Saturday, March 1, 2025
HomeMalwareChinese APT's New Malware MirageFox Launch Cyber Attack on Government & Military...

Chinese APT’s New Malware MirageFox Launch Cyber Attack on Government & Military Sectors

Published on

SIEM as a Service

Follow Us on Google News

Chinese government affiliated APT15 cyberespionage group involving with new MirageFox malware campaign to attack various sectors including government contractors, Military base and other private industries across the world.

The researcher believes that this new sophisticated malware campaign is to reuse the code from advanced remote access Tool called Mirage which is activity attacking various sector since 2012.

This APT15 group best known as “living off the land,” which mean they are using already available tools and advanced software to infiltrate the victim’s computer and infect with malware.

Also, this attacker involving a various cyber attack using different names such as Vixen Panda, Ke3chang, Royal APT, and Playful Dragon.

Also, researcher suspect that it Could be possible APT15 was responsible for hacking the US Navy contractor.

MirageFox code reuse Analysis

MirageFox malware campaign is using two other new version of RAT code called Mirage and Reaver which is also attributed to Chinese government affiliated groups.

Both binaries are newly uploaded in virustotal which contains few detection results and both were uploaded quite often on June 8 and June 9, 2018. and further analysis was done with analyzed them using Intezer Analyze to see if we could find any code reuse.

According to Intezer, On VirusTotal, we can see there are only 10/66 detections for this binary, 11/66 for another similar version of MirageFox (SHA256: 97813e76564aa829a359c2d12c9c6b824c532de0fc15f43765cf6b106a32b9a5), and 9/64 for the third MirageFox binary that was uploaded (SHA256: b7c1ae10f3037b7645541acb9f7421312fb1e164be964ee7acd6eb1299d6acb2).

It was unclear about the tools that used by this  APT15 group, original infection vector and other relative information.

Researchers named this campaign as MirageFox which is taken from the string that was found in the code which is reused from Mirage and Reaver.

Here, a module by McAfee that is loaded by a few of their executables that import and call this function that means the APT15 Performing some DLL Hijacking by distributing a legitimate McAfee binary with MirageFox to load up the DLL properly into a legitimate looking process.

Also, This version connected via command & control server by infiltrating the internal network of the targeted organization and connected to their internal network using VPN.

“Finally, its collected the various information including username, CPU information, architecture it sends this information to the C&C, opens a backdoor, and sits waiting for commands from the C&C with functionality such as modifying files, launching processes, terminating itself, and more functionality typically seen in APT15’s RATs” Intezer said.

Indicator of Compromise

MirageFox

  • 28d6a9a709b9ead84aece250889a1687c07e19f6993325ba5295410a478da30a
  • 97813e76564aa829a359c2d12c9c6b824c532de0fc15f43765cf6b106a32b9a5
  • b7c1ae10f3037b7645541acb9f7421312fb1e164be964ee7acd6eb1299d6acb2
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in...

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...