TIDRONE Aims at Military and Satellite Sectors in Taiwan

Upon examining this specimen, we discovered that the command and control (C&C) server was inactive. By analyzing the APIs utilized in the malware and the recorded pcap file from the sandbox report, we deduced potential functionalities.

TIDRONE Targets Military and Satellite Industries in Taiwan

Upon examining this specimen, we discovered that the command and control (C&C) server was inactive. By analyzing the APIs utilized in the malware and the recorded pcap file from the sandbox report, we deduced potential functionalities. Our conclusion on the backdoor’s capabilities was drawn from comparing the decrypted packet contents with the hardcoded command codes within the malware.

Command code

Description

0x1001

Transmit victim information to C&C server

0x1002

Execute an action without impact

0x1003

Initiate SetEvent operation

0x1004

Receive unidentified data with uncertain purpose

0x1005

Erase traces and

  • Eliminate files wwlib.cfg, wwlib.dat, and wwlib.dll
  • Delete service

0x1006

Establish persistence by setting reg

0x2001

Receive payload size from the C&C server

0x2002

Acquire a dll file from the C&C server

0x2003

Invoke export functions of the received dll from 0x2002

0x2004

UNDEFINED

0x2005

Verify active connections

0x2007

Dispatch enumerated files in a designated directory to the C&C server

Table 1. List of Commands for CXCLNT Backdoor

DLL (Backdoor.CLNTEND)

The final payload comprises an airborne dll named “install.dll”. Within the InstallSetup export function, three courses of action are pursued based on the configuration value:

  1. SvcLoad → Establish a service named “CertPropSvce” and introduce the subsequent payload, ClientEndPoint.dll, into the current process or svchost process (Dependent on configuration).
  2. TaskLoad → Create a task named “CertificatePropagatione” and inject the next payload, ClientEndPoint.dll, into the current process or svchost process (Dependent on configuration).
  3. Other: Directly infuse the next payload, ClientEndPoint.dll, into the current process or svchost process (Dependent on configuration).

ClientEndPoint.dll serves as a remote terminal tool with communication supported for the C&C server across different protocols:

  • TCP
  • HTTP
  • HTTPS
  • TLS
  • SMB(port:445)

As per our observations, threat actors tend to use a deceiving domain name for the C&C server, such as symantecsecuritycloud[.]com, microsoftsvc[.]com, and windowswns[.]com, whether it pertains to CLNTEND or CXCLNT. These domains adopt a similar naming strategy to mislead investigations related to network infrastructure.

The congruence in file compilation timestamps and the operational timeline of threat actors aligning with other espionage activities associated with China indicates that this campaign is likely conducted by an unidentified Chinese-speaking threat collective. The observed incidents were highly precise and narrowly focused. The emphasis on military-related sectors, especially drone manufacturers, implies an espionage motive due to the sensitive data typically stored by these entities. This reinforces the speculation that TIDRONE is participating in espionage endeavors.

Considering the common parent process (WinWord.exe) utilization by threat actors, organizations can defend against TIDRONE assaults by maintaining attentiveness towards the following variations:

  • WinWord.exe (sha256: 8cfb55087fa8e4c1e7bcc580d767cf2c884c1b8c890ad240c1e7009810af6736). Note the presence of the child process cmd.exe due to remote shell functionality.
  • WinWord.exe (sha256: 8cfb55087fa8e4c1e7bcc580d767cf2c884c1b8c890ad240c1e7009810af6736) including “-s“ as the first argument in the cmd line.
  • WinWord.exe (sha256: 8cfb55087fa8e4c1e7bcc580d767cf2c884c1b8c890ad240c1e7009810af6736) with either “/SvcLoad“ or “/TaskLoad” in the final argument of the cmd line.

This study delved into TIDRONE, a threat actor affiliated with Chinese-speaking entities. Incidents were detected in Taiwan with a primary focus on military-related sectors, specifically drone manufacturing. These actions involve sophisticated malware iterations like CXCLNT and CLNTEND dispersed through ERP software or remote workspaces. By examining the technical specifics of these malicious activities, users can be better informed regarding such threats.

Organizations can adopt various measures to shield themselves against threats, including:

  • Source software solely from reputable sources
  • Remain cautious of social engineering deceptions serving as entry points for attacks
  • Deploy antimalware solutions to identify early indicators of compromise anywhere within the system

Trend Micro Vision One provides multi-tiered protection across diverse environments. With comprehensive prevention, detection, and response features, it fortifies systems against breaches and intrusions.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.