Operation DRAGONCLONE: Chinese Telecom Targeted by Malware
A sophisticated campaign targeting China Mobile Tietong Co., Ltd., a subsidiary of China Mobile, has been uncovered. The attack employs VELETRIX, a new loader, and VShell, a known adversary simulation tool. The infection chain begins with a malicious ZIP file containing executable and DLL files. VELETRIX uses anti-analysis techniques, IPFuscation, and a callback mechanism to execute VShell. The campaign shows overlaps with UNC5174 (Uteus) and Earth Lamia, known China-nexus threat actors. The infrastructure utilizes tools like SuperShell, Cobalt Strike, and Asset Lighthouse System. Active since March 2025, this operation demonstrates advanced tactics, techniques, and procedures associated with Chinese state-sponsored threat groups.
AI Analysis
Technical Summary
Operation DRAGONCLONE is a sophisticated cyber espionage campaign targeting China Mobile Tietong Co., Ltd., a subsidiary of China Mobile. The campaign employs a novel loader named VELETRIX alongside VShell, a known adversary simulation tool, to establish and maintain persistence within the victim environment. The infection vector begins with a malicious ZIP archive containing executable and DLL files, leveraging DLL sideloading techniques to evade detection and execute payloads. VELETRIX incorporates advanced anti-analysis methods and IPFuscation to obscure network communications, complicating detection and attribution efforts. The loader uses a callback mechanism to execute VShell, facilitating further post-exploitation activities. The campaign infrastructure includes tools such as SuperShell, Cobalt Strike, and the Asset Lighthouse System, indicating a high level of operational sophistication and resource availability. Attribution links this operation to China-nexus threat actors, specifically UNC5174 (Uteus) and Earth Lamia, groups known for targeting telecommunications and critical infrastructure sectors. The campaign has been active since March 2025, demonstrating ongoing efforts to compromise strategic telecom assets. The attack chain aligns with multiple MITRE ATT&CK techniques including user execution (T1204.002), DLL sideloading (T1574.001), credential dumping (T1003), and network reconnaissance (T1046), among others. Despite the presence of CVE-2024-1709 and CVE-2025-31324 references, no known exploits in the wild have been reported, suggesting the campaign relies on custom tooling and targeted delivery rather than widespread exploitation. Overall, Operation DRAGONCLONE exemplifies a targeted, state-sponsored espionage effort leveraging advanced malware and evasion techniques to infiltrate and persist within a major Chinese telecom entity.
Potential Impact
For European organizations, the direct impact of Operation DRAGONCLONE may appear limited given the primary target is a Chinese telecom subsidiary. However, the campaign's use of advanced loaders, evasion techniques, and post-exploitation frameworks such as Cobalt Strike and VShell highlights tactics that could be repurposed against European telecom providers or critical infrastructure. European telecom operators, especially those with partnerships or data exchanges involving Chinese entities, could face supply chain risks or collateral exposure. Additionally, the campaign's sophisticated use of DLL sideloading and IPFuscation techniques underscores the evolving threat landscape that European organizations must contend with, particularly in sectors reliant on complex software ecosystems. The espionage nature of the campaign suggests potential risks to confidentiality of sensitive communications and intellectual property if similar tactics are employed against European targets. Furthermore, the presence of state-sponsored tools and infrastructure indicates a high level of persistence and stealth, complicating detection and remediation efforts. European organizations in the telecom sector, critical infrastructure, and government agencies should be aware of these advanced tactics as they may signal emerging threats or methodologies that could be adapted for regional targeting.
Mitigation Recommendations
European organizations should implement advanced detection and prevention controls tailored to the tactics observed in Operation DRAGONCLONE. Specifically, monitoring for anomalous ZIP file deliveries containing executables and DLLs is critical, with sandboxing and static/dynamic analysis to identify malicious payloads. Deploy application whitelisting and strict DLL loading policies to mitigate DLL sideloading risks. Network monitoring should focus on detecting IPFuscation and unusual callback patterns indicative of loader activity. Endpoint detection and response (EDR) solutions must be tuned to identify behaviors associated with VELETRIX and VShell, including process injection, credential dumping, and use of Cobalt Strike beacons. Regular threat hunting exercises should incorporate indicators of compromise related to China-nexus groups UNC5174 and Earth Lamia. Given the use of adversary simulation tools, organizations should validate their detection capabilities against these frameworks. Supply chain security assessments are recommended for telecom providers with Chinese partnerships to identify potential indirect exposure. Finally, incident response plans should be updated to address advanced persistent threat (APT) scenarios involving stealthy loaders and multi-stage infection chains.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
Indicators of Compromise
- hash: 0668293c9f523f26babc09617063493b
- hash: 241f0748c8eec5bd7c6bf52a9a6ac1dd
- hash: 3199796dc2ad51da41da51de58d31012
- hash: 81f76f83d4c571fe95772f21aff4d0b9
- hash: 37a37bc7255089fdd000feb10780c2513c4416c8
- hash: ba8e2015fd0abe944d6b546088451ff05dd24849
- hash: ea97ee5f81f157e2ecf729b6c43f0997c3af20d3
- hash: f8cf927cb2baf893b136bc5d90535d193fc73b75
- hash: 2206cc6bd9d15cf898f175ab845b3deb4b8627102b74e1accefe7a3ff0017112
- hash: 40450b4212481492d2213d109a0cd0f42de8e813de42d53360da7efac7249df4
- hash: 645f9f81eb83e52bbbd0726e5bf418f8235dd81ba01b6a945f8d6a31bf406992
- hash: a0f4ee6ea58a8896d2914176d2bfbdb9e16b700f52d2df1f77fe6ce663c1426a
- hash: ac6e0ee1328cfb1b6ca0541e4dfe7ba6398ea79a300c4019253bd908ab6a3dc0
- hash: ba4f9b324809876f906f3cb9b90f8af2f97487167beead549a8cddfd9a7c2fdc
- hash: bb6ab67ddbb74e7afb82bb063744a91f3fecf5fd0f453a179c0776727f6870c7
- ip: 47.115.51.44
- ip: 47.123.7.206
Operation DRAGONCLONE: Chinese Telecom Targeted by Malware
Description
A sophisticated campaign targeting China Mobile Tietong Co., Ltd., a subsidiary of China Mobile, has been uncovered. The attack employs VELETRIX, a new loader, and VShell, a known adversary simulation tool. The infection chain begins with a malicious ZIP file containing executable and DLL files. VELETRIX uses anti-analysis techniques, IPFuscation, and a callback mechanism to execute VShell. The campaign shows overlaps with UNC5174 (Uteus) and Earth Lamia, known China-nexus threat actors. The infrastructure utilizes tools like SuperShell, Cobalt Strike, and Asset Lighthouse System. Active since March 2025, this operation demonstrates advanced tactics, techniques, and procedures associated with Chinese state-sponsored threat groups.
AI-Powered Analysis
Technical Analysis
Operation DRAGONCLONE is a sophisticated cyber espionage campaign targeting China Mobile Tietong Co., Ltd., a subsidiary of China Mobile. The campaign employs a novel loader named VELETRIX alongside VShell, a known adversary simulation tool, to establish and maintain persistence within the victim environment. The infection vector begins with a malicious ZIP archive containing executable and DLL files, leveraging DLL sideloading techniques to evade detection and execute payloads. VELETRIX incorporates advanced anti-analysis methods and IPFuscation to obscure network communications, complicating detection and attribution efforts. The loader uses a callback mechanism to execute VShell, facilitating further post-exploitation activities. The campaign infrastructure includes tools such as SuperShell, Cobalt Strike, and the Asset Lighthouse System, indicating a high level of operational sophistication and resource availability. Attribution links this operation to China-nexus threat actors, specifically UNC5174 (Uteus) and Earth Lamia, groups known for targeting telecommunications and critical infrastructure sectors. The campaign has been active since March 2025, demonstrating ongoing efforts to compromise strategic telecom assets. The attack chain aligns with multiple MITRE ATT&CK techniques including user execution (T1204.002), DLL sideloading (T1574.001), credential dumping (T1003), and network reconnaissance (T1046), among others. Despite the presence of CVE-2024-1709 and CVE-2025-31324 references, no known exploits in the wild have been reported, suggesting the campaign relies on custom tooling and targeted delivery rather than widespread exploitation. Overall, Operation DRAGONCLONE exemplifies a targeted, state-sponsored espionage effort leveraging advanced malware and evasion techniques to infiltrate and persist within a major Chinese telecom entity.
Potential Impact
For European organizations, the direct impact of Operation DRAGONCLONE may appear limited given the primary target is a Chinese telecom subsidiary. However, the campaign's use of advanced loaders, evasion techniques, and post-exploitation frameworks such as Cobalt Strike and VShell highlights tactics that could be repurposed against European telecom providers or critical infrastructure. European telecom operators, especially those with partnerships or data exchanges involving Chinese entities, could face supply chain risks or collateral exposure. Additionally, the campaign's sophisticated use of DLL sideloading and IPFuscation techniques underscores the evolving threat landscape that European organizations must contend with, particularly in sectors reliant on complex software ecosystems. The espionage nature of the campaign suggests potential risks to confidentiality of sensitive communications and intellectual property if similar tactics are employed against European targets. Furthermore, the presence of state-sponsored tools and infrastructure indicates a high level of persistence and stealth, complicating detection and remediation efforts. European organizations in the telecom sector, critical infrastructure, and government agencies should be aware of these advanced tactics as they may signal emerging threats or methodologies that could be adapted for regional targeting.
Mitigation Recommendations
European organizations should implement advanced detection and prevention controls tailored to the tactics observed in Operation DRAGONCLONE. Specifically, monitoring for anomalous ZIP file deliveries containing executables and DLLs is critical, with sandboxing and static/dynamic analysis to identify malicious payloads. Deploy application whitelisting and strict DLL loading policies to mitigate DLL sideloading risks. Network monitoring should focus on detecting IPFuscation and unusual callback patterns indicative of loader activity. Endpoint detection and response (EDR) solutions must be tuned to identify behaviors associated with VELETRIX and VShell, including process injection, credential dumping, and use of Cobalt Strike beacons. Regular threat hunting exercises should incorporate indicators of compromise related to China-nexus groups UNC5174 and Earth Lamia. Given the use of adversary simulation tools, organizations should validate their detection capabilities against these frameworks. Supply chain security assessments are recommended for telecom providers with Chinese partnerships to identify potential indirect exposure. Finally, incident response plans should be updated to address advanced persistent threat (APT) scenarios involving stealthy loaders and multi-stage infection chains.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/operation-dragonclone-chinese-telecom-veletrix-vshell-malware/"]
- Adversary
- China-Nexus
- Pulse Id
- 6842f45696f96557e5f757b1
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash0668293c9f523f26babc09617063493b | — | |
hash241f0748c8eec5bd7c6bf52a9a6ac1dd | — | |
hash3199796dc2ad51da41da51de58d31012 | — | |
hash81f76f83d4c571fe95772f21aff4d0b9 | — | |
hash37a37bc7255089fdd000feb10780c2513c4416c8 | — | |
hashba8e2015fd0abe944d6b546088451ff05dd24849 | — | |
hashea97ee5f81f157e2ecf729b6c43f0997c3af20d3 | — | |
hashf8cf927cb2baf893b136bc5d90535d193fc73b75 | — | |
hash2206cc6bd9d15cf898f175ab845b3deb4b8627102b74e1accefe7a3ff0017112 | — | |
hash40450b4212481492d2213d109a0cd0f42de8e813de42d53360da7efac7249df4 | — | |
hash645f9f81eb83e52bbbd0726e5bf418f8235dd81ba01b6a945f8d6a31bf406992 | — | |
hasha0f4ee6ea58a8896d2914176d2bfbdb9e16b700f52d2df1f77fe6ce663c1426a | — | |
hashac6e0ee1328cfb1b6ca0541e4dfe7ba6398ea79a300c4019253bd908ab6a3dc0 | — | |
hashba4f9b324809876f906f3cb9b90f8af2f97487167beead549a8cddfd9a7c2fdc | — | |
hashbb6ab67ddbb74e7afb82bb063744a91f3fecf5fd0f453a179c0776727f6870c7 | — |
Ip
Value | Description | Copy |
---|---|---|
ip47.115.51.44 | — | |
ip47.123.7.206 | — |
Threat ID: 68433b1b71f4d251b5d94948
Added to database: 6/6/2025, 7:01:47 PM
Last enriched: 7/8/2025, 12:01:57 PM
Last updated: 8/15/2025, 10:48:55 AM
Views: 49
Related Threats
Threat Actor Profile: Interlock Ransomware
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumThe Hidden Infrastructure Behind VexTrio's TDS
MediumERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis
MediumThreat Bulletin: Fire in the Woods – A New Variant of FireWood
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.