Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
AI Analysis
Technical Summary
This investigation report details a malware campaign attributed to the threat actor group APT36, also known as "Operation C-Major." The campaign leverages phishing techniques to deliver malicious payloads disguised as desktop entry files (.desktop) and compressed PDF files (.pdf.zip). The attack vector involves social engineering via phishing emails that entice victims to open these malicious files. The payload delivery mechanism notably uses Google Drive as a hosting platform, which helps evade traditional detection methods by leveraging a trusted cloud service for payload distribution. The malware employs multiple sophisticated tactics consistent with MITRE ATT&CK techniques, including scripting (T1064), masquerading (T1036), hidden files and directories (T1564.001), and the creation of malicious Windows services (T1543.003) to maintain persistence. The campaign also involves brute force attempts (T1110) and software discovery (T1518) to expand access and reconnaissance within compromised environments. Network communications utilize both application layer protocols (T1071) and non-application layer protocols (T1095), sometimes over non-standard ports (T1571), complicating network detection. Indicators of compromise include domains such as "seemysitelive.store," associated IP addresses, WebSocket URLs, and multiple file hashes linked to the malicious payloads. The campaign's medium severity rating reflects the moderate impact potential and the complexity of exploitation, which requires user interaction (opening malicious attachments) but does not currently have known exploits in the wild or available patches. The threat actor's use of legitimate cloud services for payload delivery and advanced evasion techniques underscores the need for vigilant detection and response capabilities.
Potential Impact
For European organizations, this APT36 campaign poses a significant risk primarily through targeted phishing attacks that can lead to initial compromise and subsequent lateral movement within networks. The use of Google Drive for payload hosting may bypass traditional email and web filtering solutions, increasing the likelihood of successful delivery. Once inside, the malware's ability to establish persistence via Windows services and hide its presence can lead to prolonged undetected access, data exfiltration, and potential espionage activities. The campaign's brute force and software discovery techniques could enable attackers to escalate privileges and map critical infrastructure, threatening confidentiality and integrity of sensitive data. Disruption of availability is possible if the malware disables security controls or critical services. European organizations with remote workforces or those heavily reliant on cloud services may be particularly vulnerable. The medium severity suggests a moderate but credible threat that could impact sectors such as government, defense, critical infrastructure, and enterprises handling sensitive procurement or operational data, especially if targeted by APT36 due to geopolitical interests.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should implement targeted phishing awareness and training programs emphasizing the risks of opening unsolicited attachments, especially those with unusual file extensions like .desktop or compressed PDFs. Email security gateways should be configured to detect and block suspicious attachments and URLs, including those pointing to cloud storage services like Google Drive. Endpoint detection and response (EDR) solutions must be tuned to identify behaviors associated with scripting, masquerading, and unauthorized Windows service creation. Network monitoring should include anomaly detection for non-standard port usage and unusual WebSocket connections, such as those to the domain "seemysitelive.store." Multi-factor authentication (MFA) should be enforced to reduce the risk from brute force attacks. Regular audits of user privileges and software inventories can limit the attack surface and detect unauthorized changes. Incident response plans should incorporate procedures for rapid containment and forensic analysis of phishing-related compromises. Additionally, organizations should collaborate with threat intelligence sharing platforms to stay updated on emerging indicators and tactics related to APT36.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Poland
Indicators of Compromise
- domain: seemysitelive.store
- ip: 164.215.103.55
- url: ws://seemysitelive.store:8080/ws
- ip: 45.155.54.28
- file: PROCUREMENT_OF_MANPORTABLE_&_COMPAC.pdf.zip
- hash: 6ac0fe0fa5d9af8193610d710a7da63c
- hash: 3e3169c513c02126028480421fb341a167cb9fcd
- hash: 34ad45374d5f5059cad65e7057ec0f3e468f00234be7c34de033093efc4dd83d
- file: PROCUREMENT_OF_MANPORTABLE_\&_COMPAC.pdf.desktop
- hash: a484f85d132609a4a6b5ed65ece7d331
- hash: 1982f09bfab3a6688bb80249a079db1a759214b7
- hash: 6347f46d77a47b90789a1209b8f573b2529a6084f858a27d977bf23ee8a79113
- hash: 566ddd4eb4ca8d4dd67b72ee7f944055
- hash: df4db969a69efc1db59f4d3c596ed590ee059777
- hash: 7a946339439eb678316a124b8d700b21de919c81ee5bef33e8cb848b7183927b
Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
Description
Investigation Report: APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
AI-Powered Analysis
Technical Analysis
This investigation report details a malware campaign attributed to the threat actor group APT36, also known as "Operation C-Major." The campaign leverages phishing techniques to deliver malicious payloads disguised as desktop entry files (.desktop) and compressed PDF files (.pdf.zip). The attack vector involves social engineering via phishing emails that entice victims to open these malicious files. The payload delivery mechanism notably uses Google Drive as a hosting platform, which helps evade traditional detection methods by leveraging a trusted cloud service for payload distribution. The malware employs multiple sophisticated tactics consistent with MITRE ATT&CK techniques, including scripting (T1064), masquerading (T1036), hidden files and directories (T1564.001), and the creation of malicious Windows services (T1543.003) to maintain persistence. The campaign also involves brute force attempts (T1110) and software discovery (T1518) to expand access and reconnaissance within compromised environments. Network communications utilize both application layer protocols (T1071) and non-application layer protocols (T1095), sometimes over non-standard ports (T1571), complicating network detection. Indicators of compromise include domains such as "seemysitelive.store," associated IP addresses, WebSocket URLs, and multiple file hashes linked to the malicious payloads. The campaign's medium severity rating reflects the moderate impact potential and the complexity of exploitation, which requires user interaction (opening malicious attachments) but does not currently have known exploits in the wild or available patches. The threat actor's use of legitimate cloud services for payload delivery and advanced evasion techniques underscores the need for vigilant detection and response capabilities.
Potential Impact
For European organizations, this APT36 campaign poses a significant risk primarily through targeted phishing attacks that can lead to initial compromise and subsequent lateral movement within networks. The use of Google Drive for payload hosting may bypass traditional email and web filtering solutions, increasing the likelihood of successful delivery. Once inside, the malware's ability to establish persistence via Windows services and hide its presence can lead to prolonged undetected access, data exfiltration, and potential espionage activities. The campaign's brute force and software discovery techniques could enable attackers to escalate privileges and map critical infrastructure, threatening confidentiality and integrity of sensitive data. Disruption of availability is possible if the malware disables security controls or critical services. European organizations with remote workforces or those heavily reliant on cloud services may be particularly vulnerable. The medium severity suggests a moderate but credible threat that could impact sectors such as government, defense, critical infrastructure, and enterprises handling sensitive procurement or operational data, especially if targeted by APT36 due to geopolitical interests.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should implement targeted phishing awareness and training programs emphasizing the risks of opening unsolicited attachments, especially those with unusual file extensions like .desktop or compressed PDFs. Email security gateways should be configured to detect and block suspicious attachments and URLs, including those pointing to cloud storage services like Google Drive. Endpoint detection and response (EDR) solutions must be tuned to identify behaviors associated with scripting, masquerading, and unauthorized Windows service creation. Network monitoring should include anomaly detection for non-standard port usage and unusual WebSocket connections, such as those to the domain "seemysitelive.store." Multi-factor authentication (MFA) should be enforced to reduce the risk from brute force attacks. Regular audits of user privileges and software inventories can limit the attack surface and detect unauthorized changes. Incident response plans should incorporate procedures for rapid containment and forensic analysis of phishing-related compromises. Additionally, organizations should collaborate with threat intelligence sharing platforms to stay updated on emerging indicators and tactics related to APT36.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Uuid
- 957de389-e7a6-4e1b-87b3-a7b5e94d3c34
- Original Timestamp
- 1755864522
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainseemysitelive.store | — |
Ip
Value | Description | Copy |
---|---|---|
ip164.215.103.55 | — | |
ip45.155.54.28 | seemysitelive.store: Enriched via the dns module |
Url
Value | Description | Copy |
---|---|---|
urlws://seemysitelive.store:8080/ws | — |
File
Value | Description | Copy |
---|---|---|
filePROCUREMENT_OF_MANPORTABLE_&_COMPAC.pdf.zip | — | |
filePROCUREMENT_OF_MANPORTABLE_\&_COMPAC.pdf.desktop | — |
Hash
Value | Description | Copy |
---|---|---|
hash6ac0fe0fa5d9af8193610d710a7da63c | — | |
hash3e3169c513c02126028480421fb341a167cb9fcd | — | |
hash34ad45374d5f5059cad65e7057ec0f3e468f00234be7c34de033093efc4dd83d | — | |
hasha484f85d132609a4a6b5ed65ece7d331 | — | |
hash1982f09bfab3a6688bb80249a079db1a759214b7 | — | |
hash6347f46d77a47b90789a1209b8f573b2529a6084f858a27d977bf23ee8a79113 | — | |
hash566ddd4eb4ca8d4dd67b72ee7f944055 | — | |
hashdf4db969a69efc1db59f4d3c596ed590ee059777 | — | |
hash7a946339439eb678316a124b8d700b21de919c81ee5bef33e8cb848b7183927b | — |
Threat ID: 68a8a9b3ad5a09ad0020bc3d
Added to database: 8/22/2025, 5:32:35 PM
Last enriched: 8/22/2025, 5:48:20 PM
Last updated: 8/23/2025, 1:29:25 AM
Views: 4
Related Threats
ThreatFox IOCs for 2025-08-22
MediumCOOKIE SPIDER's Malvertising Attack Drops New SHAMOS macOS Malware
MediumProxyware Malware Being Distributed on YouTube Video Download Site
MediumAnalysis of malicious HWP cases of 'APT37' group distributed through K messenger
MediumThreatFox IOCs for 2025-08-21
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.