It seems that #Indian APTs have been raging war on #Pakistan with the same payloads over and over again. Meanwhile, Pakistani #Government and #Military is either helpless or over occupied. Following is another new sample that goes ages back.
A variant of this sample has attributed to #Sidewinder#APT by Govt. of Pak. The #malware is deployed using the shared image in a #phishing email using a similar methodology to that of
Data Sent to C2
Name: @@PROCESSOR@@>Caption: Microsoft Windows 7 Professional >V:|||@@USER@@-@@HOSTNAME@@-@@guid??@@||||||@@[Two Char]|||[One digit]|||<<programfiles-folder>>?<<programfiles-folder>>?<<programfiles-folder>>?<<programfiles-folder>>?<<programfiles-folder>>?ÍÍÍÍÍÍÍÍÍ
#Encryption
AES-256 Implementation for comm with C2
Mode: CBC
Key: 56 de 87 34 db ec 2d 78 66 23 98 3b ce 77 73 8e
IV: 0a 0b 0c 0d 0e 0f 09 08 07 06 05 04 03 02 01 ab
#Sidewinder#APT skillset seems a bit better than that of other #Indian counterparts in that it uses COM objects to perform operations and undocumented Windows APIs and has much better phishing subjects.