APT36, just like many other threat actors, is capitalizing on fear, compromising victims with scams or malware campaigns. APT36 is using a decoy health advisory document to spread a Remote Administration Tool (RAT). The group is also called Transparent Tribe, ProjectM, Mythic Leopard, and TEMP.Lapis. APT36 mainly relies on both spear phishing and watering hole attacks to gain its foothold on victims. The phishing email is either a malicious macro document or an rtf file exploiting vulnerabilities, such as CVE-2017-0199. In the coronavirus-themed attack, APT36 used a spear phishing email with a link to a malicious document masquerading as the government of India.
The malicious document has two hidden macros that drop a RAT variant called Crimson RAT. The malicious macro first creates two directories with the names “Edlacar” and “Uahaiws” and then checks the OS type.
Crimson RAT’s capabilities include: