Skip to main content

Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery

Medium
Published: Fri Aug 22 2025 (08/22/2025, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: type
Product: osint

Description

Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery

AI-Powered Analysis

AILast updated: 08/22/2025, 17:48:20 UTC

Technical Analysis

This investigation report details a malware campaign attributed to the threat actor group APT36, also known as "Operation C-Major." The campaign leverages phishing techniques to deliver malicious payloads disguised as desktop entry files (.desktop) and compressed PDF files (.pdf.zip). The attack vector involves social engineering via phishing emails that entice victims to open these malicious files. The payload delivery mechanism notably uses Google Drive as a hosting platform, which helps evade traditional detection methods by leveraging a trusted cloud service for payload distribution. The malware employs multiple sophisticated tactics consistent with MITRE ATT&CK techniques, including scripting (T1064), masquerading (T1036), hidden files and directories (T1564.001), and the creation of malicious Windows services (T1543.003) to maintain persistence. The campaign also involves brute force attempts (T1110) and software discovery (T1518) to expand access and reconnaissance within compromised environments. Network communications utilize both application layer protocols (T1071) and non-application layer protocols (T1095), sometimes over non-standard ports (T1571), complicating network detection. Indicators of compromise include domains such as "seemysitelive.store," associated IP addresses, WebSocket URLs, and multiple file hashes linked to the malicious payloads. The campaign's medium severity rating reflects the moderate impact potential and the complexity of exploitation, which requires user interaction (opening malicious attachments) but does not currently have known exploits in the wild or available patches. The threat actor's use of legitimate cloud services for payload delivery and advanced evasion techniques underscores the need for vigilant detection and response capabilities.

Potential Impact

For European organizations, this APT36 campaign poses a significant risk primarily through targeted phishing attacks that can lead to initial compromise and subsequent lateral movement within networks. The use of Google Drive for payload hosting may bypass traditional email and web filtering solutions, increasing the likelihood of successful delivery. Once inside, the malware's ability to establish persistence via Windows services and hide its presence can lead to prolonged undetected access, data exfiltration, and potential espionage activities. The campaign's brute force and software discovery techniques could enable attackers to escalate privileges and map critical infrastructure, threatening confidentiality and integrity of sensitive data. Disruption of availability is possible if the malware disables security controls or critical services. European organizations with remote workforces or those heavily reliant on cloud services may be particularly vulnerable. The medium severity suggests a moderate but credible threat that could impact sectors such as government, defense, critical infrastructure, and enterprises handling sensitive procurement or operational data, especially if targeted by APT36 due to geopolitical interests.

Mitigation Recommendations

To mitigate this threat effectively, European organizations should implement targeted phishing awareness and training programs emphasizing the risks of opening unsolicited attachments, especially those with unusual file extensions like .desktop or compressed PDFs. Email security gateways should be configured to detect and block suspicious attachments and URLs, including those pointing to cloud storage services like Google Drive. Endpoint detection and response (EDR) solutions must be tuned to identify behaviors associated with scripting, masquerading, and unauthorized Windows service creation. Network monitoring should include anomaly detection for non-standard port usage and unusual WebSocket connections, such as those to the domain "seemysitelive.store." Multi-factor authentication (MFA) should be enforced to reduce the risk from brute force attacks. Regular audits of user privileges and software inventories can limit the attack surface and detect unauthorized changes. Incident response plans should incorporate procedures for rapid containment and forensic analysis of phishing-related compromises. Additionally, organizations should collaborate with threat intelligence sharing platforms to stay updated on emerging indicators and tactics related to APT36.

Need more detailed analysis?Get Pro

Technical Details

Uuid
957de389-e7a6-4e1b-87b3-a7b5e94d3c34
Original Timestamp
1755864522

Indicators of Compromise

Domain

ValueDescriptionCopy
domainseemysitelive.store

Ip

ValueDescriptionCopy
ip164.215.103.55
ip45.155.54.28
seemysitelive.store: Enriched via the dns module

Url

ValueDescriptionCopy
urlws://seemysitelive.store:8080/ws

File

ValueDescriptionCopy
filePROCUREMENT_OF_MANPORTABLE_&_COMPAC.pdf.zip
filePROCUREMENT_OF_MANPORTABLE_\&_COMPAC.pdf.desktop

Hash

ValueDescriptionCopy
hash6ac0fe0fa5d9af8193610d710a7da63c
hash3e3169c513c02126028480421fb341a167cb9fcd
hash34ad45374d5f5059cad65e7057ec0f3e468f00234be7c34de033093efc4dd83d
hasha484f85d132609a4a6b5ed65ece7d331
hash1982f09bfab3a6688bb80249a079db1a759214b7
hash6347f46d77a47b90789a1209b8f573b2529a6084f858a27d977bf23ee8a79113
hash566ddd4eb4ca8d4dd67b72ee7f944055
hashdf4db969a69efc1db59f4d3c596ed590ee059777
hash7a946339439eb678316a124b8d700b21de919c81ee5bef33e8cb848b7183927b

Threat ID: 68a8a9b3ad5a09ad0020bc3d

Added to database: 8/22/2025, 5:32:35 PM

Last enriched: 8/22/2025, 5:48:20 PM

Last updated: 8/23/2025, 1:29:25 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats