Email Account Threats

The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates

Share with your network!

8/24 Editor’s Note: Since the publication, SMTP2Go has updated its security measures.

Key Takeaways

  • Proofpoint researchers have identified ongoing activity by the China-aligned APT actor TA416 in which the group is targeting European diplomatic entities, including an individual involved in refugee and migrant services.
  • This targeting is consistent with other activity reported by Proofpoint, showing an interest in refugee policies and logistics across the APT actor landscape which coincides with increased tensions and now armed conflict between Russia and Ukraine.
  • The campaigns utilize web bugs to profile the victims before sending a variety of PlugX malware payloads via malicious URLs.
  • TA416 has recently updated its PlugX variant, changing its encoding method and expanding its configuration capabilities.

Overview

Since 2020, Proofpoint researchers have observed TA416, an actor assessed to be aligned with the Chinese state, utilizing web bugs to profile their targets. Commonly referred to as tracking pixels, web bugs embed a hyperlinked non-visible object within the body of an email that, when enabled, will attempt to retrieve a benign image file from an actor-controlled server. This provides a “sign of life” to threat actors and indicates that the targeted account is valid with the user being inclined to open emails that utilize social engineering content. TA416 has been using web bugs to target victims prior to delivering malicious URLs that have installed a variety of PlugX malware payloads. The operational tempo of these campaigns, specifically those against European governments, have increased sharply since Russian troops began amassing on the border of Ukraine.

The use of the web bug reconnaissance technique suggests TA416 is being more discerning about which targets the group chooses to deliver malware payloads. Historically, the group primarily delivered web bug URLs alongside malware URLs to confirm receipt. In 2022, the group started to first profile users and then deliver malware URLs. This may be an attempt by TA416 to avoid having their malicious tools discovered and publicly disclosed. By narrowing the lens of targeting from broad phishing campaigns to focus on targets that have proven to be active and willing to open emails, TA416 increases its chance of success when following up with malicious malware payloads.

What’s In a Web Bug – Delivery in 2020 and 2021

Starting in early November 2021, Proofpoint researchers identified web bug reconnaissance campaigns targeting European diplomatic entities. Notably this activity aligned with the escalation of tensions between Russia, Ukraine, and, by extension, NATO member states in Europe. The emails first originated from a spoofed sender that impersonated a Meetings Services Assistant at the United Nations General Assembly Secretariat. Proofpoint did not observe these campaigns targeting the United Nations (UN), but did observe the targeting of diplomatic entities in Europe under the pretense of communicating with the UN. The threat actor achieved this impersonation by utilizing the legitimate email marketing service SMTP2Go, which allows users to alter the envelope sender field while using a unique sender address generated by the service.

TA416 has used SMTP2Go to impersonate various European diplomatic organizations since at least 2020. The threat actor in an August 2020 campaign impersonated the same Meetings Services Assistant at the UN General Assembly and again targeted governmental entities in Europe. In this historical campaign, TA416 delivered a DropBox URL that delivered a PlugX variant aligning with Recorded Future’s analysis of "Red Delta" PlugX malware. Proofpoint assesses that there is sizeable overlap between the entities TA416 and the publicly disclosed group “Red Delta.” Both campaigns from August 2020 and November 2021 targeted European diplomatic entities and utilized SMTP2Go to impersonate an external diplomatic organization that may communicate with the end targets. Included below is a publicly available malicious Zip file hash from August 2020 delivered via a DropBox URL which is attributable to TA416/Red Delta.

  • Advance version of the 2020 Report of the Secretary-General on Peacebuilding and Sustaining Peace .zip | 0e3e47697539f1773fb53114ab53229c0304d86ed35aec05e5f5bfdf3bd35f9a

TA416

Figure 1. TA416 August 2020 “Advance version of the 2020 Report of the Secretary-General on Peacebuilding and Sustaining Peace” PDF decoy 54b491541376bda85ffb02b9bb40b9b5adba644f08b630fc1b47392625e1e60a.

From Web Bugs to PlugX

Proofpoint researchers continued to identify web reconnaissance campaigns in November and December 2021 that utilized a rudimentary style of encoding and resource names. Fundamentally, a web bug URL includes infrastructure that hosts a benign image file, several designations about the email campaign, which can include date and campaign name, and a unique designation for each individual user targeted in the email campaign. This allows a threat actor to validate which recipients received and opened the phishing email. TA416 web bugs appear rudimentary while demonstrating slight evolution over time. The web bug URL structure began with an actor-controlled IP which retrieved jpg resources named after the email aliases of the targeted victims from the actor-controlled servers. Proofpoint researchers next observed base64 encoded values of the entire email address.

Example:

  • hxxp://45.154.14[.]235/jdoe.jpg  
  • hxxp://45.154.14[.]235/amRvZUBwcm9vZnBvaW50LmNvbQ==/328.jpg

Researchers identified the same method of base64 encoded target emails, including in the web bug URL, consistently from August to November 2020 in TA416 campaigns that preceded the delivery of PlugX malware. On more than one occasion in 2020, this web bug technique appeared in an email alongside a Dropbox URL that ultimately delivered the Trident Loader variant of PlugX malware. ProofpointAvira, and Recorded Future have publicly attributed this installation technique to TA416/Red Delta. In the above referenced campaign from August 2020 in which TA416 impersonated UN personnel, the threat actor utilized base64 encoded web bug resources representing targeted emails alongside the cloud hosted URLs that delivered PlugX malware. Actor-controlled IPs observed during web bug reconnaissance campaigns during the November to December 2021 period included the IP 45.154.14[.]235.

Beginning on January 17, 2022, Proofpoint researchers observed TA416 threat actors utilizing the IP address 45.154.14[.]235 in phishing emails attempting to deliver a malicious Zip file to European Diplomatic entities. These entities had previously received web bug URLs in phishing emails during the prior months. Rather than the emails delivering further reconnaissance URLs, this IP now attempted to deliver malicious Zip files. The phishing email also included a Dropbox URL attempting to deliver the same malicious archive file. Like historical TA416 campaigns, the Zip file had a geopolitically themed title, which was shared with a PDF decoy that would be later downloaded as part of the infection chain. For example, the campaign on January 17, 2022 included the following Zip and PDF file titles:

  • State_aid__Commission_approves_2022-2027_regional_aid_map_for_Greece.zip 
  • State_aid__Commission_approves_2022-2027_regional_aid_map_for_Greece.pdf

APT416

Figure 2. TA416 January 2021 PDF decoy - EU adopts conclusions on EU priorities in UN human rights fora in 2022.zip.

While historically TA416 has delivered Zip files from cloud hosting providers containing a decoy file, legitimate PE file, a DLL loader, and a PlugX malware configuration DAT file, recent campaigns used a different tactic. Proofpoint researchers noted that the malicious Zip files delivered from DropBox now contain a rudimentary executable which is a dropper malware. This malware establishes persistence for a legitimate executable file used in DLL search order hijacking, as well as initiates the download of four components. These components are included below and resemble the components used in the past to install PlugX malware. Public research has previously documented TA416’s propensity for including PlugX Trident Loader components and decoy in the initial delivered Zip file. Actors in recent months use a more convoluted delivery chain, in which a PE dropper is used to retrieve the Trident Loader components from an actor-controlled resource. The method of installing PlugX via DLL Search Order hijacking that displays a PDF decoy remains constant.

Requests Resulting from the Execution of Malware Dropper Executable

  • PDF Decoy File

hxxps://45.154.14[.]235/State_aid__Commission_approves_2022- 2027_regional_aid_map_for_Greece.pdf

  • Legitimate PotPlayer PE file used in DLL Search Order Hijacking 

hxxps://45.154.14[.]235/PotPlayer.exe

  • Malicious PlugX Malware Loader

hxxps://45.154.14[.]235/PotPlayer.dll

  • PlugX Malware Configuration Executed by DLL Search Order Hijacking

hxxps://45.154.14[.]235/PotPlayerDB.dat

Most recently on February 28, 2022, TA416 began using a compromised email address of a diplomat from a European NATO country to target a different country’s diplomatic offices. The targeted individual worked in refugee and migrant services. The below URL was sent in a phishing email and delivered a compressed archive containing a PE dropper. This dropper similarly called out to an actor-controlled URL to deliver a decoy document and the components of an updated Trident Loader PlugX malware payload.

  • hxxp://www.zyber-i[.]com/europa/2022.zip
  • Situation at the EU borders with Ukraine.zip|8a7fbafe9f3395272548e5aadeb1af07baeb65d7859e7a1560f580455d7b1fac 
  • Situation at the EU borders with Ukraine.exe|effd63168fc7957baf609f7492cd82579459963f80fc6fc4d261fbc68877f5a1(Stage 1 Dropper)
  • hxxp://103.107.104.19/2022/eu.docx (Decoy Document)
  • hxxp://103.107.104.19/FontEDL.exe (PE Legit)
  • hxxp://103.107.104.19/DocConvDll.dll (DLL Loader)
  • hxxp://103.107.104.19/FontLog.dat (PlugX Encrypted Payload)

Communicates with C2

  • hxxps://92.118.188[.]78/

TA416

Figure 3. TA416 February 28, 2022 Word document decoy – eu.docx.

A More Discerning Breed of TA416 PlugX Malware

Close analysis of the delivered payloads and legitimate resources retrieved from URLs by the first stage malware dropper reveals that TA416 is once again using an updated version of PlugX malware to target their victims. Historically, the group has relied on a variety of legitimate antivirus files, including the Avast file resource wsc_proxy.exe, to begin the process of DLL search order hijacking that results in PlugX malware installation. In the January 2022 campaigns, TA416 used the PE file potplayermini.exe to initiate DLL search order hijacking. This is a legitimate executable file that is part of the publicly available media player Daum PotPlayer 1.5.29825, which Mandiant has previously documented as being susceptible to search order hijacking since at least 2016. Numerous Chinese APT groups, which are not directly correlated to TA416, have utilized it since that time. This campaign leveraged the vulnerability of potplayermini.exe to load the file PotPlayer.dll which contains an obfuscated launcher that in turn executes the file PotPlayerDB.dat. The file DocConvDll.dll has also intermittently been used as a loader of the PlugX DAT configuration files. For those that are familiar with TA416’s historic tactics, techniques, and procedures (TTPs), this is highly similar to the Trident Loader method which the group used to install PlugX in previous campaigns.

While PotPlayerDB.dat is a variant of PlugX malware, TA416 has updated the payload by changing both its encoding method and expanding the payload’s configuration capabilities. Historically, TA416 relied on the DLL launcher to decode the PlugX payload utilizing an XOR key included at the offset 0 within the PlugX DAT configuration file. In this case, TA416 has abandoned that approach in favor of something with less dependencies that is more convoluted. The latest version contains obfuscation to thwart analysis. One of the main ways it does this is by resolving API functions during runtime. Generally, malware loads a DLL, iterates over the set of exports of the DLL and hashes the string, looking for a matching hash. This iteration of PlugX does standard API hashing, but only to resolve the address of the functions GetProcAddress as well as LoadLibrary. Once those functions are resolved properly, it loads the rest of the functions via their text name.

TA416

Figure 4. PlugX malware API hashing method.

In addition to this obfuscation attempt, most of the functions that contain the "business logic" of the malware are obfuscated with a state machine. At a high level this obscures the order of which blocks are executed within a function. It does this by maintaining a state variable with many comparisons in the function. After each block, the state variable is modified to whatever the subsequent block should be, making analysis more difficult. This sample further implements anti-analysis techniques via the malware’s design. After every iteration of the state machine, the malware sample will modify the state with a XOR operation. This makes it difficult to analyze as the states are not hardcoded as the result of a function. This control obfuscation is apparent below with the highly cyclical nature of the control flow graph.

APT416

Figure 5. PlugX malware control flow graph.

Once researchers defeated the PlugX anti-analysis techniques, they were able to examine the malware’s configuration. Notably the configuration contained three additional fields that were not present in the previous versions nor in standard PlugX malware. The new version included:

  • Two hardcoded dates for latest write time used to filter over files within a specified directory.
  • A minimum and maximum file size to filter over files within a specified directory.
  • A format string that defaults to “public/Publics” that modifies characteristics of the folder and hide it from the infected user.

In the past, when fields have been added to PlugX malware configurations they have persisted in future samples identified in subsequent campaigns. Recently, this has not always proven to be true. In recent campaigns, a consistent and clear configuration that is repeated has not been present. The expansion of the malware’s configuration fields demonstrates that this tool is undergoing additional development by TA416. Further, the type of added features that enable better filtering of victim files for exfiltration and better concealment from the infected user demonstrates that the actor is going beyond anti-analysis to create a more functional and precise tool to use during intrusions. It also indicates the varying versions of the PlugX payload that are being used in a short period of time.

Command and Control

The January 2022 version of PlugX malware utilizes RC4 encryption along with a hardcoded key that is built dynamically. For communications, the data is compressed then encrypted before sending to the command and control (C2) server and the same process in reverse is implemented for data received from the C2 server. Below shows the RC4 key "sV!e@T#L$PH%" as it is being passed along with the encrypted data. The data is compressed and decompressed via LZNT1 and RtlDecompressBuffer. During the January 2022 campaigns, the delivered PlugX malware samples communicated with the C2 server 92.118.188[.]78 over port 187. In the February 2022 campaign, Proofpoint researchers observed a variation in which PlugX malware used an RC4 key that was sent to the bot in the first HTTP response which was then used to encrypt data going to the C2 server.

APT416

Figure 6. PlugX malware RC4 encryption key with encrypted data.

A Rapid Pace of Malware Development

In response to historical disclosures detailing TA416 PlugX malware infection and encoding methods, the group appears to have adopted a rapid rate of development for their PlugX payloads. While the distinctly TA416 installation method of a PE dropper retrieving Trident loaded payload components using a legitimate PE and a DLL loader file to load a PlugX payload remains constant, the components in this infection chain are regularly changing. The group uses different legitimate PE files to initiate sideloading, as well as a variety of PlugX DLL loaders including the PotPlayer and DocCon versions noted in this publication. TA416 also uses different variants of the final PlugX payload in which the communication routines are observed to be different when closely analyzed. Additionally, the payload DAT file decryption method has evolved regularly since the beginning of 2022. Several observed decryption schemas and a sample configuration are included below with date ranges detailing the evolution of observed PlugX payloads.

APT416

Figure 7. 2020 - 2022 PlugX DAT file decryption.

APT416

Figure 8. January 2022 – February 2022 PlugX DAT file decryption.

APT416

Figure 9. Mid-February 2022 PlugX DAT file decryption.

APT416

Figure 10. PlugX malware configuration sample.

Attribution

Proofpoint researchers assess with high confidence that the operator identified in recent campaigns delivering PlugX malware is the same as previously identified in 2020 as part of Recorded Future's Red Delta campaign. This assessment is based on the use of the same email marketing service to deliver emails, the consistent impersonation of European diplomatic entities, the repetition of web bug patterns in the 2020, 2021, and 2022 campaigns, the consistent victimology observed between the campaigns, a nearly identical file naming structure observed between Zip and PDF decoy files, and the highly similar Trident Loader TTPs used for the execution of PlugX malware.

Tactic

2020

TA416 Campaigns

2021 – 2022

TA416 Campaigns

Spoofing Via SMPT2Go

Checkbox Checked outline

Checkbox Checked outline

Impersonation of UN Personnel

Checkbox Checked outline

Checkbox Checked outline

Rudimentary Base64 Web Bugs

Checkbox Checked outline

Checkbox Checked outline

Trident Loaded PlugX

Checkbox Checked outline

Checkbox Checked outline

Politically Themed PDF Decoys

Checkbox Checked outline

Checkbox Checked outline

Shared Zip and PDF Decoy File Names

Checkbox Checked outline

Checkbox Checked outline

Targeted European Diplomatic Entities

Checkbox Checked outline

Checkbox Checked outline

Figure 11. Mapping TA416 TTPs over time.

Conclusion

The multiyear campaign against diplomatic entities in Europe suggests a consistent area of responsibility belonging to TA416. This mandate may have increased against entities in Europe during the current period of geopolitical conflict and economic upheaval in Europe. While historically the phishing tactics and tools of this group have not been so thoroughly explored, the consistent reliance on updating PlugX malware installation using the Trident Loader method belies a lack of innovation on the part of TA416 following several major publications surrounding this actor. TA416 has chosen to compensate for this lack of innovation with a greater tempo of variation. The group has proved to be pragmatic, making incremental and staggered changes to their PlugX toolkit rapidly and regularly altering a toolset it has used for the past number of years. Despite these variations, the group’s persistent targeting of a habitual target set paired with ingrained phishing tactics often leads to periodic discovery by threat researchers. Once TA416 reads this latest publication regarding their tactics, researchers at Proofpoint fully anticipate they will remain the metaphorical “Tubthumping” of the APT landscape. Researchers can publish their tactics but will never keep them down.

Indicators of Compromise (IOCs)  

IOC

Type of IOC

Description

hxxps://45.154.14[.]235/State_aid__Commission_approves_2022-2027_regional_aid_map_for_Greece.zip 

URL 

Malicious Delivery URL

hxxps://www.dropbox[.]com/s/State_aid__Commission_approves_2022-2027_regional_aid_map_for_Greece.zip?dl=1 

URL 

Malicious Delivery URL

hxxps://www.dropbox[.]com/s/EU adopts conclusions on EU priorities in UN human rights fora in 2022.zip/?dl=1 

URL 

Malicious Delivery URL

hxxps://www.dropbox[.]com/s/EU%20adopts%20conclusions%20on%20EU%20priorities%20in%20UN%20human%20rights%20fora%20in%202022.zip/?dl=1 

URL 

Malicious Delivery URL

hxxps://uepspr[.]com/2023/EU%20adopts%20conclusions%20on%20EU%20priorities%20in%20UN%20human%20rights%20fora%20in%202022.zip 

URL 

Malicious Delivery URL

hxxps://uepspr[.]com/2023/EU adopts conclusions on EU priorities in UN human rights fora in 2022.zip 

URL 

Malicious Delivery URL

hxxps://www.dropbox[.]com/s/EU adopts conclusions on EU priorities in UN human rights fora in 2022.zip/?dl=1 

URL 

Malicious Delivery URL

hxxps://www.dropbox[.]com/s/EU%20adopts%20conclusions%20on%20EU%20priorities%20in%20UN%20human%20rights%20fora%20in%202022.zip/?dl=1 

URL 

Malicious Delivery URL

hxxps://uepspr[.]com/2023/EU%20adopts%20conclusions%20on%20EU%20priorities%20in%20UN%20human%20rights%20fora%20in%202022.zip 

URL 

Malicious Delivery URL

hxxps://uepspr[.]com/2023/EU adopts conclusions on EU priorities in UN human rights fora in 2022.zip  

URL 

Malicious Delivery URL

https://upespr[.]com/Council conclusions on the European security situation.zip 

URL 

Malicious Delivery URL

hxxps://45.154.14[.]235/mfa/Council%20conclusions%20on%20the%20European%20security%20situation.pdf 

URL 

Malicious Delivery URL

hxxp://www.zyber-i[.]com/europa/2022.zip 

URL 

Malicious Delivery URL

hxxps://69.90.184[.]125/lt/2023.rar 

URL 

Malicious Delivery URL

Council conclusions on the European security situation.exe

6fd9d745faa77a58ac84a5a1ef360c7fc1e23b32d49ca9c3554a1edc4d761885 

Executable File

Malicious PE Dropper

State_aid__Commission_approves_2022-2027_regional_aid_map_for_Greece.exe

5851043b2c040fb3dce45c23fb9f3e8aefff48e0438dec7141999062d46c592d

Executable File

Malicious PE Dropper

Situation at the EU borders with Ukraine.exe

effd63168fc7957baf609f7492cd82579459963f80fc6fc4d261fbc68877f5a1

Executable File

Malicious PE Dropper

REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL.exe

b2ff5535caa1d70c9d0d59cd68619b142858ae018064c891b4671154aa93abf3 

Executable File

Malicious PE Dropper

Advance version of the 2020 Report of the Secretary-General on Peacebuilding and Sustaining Peace.pdf

54b491541376bda85ffb02b9bb40b9b5adba644f08b630fc1b47392625e1e60a 

PDF File

Decoy Files 

Council conclusions on the European security situation.pdf

a4ff2c5913cce536759777acee3cfcc8824b927304c8a93ac64d37d1b01a576f

PDF File

Decoy Files 

Situation at the EU borders with Ukraine.docx

a07cece1fa9b3c813c0b6880b24a6494a9db83e138102da3bce30ebff51909c0

Doc File

Decoy Files 

REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL.pdf

0c2f5b6fe538d088fed11ab10925210cb2eb782f471e6f09c484677e82fc5f26 

PDF File

Decoy Files 

State_aid__Commission_approves_2022-2027_regional_aid_map_for_Greece.pdf

ec32ff0c049bd8812a35aeaaaae1f66eaf0ce8aefce535d142862ae89435c2e2 

PDF File

Decoy Files 

PotPlayer.exe

76da9d0046fe76fc28b80c4c1062b17852264348fd873b7dd781f39491f911e0

Executable File 

Legit PE File for DLL Search Order Hijacking 

FontEDL.exe

19870dd4d8c6453d5bb6f3b2beccbbbe28c6f280b6a7ebf5e0785ec386170000 

Executable File 

Legit PE File for DLL Search Order Hijacking 

PotPlayer.dll

e1dbe58393268d7ddabd4bed0cdedf0fbba85d4c3ef1300580ed4c74e147aa61 

DLL File 

Malicious Loader DLL

DocConvDll.dll

436d5bf9eba974a6e97f6f5159456c642e53213d7e4f8c75db5275b66fedd886 

DLL File 

Malicious Loader DLL

DocConvDll.dll

a01f353c92afcd45b5731815c79f1e1d01366cefa75b41550a28d999857c5b88 

 

DLL File 

Malicious Loader DLL

PotPlayer.dll

472822c6bdc710175987eb7d9171f780c974a83ea2b26f117b748babb9b796b8 

DLL File 

Malicious Loader DLL

PotPlayerDB.dat

fac8de00f031299f6c698b34534d6523428b544aad6a40fdc4b000a04ee82e7c 

DAT File

PlugX Malware Payload

FontLog.dat

82df9817d0a8dca7491b0688397299943d9279e848cdc4a5446d3159d8d71e6f 

DAT File

PlugX Malware Payload

FontLog.dat

b9e330373b382beaf4f0bcce83d65f13399d42dc3e9fcdc7b4ef26fa89360762 

DAT File

PlugX Malware Payload

PotPlayerDB.dat

03a836034360841fd6b99927c5b639d074e9fce4f16bd4f77ab57a9e5c12d976 

DAT File

PlugX Malware Payload

hxxps://45.154.14[.]235/2023/PotPlayer.exe 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/2023/PotPlayer.dll 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/2023/PotPlayerDB.dat  

URL

Malware Delivery URL

hxxp://103.107.104[.]19/2022/eu.docx 

URL

Malware Delivery URL

hxxp://103.107.104[.]19/FontEDL.exe  

URL

Malware Delivery URL

hxxp://103.107.104[.]19/DocConvDll.dll 

URL

Malware Delivery URL

hxxp://103.107.104[.]19/FontLog.dat 

URL

Malware Delivery URL

hxxps://69.90.184[.]125/lt/2022.pdf 

URL

Malware Delivery URL

hxxps://69.90.184[.]125/lt/FontEDL.exe 

URL

Malware Delivery URL

hxxps://69.90.184[.]125/lt/DocConvDll.dll 

URL

Malware Delivery URL

hxxps://69.90.184[.]125/lt/FontLog.dat 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/State_aid__Commission_approves_2022-2027_regional_aid_map_for_Greece.pdf 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/PotPlayer.exe 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/PotPlayer.dll 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/PotPlayerDB.dat 

URL

Malware Delivery URL

hxxp://upespr[.]com/PotPlayerDB.dat 

URL

Malware Delivery URL

hxxp://upespr[.]com/State_aid__Commission_approves_2022-2027_regional_aid_map_for_Greece.pdf 

URL

Malware Delivery URL

hxxp://upespr[.]com/PotPlayer.dll 

URL

Malware Delivery URL

hxxp://upespr[.]com/PotPlayer.exe 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/State_aid__Commission_approves_2022-2027_regional_aid_map_for_Greece.pdf 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/PotPlayer.exe 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/PotPlayer.dll 

URL

Malware Delivery URL

hxxps://45.154.14[.]235/PotPlayerDB.dat 

URL

Malware Delivery URL

103.107.104[.]19 

IP

Actor-Controlled IP 

69.90.184[.]125 

IP

Actor-Controlled IP 

45.154.14[.]235 

IP

Actor-Controlled IP 

upespr[.]com 

Domain

Actor-Controlled Domain 

www.zyber-i[.]com 

Domain

Actor-Controlled Domain 

hxxps://92.118.188[.]78 

URL

PlugX C2 IP 

Emerging Threats Signatures

2851112          ETPRO TROJAN ta416 Related PlugX Activity (POST)