Let’s examine a couple of interesting delivery techniques from an APT active for the past several years, the Spring Dragon APT. A paper released today by our colleagues at Palo Alto Networks presented a portion of data on this crew under the label “the Lotus Blossom Operation”, likely named for the debug string present in much of the “Elise” codebase since at least 2012: “d:lstudioprojectslotus…”.
The group’s capabilities are more than the much discussed cve-2012-0158 exploits over the past few years. Instead, the group is known to have employed half day spearphish exploits, strategic web compromises, and watering holes employing fake Flash player update re-directions. The group’s spearphish toolset includes pdf exploits, flash exploits, and the common cve-2012-0158 Word exploits including those generated from the “Tran Duy Linh” kit. While ongoing attacks by the Spring Dragon APT take us back to a focus on Vietnam, they appear to have rolled out a steady mix of exploits against defense subcontractors around the world and government related organizations in VN, TW, PH, and other locations over the past few years.
Organizations located in Myanmar and targeted by Spring Dragon have gone unmentioned. But Spring Dragon’s infiltration techniques there were not simply 0158 spearphish, they also compromised sites. In one case, they replaced specialized font installers needed to render Myanma font. You can see an image here of the “Planet Myanmar” website in late 2012 distributing such a package. All of the zip links were redirected to a poisoned installer zip file. The download name was Zawgyi_Keyboard_L.zip, and it dropped a setup.exe that contained several backdoor components, including an Elise “wincex.dll” (a42c966e26f3577534d03248551232f3, detected as Backdoor.Win32.Agent.delp). It beacons out with the typical Elise GET request “GET /%x/page_%02d%02d%02d%02d.html”, as documented in the Locust Blossom paper.
It’s interesting that another APT later abused this same site to deliver malicious VBS (cve-2014-6332) exploits in November of 2014 with a Lurid variant payload. And that same group also served a malicious pdf exploit (cve-2010-2883) from this site in June 2012 as “Zawgyi Unicode Keyboard.pdf”. They spearphished with that same exploit object hosted on the website under different file names in November 2011, like “台灣安保協會「亞太區域安全與台海和平」國際研討會邀 請 函_20110907.pdf”, “Taiwan Security Association International Seminar Invitation – the Asia-Pacific regional security and peace in the Taiwan Strait”, “china-central_asia.pdf”, “hydroelectric sector.pdf”, and various governmental related proposals.
Another interesting technique that we observed in use against government targets was a campaign that lured recipients to a site redirecting users to a spoofed Flash installer site.
This site in turn redirected users to a Flash installer bundled with the common Elise backdoor, eventually communicating with 188.8.131.52 and its usual “GET /14111121/page_321111234.html HTTP/1.0″.
hxxp://www.bkav2010.net/support/flashplayer/downloads.html → redirected to
While this particular actor effectively used their almost worn out cve-2012-0158 exploits in the past, Spring Dragon employs more involved and creative intrusive activity as well.