Skip to main content

Operation DRAGONCLONE: Chinese Telecom Targeted by Malware

Medium
Published: Sat Jun 07 2025 (06/07/2025, 10:12:03 UTC)
Source: AlienVault OTX General

Description

A sophisticated campaign targeting China Mobile Tietong Co., Ltd., a subsidiary of China Mobile, has been uncovered. The attack employs VELETRIX, a new loader, and VShell, a known adversary simulation tool. The infection chain begins with a malicious ZIP file containing executable and DLL files. VELETRIX uses anti-analysis techniques, IPFuscation, and a callback mechanism to execute VShell. The campaign shows overlaps with UNC5174 (Uteus) and Earth Lamia, known China-nexus threat actors. The infrastructure utilizes tools like SuperShell, Cobalt Strike, and Asset Lighthouse System. Active since March 2025, this operation demonstrates advanced tactics, techniques, and procedures associated with Chinese state-sponsored threat groups.

AI-Powered Analysis

AILast updated: 07/08/2025, 12:01:57 UTC

Technical Analysis

Operation DRAGONCLONE is a sophisticated cyber espionage campaign targeting China Mobile Tietong Co., Ltd., a subsidiary of China Mobile. The campaign employs a novel loader named VELETRIX alongside VShell, a known adversary simulation tool, to establish and maintain persistence within the victim environment. The infection vector begins with a malicious ZIP archive containing executable and DLL files, leveraging DLL sideloading techniques to evade detection and execute payloads. VELETRIX incorporates advanced anti-analysis methods and IPFuscation to obscure network communications, complicating detection and attribution efforts. The loader uses a callback mechanism to execute VShell, facilitating further post-exploitation activities. The campaign infrastructure includes tools such as SuperShell, Cobalt Strike, and the Asset Lighthouse System, indicating a high level of operational sophistication and resource availability. Attribution links this operation to China-nexus threat actors, specifically UNC5174 (Uteus) and Earth Lamia, groups known for targeting telecommunications and critical infrastructure sectors. The campaign has been active since March 2025, demonstrating ongoing efforts to compromise strategic telecom assets. The attack chain aligns with multiple MITRE ATT&CK techniques including user execution (T1204.002), DLL sideloading (T1574.001), credential dumping (T1003), and network reconnaissance (T1046), among others. Despite the presence of CVE-2024-1709 and CVE-2025-31324 references, no known exploits in the wild have been reported, suggesting the campaign relies on custom tooling and targeted delivery rather than widespread exploitation. Overall, Operation DRAGONCLONE exemplifies a targeted, state-sponsored espionage effort leveraging advanced malware and evasion techniques to infiltrate and persist within a major Chinese telecom entity.

Potential Impact

For European organizations, the direct impact of Operation DRAGONCLONE may appear limited given the primary target is a Chinese telecom subsidiary. However, the campaign's use of advanced loaders, evasion techniques, and post-exploitation frameworks such as Cobalt Strike and VShell highlights tactics that could be repurposed against European telecom providers or critical infrastructure. European telecom operators, especially those with partnerships or data exchanges involving Chinese entities, could face supply chain risks or collateral exposure. Additionally, the campaign's sophisticated use of DLL sideloading and IPFuscation techniques underscores the evolving threat landscape that European organizations must contend with, particularly in sectors reliant on complex software ecosystems. The espionage nature of the campaign suggests potential risks to confidentiality of sensitive communications and intellectual property if similar tactics are employed against European targets. Furthermore, the presence of state-sponsored tools and infrastructure indicates a high level of persistence and stealth, complicating detection and remediation efforts. European organizations in the telecom sector, critical infrastructure, and government agencies should be aware of these advanced tactics as they may signal emerging threats or methodologies that could be adapted for regional targeting.

Mitigation Recommendations

European organizations should implement advanced detection and prevention controls tailored to the tactics observed in Operation DRAGONCLONE. Specifically, monitoring for anomalous ZIP file deliveries containing executables and DLLs is critical, with sandboxing and static/dynamic analysis to identify malicious payloads. Deploy application whitelisting and strict DLL loading policies to mitigate DLL sideloading risks. Network monitoring should focus on detecting IPFuscation and unusual callback patterns indicative of loader activity. Endpoint detection and response (EDR) solutions must be tuned to identify behaviors associated with VELETRIX and VShell, including process injection, credential dumping, and use of Cobalt Strike beacons. Regular threat hunting exercises should incorporate indicators of compromise related to China-nexus groups UNC5174 and Earth Lamia. Given the use of adversary simulation tools, organizations should validate their detection capabilities against these frameworks. Supply chain security assessments are recommended for telecom providers with Chinese partnerships to identify potential indirect exposure. Finally, incident response plans should be updated to address advanced persistent threat (APT) scenarios involving stealthy loaders and multi-stage infection chains.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/operation-dragonclone-chinese-telecom-veletrix-vshell-malware/"]
Adversary
China-Nexus
Pulse Id
6842f45696f96557e5f757b1
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0668293c9f523f26babc09617063493b
hash241f0748c8eec5bd7c6bf52a9a6ac1dd
hash3199796dc2ad51da41da51de58d31012
hash81f76f83d4c571fe95772f21aff4d0b9
hash37a37bc7255089fdd000feb10780c2513c4416c8
hashba8e2015fd0abe944d6b546088451ff05dd24849
hashea97ee5f81f157e2ecf729b6c43f0997c3af20d3
hashf8cf927cb2baf893b136bc5d90535d193fc73b75
hash2206cc6bd9d15cf898f175ab845b3deb4b8627102b74e1accefe7a3ff0017112
hash40450b4212481492d2213d109a0cd0f42de8e813de42d53360da7efac7249df4
hash645f9f81eb83e52bbbd0726e5bf418f8235dd81ba01b6a945f8d6a31bf406992
hasha0f4ee6ea58a8896d2914176d2bfbdb9e16b700f52d2df1f77fe6ce663c1426a
hashac6e0ee1328cfb1b6ca0541e4dfe7ba6398ea79a300c4019253bd908ab6a3dc0
hashba4f9b324809876f906f3cb9b90f8af2f97487167beead549a8cddfd9a7c2fdc
hashbb6ab67ddbb74e7afb82bb063744a91f3fecf5fd0f453a179c0776727f6870c7

Ip

ValueDescriptionCopy
ip47.115.51.44
ip47.123.7.206

Threat ID: 68433b1b71f4d251b5d94948

Added to database: 6/6/2025, 7:01:47 PM

Last enriched: 7/8/2025, 12:01:57 PM

Last updated: 8/15/2025, 10:48:55 AM

Views: 49

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats