Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery

0
Medium
Published: Fri Aug 22 2025 (08/22/2025, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: type
Product: osint

Description

Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery

AI-Powered Analysis

AILast updated: 09/15/2025, 00:50:36 UTC

Technical Analysis

The reported threat involves a malware campaign attributed to the advanced persistent threat group APT36, also known as Operation C-Major. This campaign utilizes a combination of social engineering and sophisticated malware delivery techniques to compromise target systems. Specifically, the attackers employ phishing (MITRE ATT&CK T1566) to deliver malicious desktop entry files, which are commonly used in Linux desktop environments to launch applications. These files are crafted to masquerade as legitimate files (T1036) and leverage scripting capabilities (T1064) to execute malicious payloads. The payloads themselves are hosted and delivered via Google Drive, a legitimate cloud service, which helps evade detection by blending in with normal network traffic (T1071). The malware also uses techniques such as hidden files and directories (T1564.001), binary padding (T1027.001) to obfuscate its presence, and may install itself as a Windows service (T1543.003) to maintain persistence. Additional tactics include brute force attempts (T1110) to gain access, software discovery (T1518) to enumerate the environment, and ingress tool transfer (T1105) to download additional tools or payloads. The use of non-standard ports (T1571) and non-application layer protocols (T1095) further complicates detection and mitigation efforts. The campaign's medium severity rating reflects the moderate certainty (50%) of the intelligence and the complexity of the attack chain, which requires user interaction (phishing) but can lead to significant compromise if successful. No patches are available as this is a malware campaign rather than a software vulnerability, and no known exploits in the wild have been reported yet. The threat leverages a broad range of tactics to infiltrate, persist, and move laterally within targeted networks.

Potential Impact

For European organizations, this threat poses a significant risk primarily through social engineering and malware infection vectors. The use of phishing emails with malicious desktop entry files can lead to initial compromise, especially in environments where users have elevated privileges or where endpoint security controls are insufficient. Once inside, the malware's persistence mechanisms and obfuscation techniques can allow attackers to maintain long-term access, potentially leading to data exfiltration, espionage, or disruption of services. Organizations in sectors with high-value intellectual property or sensitive data, such as government, defense, energy, and critical infrastructure, are particularly at risk. The use of Google Drive for payload delivery complicates network-based detection, as traffic to this service is typically allowed and trusted. Additionally, the campaign's ability to use non-standard ports and protocols may bypass traditional firewall and intrusion detection systems. The medium severity suggests that while the threat is not currently widespread or fully confirmed, the potential impact on confidentiality, integrity, and availability is considerable if the attack succeeds.

Mitigation Recommendations

European organizations should implement targeted defenses beyond generic advice. First, enhance email security by deploying advanced phishing detection solutions that analyze attachments and links, including sandboxing desktop entry files and other script-based payloads. User awareness training should emphasize the risks of opening unexpected or suspicious files, especially those with uncommon extensions like .desktop. Endpoint detection and response (EDR) tools should be configured to monitor for suspicious scripting activity, service creation events, and the presence of hidden files or directories. Network monitoring should include anomaly detection for unusual outbound connections, particularly to cloud storage services like Google Drive, and the use of non-standard ports or protocols. Implement strict application whitelisting to prevent unauthorized execution of scripts and binaries. Multi-factor authentication and strong password policies can mitigate brute force attempts. Regularly audit and restrict user privileges to limit the impact of a successful compromise. Finally, establish incident response plans that include procedures for malware containment and forensic analysis to quickly identify and remediate infections.

Need more detailed analysis?Get Pro

Technical Details

Uuid
957de389-e7a6-4e1b-87b3-a7b5e94d3c34
Original Timestamp
1755864522

Indicators of Compromise

Domain

ValueDescriptionCopy
domainseemysitelive.store

Ip

ValueDescriptionCopy
ip164.215.103.55
ip45.155.54.28
seemysitelive.store: Enriched via the dns module

Url

ValueDescriptionCopy
urlws://seemysitelive.store:8080/ws

File

ValueDescriptionCopy
filePROCUREMENT_OF_MANPORTABLE_&_COMPAC.pdf.zip
filePROCUREMENT_OF_MANPORTABLE_\&_COMPAC.pdf.desktop

Hash

ValueDescriptionCopy
hash6ac0fe0fa5d9af8193610d710a7da63c
hash3e3169c513c02126028480421fb341a167cb9fcd
hash34ad45374d5f5059cad65e7057ec0f3e468f00234be7c34de033093efc4dd83d
hasha484f85d132609a4a6b5ed65ece7d331
hash1982f09bfab3a6688bb80249a079db1a759214b7
hash6347f46d77a47b90789a1209b8f573b2529a6084f858a27d977bf23ee8a79113
hash566ddd4eb4ca8d4dd67b72ee7f944055
hashdf4db969a69efc1db59f4d3c596ed590ee059777
hash7a946339439eb678316a124b8d700b21de919c81ee5bef33e8cb848b7183927b

Threat ID: 68a8a9b3ad5a09ad0020bc3d

Added to database: 8/22/2025, 5:32:35 PM

Last enriched: 9/15/2025, 12:50:36 AM

Last updated: 10/6/2025, 10:14:46 AM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats