Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery

0
Medium
Published: Fri Aug 22 2025 (08/22/2025, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: type
Product: osint

Description

Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery

AI-Powered Analysis

AILast updated: 11/20/2025, 00:17:27 UTC

Technical Analysis

The APT36 malware campaign is a targeted threat operation that utilizes a combination of social engineering and technical evasion techniques to infiltrate victim networks. The primary infection vector is phishing (MITRE T1566), where malicious desktop entry files are delivered to victims, often via Google Drive links, to bypass traditional email filtering and security controls. These desktop entry files act as a launcher for malicious scripts (T1064) that execute payloads on the victim’s system. The malware employs masquerading (T1036) and hides files and directories (T1564.001) to evade detection. Persistence is achieved through the creation or manipulation of Windows services (T1543.003), allowing the malware to survive reboots and maintain control. The attackers use binary padding (T1027.001) to obfuscate payloads and avoid signature-based detection. Brute force techniques (T1110) are used to gain access to additional systems or escalate privileges. The campaign also involves software discovery (T1518) to map the environment and identify valuable targets. Communication with command and control servers occurs over both application layer protocols (T1071) and non-application layer protocols (T1095), often utilizing non-standard ports (T1571) to evade network monitoring. Tools and additional payloads are transferred using ingress tool transfer techniques (T1105). The campaign is linked to the threat actor group Operation C-Major, known for targeting South Asian and European entities. No patches or direct fixes exist for this campaign, as it relies on social engineering and custom malware rather than exploiting software vulnerabilities. The campaign’s complexity and use of multiple evasion techniques make it a persistent threat requiring layered defense strategies.

Potential Impact

For European organizations, the APT36 campaign poses a significant risk to confidentiality, integrity, and availability of critical systems. The use of phishing and social engineering increases the likelihood of initial compromise, especially in sectors with less mature cybersecurity awareness. Once inside, the malware’s persistence mechanisms and network reconnaissance capabilities enable lateral movement and data exfiltration, potentially leading to intellectual property theft, espionage, or disruption of services. Critical infrastructure, government agencies, and organizations handling sensitive data are at heightened risk due to the strategic interest of the threat actor. The campaign’s use of cloud services like Google Drive for payload delivery complicates detection and response, as these services are commonly trusted and widely used. The medium severity rating reflects the campaign’s targeted nature and requirement for user interaction, but the potential for significant operational and reputational damage remains high. European entities with extensive use of Windows environments and reliance on cloud collaboration tools are particularly vulnerable.

Mitigation Recommendations

1. Implement advanced email filtering and phishing detection solutions that specifically scan for malicious desktop entry files and suspicious links, including those hosted on cloud platforms like Google Drive. 2. Conduct regular user awareness training focused on recognizing phishing attempts and the risks of opening unknown files or links, emphasizing the threat of desktop entry files as malware vectors. 3. Monitor endpoint systems for creation or modification of Windows services and hidden files/directories, using behavioral analytics to detect masquerading and persistence techniques. 4. Restrict or monitor the use of cloud storage services for inbound payload delivery, employing data loss prevention (DLP) and cloud access security broker (CASB) solutions to control and inspect file transfers. 5. Enforce strong authentication and account lockout policies to mitigate brute force attacks, and implement network segmentation to limit lateral movement. 6. Deploy network monitoring tools capable of detecting anomalous traffic on non-standard ports and unusual protocol usage, correlating with known indicators of ingress tool transfer and command and control communications. 7. Maintain up-to-date threat intelligence feeds and integrate them into security operations to identify emerging TTPs related to Operation C-Major and APT36. 8. Conduct regular security assessments and penetration testing to identify and remediate gaps in phishing resilience and endpoint security controls.

Need more detailed analysis?Get Pro

Technical Details

Uuid
957de389-e7a6-4e1b-87b3-a7b5e94d3c34
Original Timestamp
1755864522

Indicators of Compromise

Domain

ValueDescriptionCopy
domainseemysitelive.store

Ip

ValueDescriptionCopy
ip164.215.103.55
ip45.155.54.28
seemysitelive.store: Enriched via the dns module

Url

ValueDescriptionCopy
urlws://seemysitelive.store:8080/ws

File

ValueDescriptionCopy
filePROCUREMENT_OF_MANPORTABLE_&_COMPAC.pdf.zip
filePROCUREMENT_OF_MANPORTABLE_\&_COMPAC.pdf.desktop

Hash

ValueDescriptionCopy
hash6ac0fe0fa5d9af8193610d710a7da63c
hash3e3169c513c02126028480421fb341a167cb9fcd
hash34ad45374d5f5059cad65e7057ec0f3e468f00234be7c34de033093efc4dd83d
hasha484f85d132609a4a6b5ed65ece7d331
hash1982f09bfab3a6688bb80249a079db1a759214b7
hash6347f46d77a47b90789a1209b8f573b2529a6084f858a27d977bf23ee8a79113
hash566ddd4eb4ca8d4dd67b72ee7f944055
hashdf4db969a69efc1db59f4d3c596ed590ee059777
hash7a946339439eb678316a124b8d700b21de919c81ee5bef33e8cb848b7183927b

Threat ID: 68a8a9b3ad5a09ad0020bc3d

Added to database: 8/22/2025, 5:32:35 PM

Last enriched: 11/20/2025, 12:17:27 AM

Last updated: 11/21/2025, 1:12:04 PM

Views: 178

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats