Rewterz Threat Alert – APT Sidewinder – IOCs
November 24, 2020Rewterz Threat Advisory – ICS: Rockwell Automation FactoryTalk Linx
November 25, 2020Rewterz Threat Alert – APT Sidewinder – IOCs
November 24, 2020Rewterz Threat Advisory – ICS: Rockwell Automation FactoryTalk Linx
November 25, 2020Severity
High
Analysis Summary
TA416, which is also known as “Mustang Panda” and “RedDelta,” was spotted in recent campaigns targeting entities associated with diplomatic relations between the Vatican and the Chinese Communist Party, as well as entities in Myanmar. The group was also spotted recently targeting organizations conducting diplomacy in Africa. These more recent spear-phishing attempts included a (continued) utilization of social-engineering lures that allude to the provisional agreement recently renewed between the Vatican Holy See and the Chinese Communist Party (CCP).
Attack Chain
The initial delivery of the malware was done by using Google Drive and Dropbox URLs within phishing emails that deliver archives containing PlugX malware and related components. One file was found to be a self-extracting RAR archive. Once the RAR archive is extracted four files are installed on the host and the portable executable (PE) Adobelm.exe is executed. Adobelm.exe is a legitimate Adobe executable that is used for the dynamic link library (DLL) side-loading of hex.dll. It calls an export function of hex.dll, called CEFProcessForkHandlerEx.
The file reads, loads, decrypts and executes the PlugX malware payload. The PlugX malware then ultimately calls out to the command and control (C2) server IP, 45.248.87[.]162.
Impact
Gain access
Indicators of Compromise
IP
- 45[.]248[.]87[.]162
MD5
- c43de22826a424b2d24cf1b4b694ce07
- 43529e54971a2302ae736c40f39d65df
SHA-256
- afa06df5a2c33dc0bdf80bbe09dade421b3e8b5990a56246e0d7053d5668d917
- 235752f22f1a21e18e0833fc26e1cdb4834a56ee53ec7acb8a402129329c0cdd
- 6a5b0cfdaf402e94f892f66a0f53e347d427be4105ab22c1a9f259238c272b60
- e3e3c28f7a96906e6c30f56e8e6b013e42b5113967d6fb054c32885501dfd1b7
- 930b7a798e3279b7460e30ce2f3a2deccbc252f3ca213cb022f5b7e6a25a0867
SHA1
- 6d8e50c567f80372a6f82f1ae2fc2c1177c56d45
- b8c40fcec38711a1c0cd663b87c175f7509201ff
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.