948eb5fa398b8554fea036bdb3c0045880e03acbe532f4082c271e3c5
File name:file.exe.app.dll
Malicious/analyzed artifact compromise indicators
md5:36711896cfeb67f599305b590f195aec
sha1:1036a7088b060250bb66b6de91f0c6ac462dc24c
sha256:490c3e4af829e85751a44d21b25de1781cfe4961afdef6bb5759d9451f530994
File name:490c3e4af829e85751a44d21b25de1781cfe4961afdef6bb5759d9451f530994.bin
Malicious/analyzed artifact compromise indicators
md5:7d51ea0230d4692eeedc2d5a4cd66d2d
sha1:5ee7c57dc84391f63eaa3824c53cc10eafc9e388
sha256:63e8ed9692810d562adb80f27bb1aeaf48849e468bf5fd157bc83ca83139b6d7
File name:63e8ed9692810d562adb80f27bb1aeaf48849e468bf5fd157bc83ca83139b6d7.bin
Malicious/analyzed artifact compromise indicators
md5:a0a96138b57ee24eed31b652ddf60d4e
sha1:03de2118aac6f20786043c7ef0324ef01dcf4265
sha256:79190925bd1c3fae65b0d11db40ac8e61fb9326ccfed9b7e09084b891089602d
File name:79190925bd1c3fae65b0d11db40ac8e61fb9326ccfed9b7e09084b891089602d.bin
Malicious/analyzed artifact compromise indicators
md5:ba08b593250c3ca5c13f56e2ca97d85e
sha1:adde0644a572ed593e8b0566698d4e3de0fefb8a
sha256:c51c5bbc6f59407286276ce07f0f7ea994e76216e0abe34cbf20f1b1cbd9446d
File name:c51c5bbc6f59407286276ce07f0f7ea994e76216e0abe34cbf20f1b1cbd9446d
Malicious/analyzed artifact compromise indicators
md5:37e100dd8b2ad8b301b130c2bca3f1ea
sha1:32466d8d232d7b1801f456fe336615e6fa5e6ffb
sha256:2eea29d83f485897e2bac9501ef000cc266ffe10019d8c529555a3435ac4aabd
File name:TSMSISrv.DLL
Malicious/analyzed artifact compromise indicators
md5:557ff68798c71652db8a85596a4bab72
sha1:971bb08196bba400b07cf213345f55ce0a6eedc8
sha256:5d971ed3947597fbb7e51d806647b37d64d9fe915b35c7c9eaf79a37b82dab90
File name:TSMSISrv.DLL
Malicious/analyzed artifact compromise indicators
md5:830a09ff05eac9a5f42897ba5176a36a
sha1:2366d181a1697bcb4f368df397dd0533ab8b5d27
sha256:70c03ce5c80aca2d35a5555b0532eedede24d4cc6bdb32a2c8f7e630bba5f26e
File name:BARLAIY-70c03ce5c80aca2d35a5555b0532eedede24d4cc6bdb32a2c8f7e630bba5f26e
Malicious/analyzed artifact compromise indicators
md5:7d51ea0230d4692eeedc2d5a4cd66d2d
sha1:5ee7c57dc84391f63eaa3824c53cc10eafc9e388
sha256:63e8ed9692810d562adb80f27bb1aeaf48849e468bf5fd157bc83ca83139b6d7
File name:63e8ed9692810d562adb80f27bb1aeaf48849e468bf5fd157bc83ca83139b6d7.bin
Malicious/analyzed artifact compromise indicators
md5:b0877494d36fab1f9f4219c3defbfb19
sha1:4dc5fadece500ccd8cc49cfcf8a1b59baee3382a
sha256:3e6c4e97cc09d0432fbbbf3f3e424d4aa967d3073b6002305cd6573c47f0341f
File name:TSMSISrv.DLL
Malicious/analyzed artifact compromise indicators
md5:ff8d92dfbcda572ef97c142017eec658
sha1:6f065eea36e28403d4d518b8e24bb7a915b612c3
sha256:f4d57acde4bc546a10cd199c70cdad09f576fdfe66a36b08a00c19ff6ae19661
File name:TSMSISrv.DLL
Malicious/analyzed artifact compromise indicators
md5:ffd0f34739c1568797891b9961111464
sha1:82072cb53416c89bfee95b239f9a90677a0848df
sha256:0055dfaccc952c99b1171ce431a02abfce5c6f8fb5dc39e4019b624a7d03bfcb
File name:ma_lockdown_service.dll
Malicious/analyzed artifact compromise indicators
md5:97363d50a279492fda14cbab53429e75
sha1:f1a181d29b38dfe60d8ea487e8ed0ef30f064763
sha256:462a02a8094e833fd456baf0a6d4e18bb7dab1a9f74d5f163a8334921a4ffde8
File name:nssock.dll
Malicious/analyzed artifact compromise indicators
md5:5e87b09f9a3f1b728c9797560a38764b
sha1:67c957c268c1e56cc8eb34b02e5c09eae62680f5
sha256:354c174e583e968f0ecf86cc20d59ecd6e0f9d21800428453b8db63f344f0f22
File name:=?utf-8?B?5Lit5p2x5ZG85ZC45Zmo55eH5YCZ576kKE1FUlMp44Gu5LqI6ZiyLjd6?=

Distribution URLs and C2 IP addresses:

byeserver[.]com
dnsgogle[.]com
gamewushu[.]com
gxxservice[.]com
ibmupdate[.]com
infestexe[.]com
kasparsky[.]net
linux-update[.]net
macfee[.]ga
micros0ff[.]com
micros0tf[.]com
notped[.]com
operatingbox[.]com
paniesx[.]com
serverbye[.]com
sexyjapan.ddns[.]info
symanteclabs[.]com
techniciantext[.]com
win7update[.]net
xigncodeservice[.]com
agegamepay[.]com
ageofwuxia[.]com
ageofwuxia[.]info
ageofwuxia[.]net
ageofwuxia[.]org

Note: The links and IP addresses listed above may be active; be careful when manipulating these IoCs, to avoid clicking on them and becoming a victim of the malicious content hosted on the IoC.

How to protect yourself from the APT41 group

In addition to the indicators of compromise listed above by the ISH, measures can be adopted to mitigate the infection of the aforementioned to advanced persistent threats, such as:

  • Keeping software up to date: it is important to keep the operating system, applications and security software up to date with the latest security updates. This helps to correct known vulnerabilities that can be exploited by APTs.
  • Use multi-factor authentication: this can help protect against phishing attacks and stolen credentials. It adds an extra layer of security by requiring the user to provide additional information, in addition to a password, in order to authenticate.
  • Do not download artifacts contained in suspicious emails and do not click on links in emails that appear to have malicious behavior.
  • Use encryption: this can help protect sensitive information, such as customer and corporate data, from being accessed by APTs.
  • Backing up regularly: cultivating this practice for critical data can help protect against data loss due to APT attacks.
  • Implementing network security controls: such as firewalls, IDS/IPS and advanced threat detection, can help identify and block APTs before they can cause damage.
  • Carry out security awareness training: this can help educate users about security threats and how to protect themselves against them.
  • Perform behavior analysis: this can help detect suspicious activity within the network, such as transferring large amounts of data to unknown locations or attempting to access confidential resources outside of working hours.
  • Adopt a company-wide security posture: to be effective against APTs it is important that companies adopt a comprehensive company-wide approach to security, including policies and procedures, security controls and regular security awareness training.

References

Leave a Comment

Your e-mail address will not be published. Required fields are marked with *