Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求很明确,不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述即可。 首先,我得通读整篇文章,抓住主要内容。文章讲的是一个疑似来自中国的网络间谍活动,目标是东南亚的军事组织。这个活动从2020年开始,由国家赞助。Palo Alto Networks Unit 42在追踪这个威胁活动,代号是CL-STA-1087。 接下来,文章提到攻击者使用了特定的恶意软件工具,比如AppleChris、MemFun和Getpass。这些工具用于窃取敏感信息,特别是军事能力、组织结构以及与西方军队的合作情况。攻击者展示了战略耐心和精准的情报收集能力,而不是大规模的数据窃取。 此外,文章还提到攻击者使用了高级持续性威胁(APT)的特点,包括精心设计的交付方法、防御规避策略、稳定的基础设施以及定制的有效载荷部署。这些都表明攻击者具有高度的专业性和长期的运营能力。 最后,文章指出攻击者通过多种方式隐藏自己的行为,比如使用Pastebin作为死信存储器来获取C2服务器地址,并且在运行时使用沙盒逃避技术来绕过安全系统。 综合以上信息,我需要将这些要点浓缩到100字以内。要确保涵盖主要目标、攻击者的特征、使用的工具以及他们的战术策略。 可能的结构是:首先说明事件和目标,然后提到使用的恶意软件和策略,最后强调他们的耐心和情报收集能力。 这样组织起来应该能够满足用户的要求。 </think> 一篇关于疑似中国背景的网络间谍活动的文章指出,该活动自2020年起针对东南亚军事组织展开,由国家支持,具备APT特征,利用恶意软件精准窃取军事情报,并采取长期潜伏和隐蔽战术以确保行动持续性。 2026-3-13 17:33:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020.

Palo Alto Networks Unit 42 is tracking the threat activity under the moniker CL-STA-1087, where CL refers to cluster, and STA stands for state-backed motivation.

"The activity demonstrated strategic operational patience and a focus on highly targeted intelligence collection, rather than bulk data theft," security researchers Lior Rochberger and Yoav Zemah said. "The attackers behind this cluster actively searched for and collected highly specific files concerning military capabilities, organizational structures, and collaborative efforts with Western armed forces."

The campaign exhibits hallmarks commonly associated with advanced persistent threat (APT) operations, including carefully crafted delivery methods, defense evasion strategies, highly stable operational infrastructure, and custom payload deployment designed to support sustained unauthorized access to compromised systems.

The tools used by the threat actor in the malicious activity include backdoors named AppleChris and MemFun, and a credential harvester called Getpass.

The cybersecurity vendor said it detected the intrusion set after identifying suspicious PowerShell execution, allowing the script to enter into a sleep state for six hours and then create reverse shells to a threat actor-controlled command-and-control (C2) server. The exact initial access vector used in the attack remains unknown.

The infection sequence involves the deployment of AppleChris, different versions of which are dropped across target endpoints following lateral movement to maintain persistence and evade signature-based detection. The threat actors have also been observed conducting searches related to official meeting records, joint military activities, and detailed assessments of operational capabilities.

"The attackers showed particular interest in files related to military organizational structures and strategy, including command, control, communications, computers, and intelligence (C4I) systems," the researchers noted.

Both AppleChris variants and MemFun are designed to access a shared Pastebin account, which acts as a dead drop resolver to fetch the actual C2 address stored in Base64-decoded format. One version of AppleChris also relies on Dropbox to extract the C2 information, with the Pastebin-based approach used as a fallback option. The Pastebin pastes date back to September 2020.

Launched via DLL hijacking, AppleChris initiates contact with the C2 server to receive commands that allow it to conduct drive enumeration, directory listing, file upload/download/deletion, process enumeration, remote shell execution, and silent process creation.

The second tunneler variant represents an evolution of its predecessor, using just Pastebin to get the C2 address, in addition to introducing advanced network proxy capabilities.

"To bypass automated security systems, some of the malware variants employ sandbox evasion tactics at runtime," Unit 42 said. "These variants trigger delayed execution through sleep timers of 30 seconds (EXE) and 120 seconds (DLL), effectively outlasting the typical monitoring windows of automated sandboxes."

MemFun is launched by means of a multi-stage chain: an initial loader injects shellcode responsible for launching an in-memory downloader, whose main purpose is to retrieve C2 configuration details from Pastebin, communicate with the C2 server, and obtain a DLL that, in turn, triggers the execution of the backdoor.

Since the DLL is fetched from the C2 at runtime, it gives threat actors the ability to easily deliver other payloads without having to change anything. This behavior transforms MemFun into a modular malware platform as opposed to a static backdoor like AppleChris.

The execution of MemFun begins with a dropper that runs anti-forensic checks before altering its own file creation timestamp to match the creation time of the Windows System directory. Subsequently, it injects the main payload into the memory of a suspended process associated with "dllhost.exe" using a technique referred to as process hollowing.

In doing so, the malware runs under the guise of a legitimate Windows process to fly under the radar and avoid leaving additional artifacts on disk. 

Also put to use in the attacks is a custom version of Mimikatz known as Getpass that escalates privileges and attempts to extract plaintext passwords, NTLM hashes and authentication data directly from the "lsass.exe" process memory.

"The threat actor behind the cluster demonstrated operational patience and security awareness," Unit 42 concluded. "They maintained dormant access for months while focusing on precision intelligence collection and implementing robust operational security measures to ensure campaign longevity."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/chinese-hackers-target-southeast-asian.html
如有侵权请联系:admin#unsafe.sh