Researchers have published their analysis of recent activity being carried out by TA413. The first campaign they report on targeted European diplomatic and legislative bodies, non-profit policy research organizations, and global organizations dealing with economic affairs, which is not the usual target of this group. However, infrastructure and TTP overlaps allow for attribution to the APT. These targets received COVID-19 themed phishing emails with weaponsized RTF documents. An RTF exploit is used to drop a WMF file, which, in turn, drops and installs the Sepulcher malware. The WMF file is also responsible for setting up persistence via a scheduled task. The second campaign was aimed towards the group’s more common target, the Tibetan community. Once again, infrastructure and TTPs from older TA413 campaigns were leveraged in this campaign. The initial attachment, however, was a malicious PPTX attachment that downloads the Sepulcher malware from a remote server and executes it. Upon execution, the Sepulcher malware reaches out to its C2 server, which is defined in a configuration saved to the Registry. After initial communication is established, Sepulcher provides basic RAT functionality to the operator. This includes capabilities such as file operations, reconnaissance, spawning a shell, and interacting with services and processes.