MimiKatz Modifications Cyberespionage

13324346083?profile=RESIZE_400xTinexta Cyber and SentinelLabs have tracked threat activities targeting business-to-business IT service providers in Southern Europe. Based on the malware, infrastructure, techniques used, victimology, and the timing of the activities, researchers have assessed that it is highly likely a China-nexus threat actor conducted these attacks with cyberespionage motivations.
The relationships between European countries and China are complex and characterized by cooperation, competition, and underlying trade, investment, and technology tensions. Suspected China-linked cyber espionage groups frequently target European public and private organizations to gather strategic intelligence, gain competitive advantages, and advance geopolitical, economic, and technological interests.

The attack campaign, Operation Digital Eye, took place from late June to mid-July 2024, lasting approximately three weeks. The targeted organizations provide solutions for managing clients' data, infrastructure, and cybersecurity across various industries, making them prime targets for cyberespionage actors. A sustained presence within these organizations would provide the Operation Digital Eye actors with a strategic foothold, creating opportunities for intrusions across the digital supply chain and enabling them to control critical IT processes within the downstream compromised entities. The attacks were detected and disrupted during their initial phases.

The exact group behind Operation Digital Eye remains unclear due to the extensive sharing of malware, operational playbooks, and infrastructure management processes within the Chinese threat landscape. The threat actors used a pass-the-hash capability, likely from the same source as closed-source custom Mimikatz modifications observed exclusively in suspected Chinese cyberespionage activities, such as Operation Soft Cell and Operation Tainted Love. The malware and tooling used in these campaigns have been linked to several distinct Chinese APT groups. Sentinel refer to these custom Mimikatz modifications as mimCN.
The long-term evolution and versioning of mimCN samples, along with notable features such as instructions left for a separate team of operators, suggest the involvement of a shared vendor or digital quartermaster responsible for the active maintenance and provisioning of tooling. This function within the Chinese APT ecosystem, corroborated by the I-Soon leak, likely plays a key role in facilitating China-nexus cyberespionage operations.
The abuse of Visual Studio Code Remote Tunnels for C2 purposes is central to this campaign. Originally designed to enable remote development, this technology provides full endpoint access, including command execution and filesystem manipulation. Additionally, Visual Studio Code tunneling involves executables signed by Microsoft and Microsoft Azure network infrastructure, which are often not closely monitored and are typically allowed by application controls and firewall rules. As a result, this technique may be challenging to detect and could evade security defenses. Combined with its full endpoint access, Visual Studio Code tunneling is an attractive and powerful capability for threat actors to exploit. Tinexta Cyber and SentinelLabs have notified Microsoft about the abuse of Visual Studio Code and Azure infrastructure in connection with Operation Digital Eye.

Infection Vector and Attack Progression - The attackers used SQL (Structured Query Language) injection as an initial access vector to infiltrate Internet-facing web and database servers. User-Agent request headers in the web traffic logs we retrieved indicate that the attackers used the sqlmap tool to automate detecting and exploiting SQL injection vulnerabilities. To establish an initial foothold and maintain persistent access, the threat actors deployed a PHP-based webshell. Relatively simple in design and implementation, the webshell uses the assert function to execute attacker-provided PHP code. Its implementation does not resemble any other webshells with which we are familiar. We track this webshell under the name PHPsert.

To disguise the files implementing PHPsert and attempt to evade detection based on filesystem activity, the attackers used custom names tailored to the infiltrated environments, making the filenames appear legitimate. This included using the local language and terms aligned with the targeted organizations' technological context. After establishing an initial foothold, the threat actors conducted a survey using various third-party tools and built-in Windows utilities, such as GetUserInfo and ping. They also deployed the local.exe tool, which is part of the Microsoft Windows NT Resource Kit and allows viewing user group memberships.
To steal credentials, the attackers used the CreateDump tool to extract memory allocated to the Local Security Authority Subsystem Service (LSASS) process and exfiltrate credentials. CreateDump is part of the Microsoft .NET Framework distribution. The threat actors also retrieved credentials from the Security Account Manager (SAM) database, which they extracted from the Windows Registry using the reg save command. The threat actors frequently named the files they deployed using the pattern do.*. Examples include do.log (output from ping commands), do.exe (the CreateDump tool), and do.bat (a script that executes and deletes the CreateDump executable). The attackers moved laterally across the internal network from the initially compromised endpoints, primarily using RDP (Remote Desktop Protocol) connections and pass-the-hash techniques. For the pass-the-hash attacks, they used a custom-modified version of Mimikatz, implemented in an executable named bK2o.exe. In addition to the PHPsert webshell, the threat actors used two methods for remote command execution: SSH access, enabled by deploying authorized_keys files containing public keys for authentication, and Visual Studio Code Remote Tunnels.

Based on Microsoft’s dev tunnel technology, Visual Studio Code Remote Tunnels enable developers to access and work on remote systems. This access includes the command terminal and file system, allowing activities such as command execution and file editing. The Operation Digital Eye actors abused this functionality to maintain persistent backdoor access to compromised systems. To evade detection based on filesystem activity, the threat actors used %SystemRoot%\Temp and %ProgramData%\Visual Studio Code as their primary working directories for storing tools and data. %SystemRoot%\Temp is a directory where Windows stores temporary files and is often scrutinized with less. %ProgramData%\Visual Studio Code was intended to appear as a legitimate directory associated with Visual Studio Code. The intrusions were detected and interrupted before the attackers could proceed to further phases, such as exfiltrating data.
Abuse of Visual Studio Code - The threat actors deployed a portable Visual Studio Code executable named code.exe, digitally signed by Microsoft. They used the winsw tool to run it as a Windows service. The winsw configuration file we retrieved indicates that the attackers created a service named Visual Studio Code Service, which executes code.exe with the tunnel command-line parameter at every system startup. The configuration file reveals a pragmatic approach by the threat actors, who likely modified a publicly available winsw configuration. This is suggested by using the myapp service identifier and the %BASE%\logs directory for storing winsw log files, both of which appear in the public configuration file and in the one we retrieved.

13324353673?profile=RESIZE_584xwinsw configuration file

The tunnel parameter instructs Visual Studio Code to create a dev tunnel and act as a server to which remote users can connect. After authenticating to the tunnel with a Microsoft or GitHub account, remote users can access the endpoint running the Visual Studio Code server, either through the Visual Studio Code desktop application or the browser-based version, vscode.dev. After creating the dev tunnels, the threat actors authenticated using GitHub accounts and accessed the compromised endpoints through the Visual Studio Code browser-based version. Sentinel does not know whether the threat actors used self-registered or compromised GitHub accounts to authenticate to the tunnels.

Network Infrastructure - The Operation Digital Eye actors used infrastructure exclusively within Europe, sourced from the provider M247 and the Cloud platform Microsoft Azure. This was likely part of a deliberate strategy. Since the targeted organizations are based and operate within Europe, the attackers may have aimed to minimize suspicion by aligning their infrastructure’s location with their targets. Additionally, Cloud infrastructure commonly used in legitimate IT workflows, such as Microsoft Azure, is often not closely monitored and is frequently allowed through firewall restrictions. By leveraging public Cloud infrastructure for malicious purposes, the attackers made the traffic appear legitimate, which can be challenging to detect and may evade security defenses.

In the initial phases of the attacks, the threat actors used the server with IP address 146.70.161[.]78 to establish initial access by detecting and exploiting SQL injection vulnerabilities and the server with IP address 185.76.78[.]117 to operate the PHPsert webshell. IP addresses are allocated to the infrastructure provider M247 in Poland and Italy. In the later phases of the attacks, the threat actors used the server with IP address 4.232.170[.]137 for C2 purposes when remotely accessing compromised endpoints via the SSH protocol. This server is part of Microsoft’s Azure infrastructure in the Italy North datacenter region (Azure IP range: 4.232.128[.]0/18, service tag: AzureCloud.italynorth). Analysts do not know whether the threat actors used self-registered or compromised Azure credentials to access and manage the Azure resources and services.

The abuse of Visual Studio Code tunneling for C2 purposes also relies on Microsoft Azure infrastructure. Creating and hosting a dev tunnel requires connecting to a Microsoft Azure server with a domain of *.[clusterID].devtunnels.ms, where [clusterID] corresponds to the Azure region of the endpoint running the Visual Studio Code server, such as euw for West Europe. In Operation Digital Eye, the creation of dev tunnels involved establishing connections to the server with the domain [REDACTED].euw.devtunnels[.]ms, which resolved to the IP address 20.103.221[.]187. This server is part of Microsoft’s Azure infrastructure in the West Europe datacenter region (Azure IP range: 20.103.0[.]0/16, service tag: AzureCloud.westeurope).
The PHPsert Webshell - PHPsert executes attacker-provided PHP code using the assert function, which, in PHP versions before 8.0.0, interprets and runs parameter strings as PHP code. To hinder static analysis and evade detection, the webshell uses various code obfuscation techniques, including XOR encoding, hexadecimal character representation, string concatenation, and randomized variable names.

13324354267?profile=RESIZE_710xPHPsert implementation

  • The PHPsert webshell operates as follows:
    PHPsert instantiates a class with a single regular method, which XOR-decodes and concatenates hexadecimal characters to generate the string assert. The class’s destructor (the magic method __destruct) uses this string to invoke the assert function, passing attacker-provided PHP code as a parameter.
  • The webshell retrieves the attacker-provided PHP code from an HTTP POST request parameter, for example, momomomo. If the id parameter is present in the request URL, PHPsert decodes the Base64-encoded value of the POST parameter. If the id parameter is absent, the webshell uses the raw value of the parameter.
  • Finally, when PHPsert finishes executing, the class’s destructor is invoked, which calls the assert function to execute the attacker-provided PHP code.

Analysts identified multiple PHPsert variants submitted to malware-sharing platforms since May 2023 from various locations, including Japan, Singapore, Peru, Taiwan, Iran, Korea, and the Philippines. These variants show only minor differences in their implementation, such as varying variable names and POST request parameters like mr6, brute, and qq. Analysis suggests that PHPsert is deployed as a standalone PHP file and integrated into various types of web content, including web text editors and content management systems.

One of the PHPsert variants contains commented-out code snippets and comments in simplified Chinese that describe nearby code. These comments and snippets are not present in the PHPsert versions observed in Operation Digital Eye, nor in any of the webshell’s other variants. Below are the code comments, all of which are machine-translated from simplified Chinese:

  • 结果是"assert", which translates to The result is "assert".
  • 验证 $this->rg 是否安全, which translates to Verify that $this->rg is safe.
  • 验证和清理用户输入, which translates to Validating and sanitizing user input.

13324362270?profile=RESIZE_400x13324362279?profile=RESIZE_584x13324362094?profile=RESIZE_710xPHPsert code snippets with comments in Chinese - These comments, along with the indicators of removed code across PHPsert variants, suggest the potential involvement of Chinese-speaking developers who may have been simplifying the web shell’s execution logic.

Pass-the-Hash Capability - The bK2o.exe executable (a custom-modified version of Mimikatz used in Operation Digital Eye for pass-the-hash attacks) enables the execution of processes within a user’s security context by leveraging a compromised NTLM password hash, bypassing the need for the user’s actual password. To achieve this, bK2o.exe overwrites the memory of the LSASS process. The tool supports the following command-line parameters:

  • /c: The process to execute; defaults to cmd.exe if not provided.
  • /u: The user’s username.
  • /d: The user’s domain.
  • /h: The NTLM password hash.
  • bK2o.exe implements a pass-the-hash technique by overwriting LSASS memory like Mimikatz, with its implementation partially overlapping with Mimikatz functions such as kuhl_m_sekurlsa_pth_luid and kuhl_m_sekurlsa_msv_enum_cred_callback_pth.

In summary, bK2o.exe performs the following:

  • Creates a suspended process in a new logon session, specifying the attacker-provided process, username, domain, and an empty password.
    Based on the session’s locally unique identifier (LUID), locates and extracts an encrypted credential data blob from the LSASS process memory containing the user’s NTLM hash and the encryption keys required to decrypt the blob.
  • Decrypts the data blob, overwrites the user’s NTLM hash with the attacker-provided hash, and re-encrypts the data blob.
  • Resumes the suspended process.

13324368662?profile=RESIZE_584xbK2o.exe creates a new process and retrieves the logon session’s LUID

To navigate LSASS memory, bK2o.exe uses code signatures, represented as byte sequences in hexadecimal format. These sequences correspond to known LSASS instructions, which serve as navigation points within the memory. To hinder static analysis and evade detection, bK2o.exe obfuscates code signatures and strings by constructing them dynamically on the stack at runtime instead of storing them as static data.

13324372493?profile=RESIZE_400xbK2o.exe constructs the string lsasrv.dll on the stack

13324371866?profile=RESIZE_400xbK2o.exe constructs the code signature 33 ff 41 89 37 4c 8b f3 […]on the stack

From Operation Digital Eye to Tainted Love and Soft Cell - Sentinel identified two additional samples uploaded to malware-sharing platforms that construct code signatures on the stack, which we refer to as wsx1.exe and wsx1.exe. Like bK2o.exe, both wsx.exe and wsx1.exe are custom-modified versions of Mimikatz and implement pass-the-hash functionality.

Substantial code segments in wsx.exe and wsx1.exe, which implement the construction of code signatures on the stack, overlap with those in bK2o.exe, including identical mov instruction operand sizes and values. This suggests that wsx.exe, wsx1.exe, and bK2o.exe are highly likely derived from the same source.

13324374477?profile=RESIZE_400xCode segment in bK2o.exe

13324375090?profile=RESIZE_400xCode segment in wsx1.exe

Analysts observed overlaps between wsx.exe, wsx1.exe, and mim221 components. mim221 is a versioned and well-maintained credential theft tool, also a custom-modified version of Mimikatz, which SentinelLabs observed in Operation Tainted Love, a campaign targeting telecommunication providers in the Middle East in 2023.

Sentinel attributed Operation Tainted Love to a suspected Chinese cyberespionage group within the nexus of Granite Typhoon (formerly known as Gallium) and APT41 while acknowledging the possibility of tool sharing among Chinese state-sponsored threat actors and the potential involvement of a shared vendor or digital quartermaster. Researchers assess that mim221 represents an evolution of tooling associated with Operation Soft Cell, such as simplify_32.exe. Operation Soft Cell, which targeted telecommunication providers in 2017 and 2018, has been linked to the Granite Typhoon, and possible connections between the Soft Cell actors and APT41 have also been suggested.

mim221 has a multi-component architecture, with a single executable staging three components — pc.dll, AddSecurityPackage64.dll, and getHashFlsa64.dll — using techniques such as decryption, injection, and reflective image loading. These components share several overlaps with bK2o.exe, wsx.exe, and wsx1.exe.
To hinder static analysis, some mim221 components also obfuscate strings by constructing them on the stack at runtime. Additionally, the mim221 components AddSecurityPackage64.dll and getHashFlsa64.dll implement error logging similar to that of wsx.exe and wsx1.exe, including identical custom error messages, a consistent output format, and the same English-language errors.

13324377254?profile=RESIZE_400xError messages in mim221

13324377279?profile=RESIZE_400xError messages in wsx.exe and wsx1.exe

In addition, RTTI (Run-Time Type Information) information stored in wsx.exe, wsx1.exe, and the mim221 component getHashFlsa64.dll reveals that classes with the same names are declared across these executables. Analysts have not observed these class names in open-source or publicly available tooling.

13324377879?profile=RESIZE_400xClass names (those present in more than one executable are highlighted in bold)

mimCN | A Collection of China-Nexus APT Tools - Due to the previously discussed overlaps between bK2o.exe (used in Operation Digital Eye), wsx.exe, wsx1.exe, mim221 components (used in Operation Tainted Love), and simplify_32.exe (used in Operation Soft Cell), Sentinel collectively refer to this collection of tools as mimCN.

13324378292?profile=RESIZE_710xThe mimCN samples bK2o.exe, wsx.exe, wsx1.exe, and mim221

We include in the mimCN tool collection the previously mentioned tools and any other custom modifications of Mimikatz that have overlapped with other mimCN executables, suggesting they may originate from the same source. Such overlaps include shared code-signing certificates and unique custom error messages or obfuscation techniques.
To date, we have observed mimCN tools exclusively in the context of suspected Chinese APT activities. Although the compilation timestamps of the mimCN samples observed in these intrusions could have been manipulated, the proximity of the timestamps to when the activities occurred suggests that they are likely authentic.

Operation mimCN sample Compilation timestamp (UTC)
Digital Eye bK2o.exe Thu May 30 08:47:56 2024
Tainted Love mim221 (pc.exe) Thu Jun 09 08:02:12 2022
Tainted Love mim221 (AddSecurityPackage64.dll) Thu Jun 09 08:01:46 2022
Tainted Love mim221 (pc.dll) Tue Jun 07 16:55:05 2022
Tainted Love mim221 (getHashFlsa64.dll) Fri May 27 20:56:26 2022
Soft Cell simplify_32.exe Tue Nov 20 03:54:21 2018

13324378878?profile=RESIZE_584xUse of mimCN samples

Further, unique usage instructions are found in some mimCN samples, such as [ERROR]Please input command. eg, /cmd:xxx and [ERROR]Please input ip. Eg, /ip:xx.XXX.xx.x or /ip:xxx.com suggests the involvement of a dedicated development team that is leaving instructions for a separate group of operators. Combined with overlapping mimCN samples across various intrusions attributed to China-nexus APT groups and distributed over the years, this suggests that mimCN is likely the product of an entity responsible for maintaining and provisioning tools to multiple clusters within the Chinese APT ecosystem.

Attribution Analysis – Analysts assess that Operation Digital Eye was highly likely conducted by a China-nexus cluster with cyberespionage motivations. The specific group responsible remains unclear due to the extensive sharing of malware, operational playbooks, and infrastructure management processes among Chinese APT clusters. Sentinel’s assessment is based on a collective consideration of multiple indicators, including the malware, infrastructure, techniques used, victimology, and the timing of the activities.

Malware - A variant of the PHPsert webshell contains code comments in simplified Chinese. This suggests the potential involvement of Chinese-speaking developers. Further, the custom Mimikatz modification bK2o.exe used in Operation Digital Eye is part of the mimCN collection and shares implementation overlaps with other custom Mimikatz modifications, suggesting a common origin. These tools have been observed exclusively in the context of suspected Chinese APT activities, such as Operation Soft Cell and Operation Tainted Love. Malware and tooling used in these operations have been associated with the alleged Chinese APT groups Granite Typhoon and APT41, and possible connections to other China-nexus groups, such as APT10 and Lucky Mouse, have also been suggested.

The mimCN tool collection suggests the presence of a shared vendor or digital quartermaster responsible for the sustained development and provisioning of tools to groups within the Chinese APT ecosystem. This function is suspected to play a significant role in the Chinese threat landscape. The I-Soon leak offers rare insight into China’s cyberespionage activities and provides supporting evidence for digital quartermasters within this landscape.

Infrastructure - While not exclusive to Chinese APT groups, the use of M247 infrastructure, as seen in Operation Digital Eye, has happened daily in recent years. One example is the M247 infrastructure attributed to the suspected Chinese cluster STORM-0866 (also known as Red Dev 40), with which the Sandman APT group is associated. Additionally, using Cloud services and resources near the targeted organizations in Operation Digital Eye suggests a carefully planned and targeted infrastructure management approach. Researchers suspect third-party entities' potential involvement with administering and provisioning infrastructure in this context. This practice has recently become increasingly common in the Chinese APT ecosystem.

Abuse of Visual Studio Code – The visibility into threat actor activities suggests that the abuse of Visual Studio Code tunneling for C2 purposes was relatively rare before Operation Digital Eye. Previous research indicates that starting in 2023, a suspected North Korean group has used Visual Studio Remote Tunnels to maintain persistence in compromised networks. Additionally, in October 2024, Cyble released a report documenting unattributed activity in which threat actors distributed a Windows Shortcut (LNK) file to deploy Visual Studio Code and activate its tunneling feature to establish remote access.

As of this report, this technique's only publicly disclosed use around Operation Digital Eye has been attributed to a suspected Chinese APT group. In September 2024, Unit 42 published a report on a campaign targeting government entities in Southeast Asia, in which threat actors used Visual Studio Code as a backdoor. The campaign was attributed to Stately Taurus (Mustang Panda). The exact timeline of the campaign is unclear, with mid-August 2024 being the only reference point explicitly mentioned in the Unit 42 report. Based on this, analysts suspect that Operation Digital Eye occurred before this activity.

Sentinel has not observed any overlaps in TTPs between Operation Digital Eye and the activity reported by Unit 42, except for the abuse of Visual Studio Code. Researchers recognize the possibility that distinct Chinese APT clusters may share operational playbooks, including leveraging Visual Studio Code for C2 purposes.

Temporal Analysis – The analysis of timestamps marking the dates and times of operator activity in the targeted organizations showed that all activities occurred on workdays (Monday to Friday). Additionally, converting the timestamps from their original time zones, Coordinated Universal Time (UTC) and Central European Summer Time (CEST, UTC+2), to China Standard Time (CST, UTC+8) revealed that the operators were primarily active during typical working hours in China, mainly between 9 am and 9 pm CST. This suggests a potentially state-sanctioned operation. The ‘996’ work schedule (9 am to 9 pm CST, six days a week) has been standard in China’s technology sector, but it was ruled illegal by the Supreme People’s Court in 2021. As a result, state employees are almost certainly restricted to weekday work, typically between 9 am and 9 pm, aligning closely with our observations from the timestamp analysis.

The figure below shows the total number of connections established by the threat actors to Visual Studio Code tunnels throughout Operation Digital Eye, broken down by hour of the day. The data is presented in the original time zone (CEST) and China Standard Time (CST, CEST+6). We observed minimal to no activity between 10 pm and 9 am CST and between 11 am and 1 pm CST, which aligns with the typical daily working hours in China, including the midday lunch break.

13324380301?profile=RESIZE_710xNumber of established connections to Visual Studio Code tunnels

Conclusions - Operation Digital Eye highlights the persistent threat posed by Chinese cyberespionage groups to European entities, with these threat actors continuing to focus on high-value targets. The campaign underscores the strategic nature of this threat, as breaching organizations that provide data, infrastructure, and cybersecurity solutions to other industries gives the attackers a foothold in the digital supply chain, enabling them to extend their reach to downstream entities.

The abuse of Visual Studio Code Remote Tunnels in this campaign illustrates how Chinese APT groups often rely on practical, solution-oriented approaches to evade detection. By leveraging a trusted development tool and infrastructure, the threat actors aimed to disguise their malicious activities as legitimate. Exploiting widely used technologies, which security teams may not scrutinize closely, presents a growing challenge for organizations. This calls for defenders reevaluating traditional security approaches and implementing robust detection mechanisms to identify such evasive techniques in real time.

Lateral movement capabilities observed in Operation Digital Eye, linked to custom Mimikatz modifications used in previous campaigns, indicate the potential involvement of shared vendors or digital quartermasters and their essential function in the Chinese APT ecosystem. These centralized entities provide continuity and adaptability to cyberespionage operations, equipping threat actors with consistently updated tools and evolving tactics as they target new victims.

Indicators of Compromise
SHA1 Hashes
Value Note
0be9dd709d7d68887a92c793881dd4a010796e95 The CreateDump tool (do.exe)
213f06ed5ac9e688816b4bbe73bf507994949964 The GetUserInfo tool
289f3bfe297923507cf4c26ca500ae01819c6a95 The local.exe tool
2e2cf8a4a0e7decceb8e22536b13173479da0d13 PHPsert variant
3035d8846d7a9f309f2d24daba6ac33ad99524fc PHPsert variant
399776991a094e1ee78b2a915bf4491e67c04ec7 PHPsert variant
3a688c844259822c51ceb3aea508303c4a654eb3 PHPsert variant
4d6947a19dd9a420c22fee39fac8b4df95a47569 PHPsert variant
63cea28d927f8e629377399fa08a9cb4fd0c6238 PHPsert variant
6549e50645bb1c02e4972651d335a75cb6d5aa74 PHPsert variant
7941909fd5c1277c6f7baf21e484c9e59ea454ee mimCN (bK2o.exe)
7cb7bcb9187f8faf47fd77cf1213ab3fe2350a77 mimCN (simplify_32.exe)
82b1cb9b69d5f05bb20852322fb3c2c00bce9134 mimCN (wsx.exe)
83ca53c95705352ff60149b0b17a686956e23172 PHPsert variant
a9d6d0c47728094feb794ad7e25c253737633140 Visual Studio Code (code.exe)
b2811cb4d0afe13d2722093039a72588c348dcfd PHPsert variant
c0e03fce8f7f51e91da79f773aa870f0897b0ee2 PHPsert variant
cb6726fb3f7952ede04ed22d2c72389255991827 PHPsert variant
d57fa43944676c56e66f4b20ffa3d82048e354fd PHPsert variant
e572380ab95c4ab5a87f701d4654d3386911b387 do.bat
e8a8d8fa7122c1592a314343b45bac2c213bb57d mimCN (wsx1.exe)
IP Addresses
Value Note
146.70.161[.]78 Server used for initial access (SQL injection attack)
185.76.78[.]117 C2 server (PHPsert webshells)
20.103.221[.]187 Visual Studio Code dev tunnel
4.232.170[.]137 C2 server (SSH access)
Domains
Value Note
[REDACTED].euw.devtunnels[.]ms Visual Studio Code dev tunnel

 

This article is shared at no charge and is for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. We thank Tinexta Cyber and SentinelLabs for this excellent cyber intelligence report. Red Sky provides indicators of compromised information via a notification service (RedXray) or an analysis service (CTAC). For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225, or feedback@redskyalliance.com

• Reporting: https://www.redskyalliance.org/
• Website: https://www.redskyalliance.com/
• LinkedIn: https://www.linkedin.com/company/64265941

Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://register.gotowebinar.com/register/5378972949933166424

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!