DOWN THE GRAYRABBIT HOLE – EXPOSING
UNC3569 AND ITS MODUS OPERANDI
Steve Su, Aragorn Tseng, Chi-Yu You & Cristiana Brafman Kittner
Google, Japan, Taiwan, Singapore & USA
stevusufocus@google.com
2 - 4 October, 2024 / Dublin, Ireland
www.virusbulletin.com
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
2 VIRUS BULLETIN CONFERENCE OCTOBER 2024
ABSTRACT
In this paper we provide an in-depth analysis of UNC3569, a prolific and sophisticated threat actor operating within the
Chinese cybercriminal and cyber contractor-for-hire ecosystem, mostly operating out of China. UNC3569 consistently
exploits known vulnerabilities in widely used software to infiltrate organizations across a wide range of industries
worldwide. The group’s activities are not limited to a specific region or sector, demonstrating a global reach and
sophisticated targeting. UNC3569 uses a multifaceted toolset that includes both custom-developed malware and
commercial tools acquired from other providers. This diverse arsenal allows the group to adapt its tactics, techniques and
procedures (TTPs) to different targets and environments, enhancing its effectiveness and operational success. Evidence
suggests potential connections between UNC3569 and other established People’s Republic of China (PRC)-nexus threat
actors, including UNC251 and UNC3246. These connections, along with shared infrastructure, tools and tactics, point to
a complex web of affiliations and collaborative efforts within the broader PRC threat landscape. Connections between
UNC3569 and other long-standing PRC-nexus threat actors UNC251 and UNC3246, coupled with historic TTPs, are
evidence of a broader technology ecosystem solidifying in the Chinese threat landscape. This is further evidenced by the
i-SOON leak that occurred in February 2024. UNC3569 shares connections with the PRC-based company i-SOON,
including the use of an IP address linked to i-SOON operators. The i-SOON leak suggests a potential business
relationship and operational collaboration between i-SOON and UNC3569 [1]. Significantly, this research sheds light on
the potential connections among threat actors linked to China’s Ministry of State Security (MSS) and those operating
under the cover of front companies.
INTRODUCTION
UNC3569 is a PRC-nexus threat group that prioritizes efficiency, adopting notable n-day exploits for network-facing
services, and using multifaceted hacking toolsets to expand its operation. UNC3569’s TTPs reveal a penchant for using
anti-virus bypass techniques, popular public tools, custom tools, and connections with cyber mercenaries in an increasingly
complex ecosystem. Further, UNC3569 has a potential business relationship and operational collaboration with i-SOON, a
private contractor company based in Sichuan, China.
Operational targeting
UNC3569 has conducted cyber operations against a multitude of industries worldwide. The group’s targets span the
government, education, technology and finance sectors, demonstrating an indiscriminate reach. While the group’s
operations are concentrated in East and Southeast Asia, UNC3569’s reach extends to other regions, including the United
States, highlighting the global nature of their campaigns. Figure 1 shows a map of the affected regions, and Figure 2 shows
the targeted industries.
Figure 1: Map of the affected regions.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
3VIRUS BULLETIN CONFERENCE OCTOBER 2024
Figure 2: Affected industries.
Efficiency-first modus operandi
UNC3569’s efficiency-driven approach, combined with vulnerability exploitation, infrastructure configuration, anti-virus
evasion techniques and a diverse toolset, underscores the need to understand the complex relationships that exist within this
ecosystem in the cyber threat landscape.
UNC3569 consistently exploits n-day vulnerabilities for services provided by vendors such as Apache, Microsoft, IBM,
VMware and Oracle. The attackers use publicly available scanners to find the loopholes.
A simple public reconnaissance tool, script and BEACON usually come after initial exploitation. A primary backdoor –
DRAFTGRAPH, CROSSWALK or the custom GRAYRABBIT – is included in the attack to offer other remote control
features. The payload is often obfuscated with an additional binary layer, including techniques such as XOR encoding, custom
shellcode loaders (see the example of RABBITCAVE), the public anti-AV project AtomLdr [2], or the group’s proprietary
downloader RABBITFUR. The group has also used commercially available Chinese remote control tools like Ping32.
UNC3569’s command-and-control (C2) infrastructure reveals patterns in server configurations and subdomain usage.
Similarities in server setups suggest potential automation in the deployment process. These C&C servers are
multifunctional, hosting various malware controllers and serving as distribution points for malware. UNC3569 further
diversifies its infrastructure by creating distinct subdomains for hosting different malware families, adding another layer of
complexity to its operations.
THREAT OPERATIONS
Habitual tactics – initial entry by abusing n-day exploits
Since 2021, UNC3569 has exploited popular n-day CVEs in widely used software, such as CVE-2021-44228 and
CVE‑2022-21587, to gain access to target organizations. Upon successful exploitation, the attackers typically deploy the
OXEEYE tool (OXEEYE is a publicly available port-forwarding utility originally named ‘iox’ [3]) using the SIDESTEP
launcher for reconnaissance purposes. This is often followed by the deployment of Cobalt Strike BEACON on the
compromised server to establish a foothold for further operations.
In February 2023, UNC3569 targeted a US media and entertainment company, exploiting CVE-2022-47986, which allowed
the attackers to execute arbitrary commands on the Aspera Faspex server. This exploit allowed for the use of PowerShell to
download malicious components to the target server. This led to a DLL sideload attack deploying the BEACON payload.
Subsequently, lateral movement was achieved to several servers. Additional tools used in this campaign included
SIDESTEP, which was embedded in OXEEYE for reconnaissance.
Additional evidence observed in July 2023 further suggests UNC3569’s ongoing use of OXEEYE and GRAYRABBIT.
This toolset was discovered on the Microsoft OneDrive, which was abused as DRAFTGRAPH C2 infrastructure. This
suggests that the group continues to rely on established TTPs for initial compromise and reconnaissance.
Leaked command logs
A command log file linked to UNC3569 was inadvertently exposed via an open directory on the group’s server
(8.210.141.104) at the end of 2022. Analysis of this log revealed UNC3569’s targeting and victimology by showing
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
4 VIRUS BULLETIN CONFERENCE OCTOBER 2024
reconnaissance activities against a broad range of targets in Southeast Asia and Oceania, including government agencies,
educational institutions, telecommunication providers, airlines, and organizations within the heavy industry and energy
sectors. While the log does not confirm successful breaches, it nevertheless provides insight into the hacking tools and
techniques used by UNC3569 in its attempts.
The following is an example of the workflow used to test the target server:
1. Download multiple ProxyShell exploit tools for testing:
• Proxyshell-auto [4]
- Exploit tool based on CVE-2021-34473, CVE-2021-31206, CVE-2021-34523, CVE-2021-31207
• proxyshell [5]
- Exploit tool based on the Microsoft Exchange CVE-2021-34473, CVE-2021-34523, CVE-2021-31207
• ProxyVulns [6]
- [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit
- [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains
- [ProxyShell] CVE-2021-34473, CVE-2021-34523 & CVE-2021-31207 Exploit Chains
2. Download the Palo Alto PAN-OS scanner and Mikrotick tools to scan the organization’s firewall portal server and
network devices:
• panos-scanner [7]
Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface
• mikrotik-tools [8]
- Jailbreak tool for Mikrotik devices
• PaloAltoRceDetectionAndExploit [9]
- Exploit tool based on CVE-2017-15944
3. After successfully opening a connection to the portal server, the actor tries to install Cobalt Strike and webshells on
that server:
• CVE-2021-34473-Exchange-ProxyShell [10]
• cs2modrewrite [11]
4. To grab the code execution permission, the actor then tries the following projects:
• CVE-2021-21985_PoC [12]
• CVE-2018-1207 [13]
5. Finally, the actor executes the simple Python FTP server, probably used for data harvesting.
Supply chain attacks and targeted servers on the cloud
In November 2021, UNC3569 initiated a campaign targeting servers hosted on major cloud and VPS providers. The group
employed the SERVEPLUG backdoor alongside the STREAMSERVE backdoor. For Linux-based servers, UNC3569
hosted an open directory server to deliver the ANGRYREBEL.LINUX backdoor. The victims were located in Eastern and
Southeastern Asia.
This cluster of activity has previously targeted entities throughout the same geographic area using malicious domains that
masquerade as services such as Amazon Web Services and Microsoft Support Services.
CrowdStrike reported that, when executed, the backdoor retrieves and executes a second-stage script from an external
source [14]. Attackers then deploy more malicious payloads to compromised hosts, including a malicious DLL loader that
decrypts and launches a shellcode in memory that then injects an embedded payload into an instance of notepad.exe.
CrowdStrike says it believes the attack was conducted by a China-nexus threat actor that previously targeted several online
gaming firms in Asia, even though there are differences in the delivered malicious payload, targeting scope, and supply
chain attack mechanism.
Several steps and organizations were reportedly involved in the campaign:
• Chinese cloud configuration tool Bastion
• Qianxin VPN software
• Communication software Comm100 (see [15]) and Live Chat software
• LiveHelp100 to drop the backdoor to the target server and disguise the malware components.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
5VIRUS BULLETIN CONFERENCE OCTOBER 2024
To cover the malicious traffic, the attackers registered C2 domains masquerading as normal AWS or AlibabaCloud
domains, as they had also done in previous operations.
Trojanized server configuration tool Trojanized Qianxin VPN
Table 1: Trojanized samples.
After gaining initial access, UNC3569 deployed reconnaissance tools to gather system information and capture screenshots
in the environment. The attackers used their custom Golang-based tool, SKYNEEDLE, which is capable of collecting
system data, stealing browser information (including Tencent QQ and WeChat data), and taking screenshots. The actor also
used a powerful command-line tool, HackBrowserData [16], for decrypting and exporting browser data – it supports the
most popular browsers on the market and can be run on Windows, macOS and Linux.
False SSL certificate error message delivering legitimate remote access control tools
During March 2023 malicious C&C server ssl.stream-google.com, controlled by UNC3569, displayed a fake SSL
certificate error page in Simplified Chinese regardless of the host’s locale. Clicking the links ‘安装证书’ (‘Install SSL
certificate’) or ‘安装新证书继续网站 (安全)’ (‘Install New SSL Certificate and Continue [Safe]’) or the button ‘点击更
新’ (‘Click to Update’), all resulted in malware being downloaded and run from https://chuanqiliebiao-1314[.]oss-cn-
shanghai[.]aliyuncs[.]com/wp-content/update.msi. The downloaded file update.msi (MD5:
5bae7a0ab1f9788f8fab89c5e8da5c07) contains the legitimate remote monitoring software Ping32, which is developed by
China-based company NSecsoft (origin: 安在软件), along with a configuration C&C server, ‘154.211.18.93’.
Figure 3: Inauthentic web page.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
6 VIRUS BULLETIN CONFERENCE OCTOBER 2024
如果您想获得 Chrome 最高级别的安全保护,请
安装
证书
Table 2: Source page of ssl.stream-google.com.
The malware downloaded from ssl.stream-google.com is hosted on chuanqiliebiao-1314.oss-cn-shanghai.aliyuncs.com,
which is a private server for the video game The Tales.
Figure 4: Screenshot of the video game hosted on the private server.
The ownership of chuanqiliebiao-1314.oss-cn-shanghai.aliyuncs.com is unclear. It was registered in 2020 but started to
deliver UNC3569 malware in October 2022.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
7VIRUS BULLETIN CONFERENCE OCTOBER 2024
Figure 5: Timeline of the malicious domains.
An inauthentic web page contains cross-site scripting (XSS) to deliver a payload via ‘http://x[.]ofo[.]ac/4BKZ’, which
collects screenshots of infected machines. The script modules are available on Chinese security forum 52pojie [17]. The
author of the code, sysalong [18], has an open-source version, xss_pt [19], released to the public.
There is another inauthentic page hosted on the ‘x.ofo.ac’ server. This leads the user to download BEACON (MD5:
2e73b0ade618cdc967165d1310eec29c) from ‘http://x[.]ofo[.]ac/update.exe’ and connects to C&C servers
‘api.active‑microsoft.com’ and ‘css.bustring.com’.
Malware distributed from the Aliyun Cloud server
URL Observed
time
MD5 Hosted
malware
C&C server
https://
chuanqiliebiao-1314[.]
oss-cn-shanghai[.]aliyuncs[.]
com/wp-content/ssl.exe
2022-10-28 8ae14f0b21f9689418525b716a47bb23 BEACON api.active-microsoft.com
css.bustring.com
https://
chuanqiliebiao-1314[.]
oss-cn-shanghai[.]aliyuncs[.]
com/wp-content/plugins/
Ssl-update.exe
2023-03-06 5f7764e2c6fd2185f4df9fb2873f1fe8 TROCHILUS bro.brorth.com
https://
chuanqiliebiao-1314[.]
oss-cn-shanghai[.]aliyuncs[.]
com/wp-content/update.msi
2023-04-14 5bae7a0ab1f9788f8fab89c5e8da5c07 Ping32 154.211.18.93
https://
chuanqiliebiao-1314[.]
oss-cn-shanghai[.]aliyuncs[.]
com/wp-content/v2.msi
2023-05-19 83ae23baeb8ca5f7053aa0d62d4ce806 Ping32 154.211.18.193
Table 3: Malware hosted on the private server.
https://www.52pojie.cn/thread-1172881-1-1.html
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
8 VIRUS BULLETIN CONFERENCE OCTOBER 2024
The URL https://chuanqiliebiao-1314[.]oss-cn-shanghai[.]aliyuncs[.]com/wp-content/v2.msi is set to download the installer
of an updater. The updater subsequently downloads and deploys the latest version of the Ping32 tool to the target system:
• v2.msi (MD5: 83ae23baeb8ca5f7053aa0d62d4ce806)
- Installer of Ping32 updater
After the installation is done, it further executes:
• setup_ip_154.211.18.193.exe (MD5: ffbfb09021bad36aeaf4a8f9bdd0d324)
- Ping32 updater
- Signed by a certificate with the organization name ‘Shandong Anzai Information Technology CO., Ltd.’, valid to
2019 Oct 18, 11:59 PM GMT
The URL https://chuanqiliebiao-1314[.]oss-cn-shanghai[.]aliyuncs[.]com/wp-content/plugins/Ssl-update.exe will download
a dropper (MD5: 5f7764e2c6fd2185f4df9fb2873f1fe8), dubbed ‘DOUBLESTEP’, with the Google Chrome icon. The
dropper is embedded with TROCHILUS (MD5: f39c17172d605c0195d61d72173758c1) with the RC4 key
‘a3s1df3a1sd3ad18a0s8daf0’:
• Ssl-update.exe (MD5: 5f7764e2c6fd2185f4df9fb2873f1fe8)
- DOUBLESTEP dropper
- Windows executable with Google Chrome icon
• N/A (MD5:f39c17172d605c0195d61d72173758c1)
- Customised TROCHILUS backdoor
The related infra cs.bustring.com was abused by two different simply designed downloaders, FIBERSTEP and DATASTEP.
The difference is the APIs and protocols. FIBERSTEP uses APIs like InternetOpenUrlA, InternetReadFile and CreateFiber
for downloading and executing the downloaded file:
• upload.exe (MD5: 4638bea432f067799818131b1d6b3e5c)
- FIBERSTEP downloader
- Download URL: http://cs[.]bustring[.]com:80/c/msdownload/update/others/2021/11/
• (noname) (MD5:20cb281a8b8aa5a107a9bc28d2666beb)
- Encrypted payload downloaded by FIBERSTEP
The payload is decrypted as BEACON:
• (noname) (MD5:de35a4657d1474fde2720c754b81fad8)
- BEACON
- C&C: cs.bustring.com, css.brorth.com
On the other hand, DATASTEP uses low-level APIs like socket, connect and VirtualProtect to achieve the same goal:
• untitled5.exe (MD5: 8d15b18af679f41d342612bacfe4b448)
- DATASTEP downloader
- C&C: 154.196.13.135 (resolved by cs.bustring.com)
- Payload is not available
Distribute Cobalt Strike BEACON from the cloud
From March to August 2023, UNC3569 conducted an operation leveraging GitHub accounts ‘kkecho123’ and ‘powerhelp’
to distribute its backdoor.
Figure 6: GitHub account ‘kkecho123’ used to distribute backdoor.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
9VIRUS BULLETIN CONFERENCE OCTOBER 2024
Figure 7: GitHub account ‘powerhelp’ used to distribute backdoor.
UNC3569 used BEACON stager samples to download additional payloads from GitHub accounts. This allowed the
attacker to easily switch payloads as needed. The GitHub change logs show evidence that the actor uploaded UNC3569’s
GRAYRABBIT (MD5: ea5deef56e6dab4477fe68ed57eda16e) after having uploaded BEACON (MD5:
dafca5bf5c132bede69df7f272efc11b):
• msinfo64.exe (MD5: 4a97cfabeda07881aef8f5f406100685)
- Get URL file from https://raw[.]githubusercontent[.]com/kkecho123/k/main/vbsf.vpn
• Vbsf.vpn (MD5: 7692afef71320aeee7de6845576c9c35)
- vbsf.vpn on the GitHub account
- Encrypted BEACON payload uploaded to GitHub at 2023-05-22
• Vbsf.vpn (MD5: 249bbb18b91e9639719427a3691a1bee)
- vbsf.vpn on the GitHub account
- Encrypted BEACON payload uploaded to GitHub at 2023-08-15
• Vbsf.vpn (MD5: ea5deef56e6dab4477fe68ed57eda16e)
- vbsf.vpn on the GitHub account
- Encrypted GRAYRABBIT payload uploaded to GitHub on 2023-08-16
• (Noname) (MD5: 8def8c562e718d38291baae0dbeb683e)
- GRAYRABBIT
- Decrypt from (MD5: ea5deef56e6dab4477fe68ed57eda16e)
- C2: 103.218.242.86:443
Figure 8: Change logs on GitHub.
Among the malware samples used, one stager shellcode is executed by the Rust shellcode runner (MD5:
c42f517698f4b8130057c81fae239f73) with a unique PDB string. The C2 domain is a fake Microsoft domain,
‘beta‑microsoft.com’.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
10 VIRUS BULLETIN CONFERENCE OCTOBER 2024
• art.exe (MD5: C42f517698f4b8130057c81fae239f73)
- Rust-based shellcode runner with BEACON embedded
- PDB: C:\Users\MECHREVO\work\shellcode_runner\target\release\deps\shellcode_runner.pdb
- C2: beta-microsoft.com
UNC3569 used this launcher (MD5: d108bee31eae53a247991bb9770af0bb) to run GRAYRABBIT:
• (Noname) (MD5:d108bee31eae53a247991bb9770af0bb)
- Rust-based shellcode runner with GRAYRABBIT embedded
- PDB: C:\Users\MECHREVO\work\shellcode_runner\target\release\deps\shellcode_runner.pdb
- Decrypted payload 1391b5fbb9e53f952d51a23b3ebf9d43
• (Noname) (MD5:1391b5fbb9e53f952d51a23b3ebf9d43)
- Shellcode to launch embedded GRAYRABBIT
• (Noname) (MD5: 8def8c562e718d38291baae0dbeb683e)
- GRAYRABBIT
- C2: 103.218.242.86:443
Use of DRAFTGRAPH backdoor
UNC3569 leverages cloud services like OneDrive for operational infrastructure and strategic cloud storage to
complement operations. In one example, a DRAFTGRAPH sample (MD5: 2377abd182e56db339e005c5cf9448c7) was
configured to abuse OneDrive as its C2 server. The attacker had other payloads stored in the cloud space, including
SIDESTEP loader, the CROSSWALK backdoor, the GRAYRABBIT backdoor, and a SIDESTEP sample with the
OXEEYE tool.
Figure 9: UNC3569 has GRAYRABBIT, CROSSWALK, SIDESTEP and DRAFTGRAPH in its arsenal.
Referring back to the GitHub project kkecho123/kkecho_vn mentioned in the previous section, the attacker had another
DRAFTGRAPH backdoor sample (MD5:3d5a962d4429d6de28a38e46d9b73d12) on the GitHub project, but it was later
deleted.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
11VIRUS BULLETIN CONFERENCE OCTOBER 2024
Figure 10: Change log of DRAFTGRAPH deletion.
Use of publicly available botnet tool
UNC3569 has used a commercial botnet tool created by the Chinese-speaking developer team @fuccccci. The exact nature
of the relationship between UNC3569 and the developers remains unclear, with possibilities ranging from a simple
purchase of the tool to a collaborative arrangement. UNC3569 uses this malware payload installer tool to deploy the SOGU
backdoor, demonstrating a willingness to leverage external resources to enhance its operational capabilities.
Figure 11: This tool is developed by a Chinese-speaking botnet tool developer team whose tools are sold via the Telegram
account @fuccccci.
UNC3569 has a SOGU sample (MD5: 2355190aeed42b5698d7307c51fbe07c) that calls back to the group’s C2 domain
‘ap123.fbi.cab’:
• AppInsta.dll (MD5: 2355190aeed42b5698d7307c51fbe07c)
- Write the embedded payload DATAS_D32.res, DATAS_D64.res, DATAS_L32.res, DATAS_SD.res to system registry
» DATAS/D32.res (MD5: 3200133d1376de9bb17b80e7e87f60c1)
» DATAS/D64.res (MD5: ad17df8a613788cedc69a3063249da66)
» DATAS/L32.res (MD5: 8207afeffd0aac1403f93c30ebc27f65)
» DATAS/SD.res (MD5: 500adad3001db3bea1cec8b9c369f152)
- FVTFiles.sys (MD5: d26ea66b33aa4731fb86007e988add1b)
» Decrypt from DATAS/D32, Windows System Driver x86
- FVTFiles.sys (MD5: 28bb4efb9e1dc71b10d1500167be0793)
» Decrypt from DATAS/D64, Windows System Driver x64
- (Noname) (MD5: 3c186f8c18a153b85a026e9613c1ec64)
» Decrypt from DATAS/L32, downloader to inject received payload into newly created svchost.exe process
- (Noname) (MD5: 064feeaab875d0a7076f573e90f34570)
» Decrypt from DATAS/SD, SOGU backdoor payload
» C2: ap123.fbi.cab
Upon successful exploitation, the dropper initiates a series of actions on the compromised system. These include:
• Find and decrypt resource L32 (encrypted EXE component, second-stage payload downloader) and SD (shellcode,
SOGU installer).
• Combine the decrypted payloads together (attach the shellcode behind the downloader).
• Encrypt the combined payloads using a four-byte XOR key.
• Create registers under the key ‘HKLM\SOFTWARE\DtSft\d1\’ to preserve the payload, decryption key and timestamp.
• Check the current process architecture is x86 (or x64) and decrypt the corresponding resource D32 (or D64) driver
component to the system folder.
• Register a new system service for persistence.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
12 VIRUS BULLETIN CONFERENCE OCTOBER 2024
M1: Preserve hard-coded
four-byte binary timestamp.
M2: The binary data preserved
with the format [four-byte
timestamp preserved in M1
(0x86013501) + encrypted
payload (size of L32 + size of
SD)]
M3: The XOR key used to
decrypt the encrypted payload
preserved in M3 (‘ec a4 00
c4’)
Figure 12: Concealed payload in the newly created registries.
The configuration block size of the embedded SOGU backdoor is 0x0150C, with the following information in the table:
sogu_config_encoder: sogu_20120123
sogu_config_size: 5388
hide_service: true
keylog: true
delete_self: true
memo1: 1234
memo0: 1234
The FMSfProtect.sys component (MD5: e9194bd20e9bd6f6f5e572796514b285) and the method used for persistence with
SOGU within the registry is identical to a demonstration sample provided by the @fuccccci developer team.
The demo sample can be downloaded from the URL http://ddos[.]tttseo[.]com/ddos/ddos.zip. The dropper exhibits identical
behaviours in executing an embedded SOGU backdoor and maintaining the payload within the same registry key, specifically
‘HKLM\\SOFTWARE\\DtSft\\d1\\M2’. The demo SOGU sample employs a distinct password, ‘chinatongyi2022’, within its
configuration block. This password translates to ‘中国统一2022’, signifying ‘Chinese unification’.
C2: mail.tttseo.com:53
sogu_config_encoder: sogu_20141118b
campaign_id: fish
password: chinatongyi2022
dns-server: 8.8.8.8
dns-server: 8.8.4.4
dns-server: 114.114.114.114
hide_service: true
keylog: true
delete_self: true
Extended Configuration Parameters
lateral_icmp_port: 1357
sogu_config_size: 13988
install_type: NONE
lateral_tcp_port: 1357
reg_hive: HKEY_LOCAL_MACHINE
lateral_custom_ff_port: 1357
lateral_udp_port: 1357
screenshot_options: 16 %AUTO%\\DSSM\\screen false 50 10 3 50
process_inject_targets_SP:
%windir%\\system32\\rundll32.exe
%windir%\\system32\\dllhost.exe
%windir%\\system32\\msiexec.exe
http://ddos.tttseo.com/ddos/ddos.zip
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
13VIRUS BULLETIN CONFERENCE OCTOBER 2024
The SOGU backdoor uses ‘mail.tttseo.com’ as its C2 domain. This domain is noteworthy as it is a sibling domain of
‘ddos.tttseo.com’, where the @fuccccci developer team’s home page is located.
C2 INFRASTRUCTURE ANALYSIS
Geolocation and service provider preference
The threat actor likes to rent a serial number of IP addresses under the same class B or class C subnet for operational
convenience. That’s why we see more than 67% of the C2 server IP addresses in the same location: Hong Kong and
Singapore.
Figure 13: Most of the C2 servers are located in Hong Kong and Singapore.
Precisely because of this tactic, about 50% of the IP addresses originate from the actor’s favourite service providers (i.e.
Choopa, Alibaba Cloud and IT Novation Cloud).
Figure 14: Most of the C2 servers are from Choopa, Alibaba Cloud and IT Novation Cloud.
Command-and-control domains spoof legitimate websites, subdomains created for malware families
Our research shows that UNC3569 often registers C2 domains that spoof well-known organizations and brands. This is
most likely done to blend in with legitimate traffic and evade detection. These domains often serve as C2s for multiple
different malware families, potentially even spanning different operations.
Interestingly, UNC3569 uses sibling subdomains under the same domain zone, with each subdomain seemingly allocated to
a different malware family. Based on our observations and research, some of the sibling domains appear to register
additional domains for their own operating convenience. The sibling domains that start with ‘cs’ are associated with the
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
14 VIRUS BULLETIN CONFERENCE OCTOBER 2024
Cobalt Strike BEACON, and the sibling domain that starts with ‘plug’ is associated with SOGU, also known as PlugX.
This suggests that UNC3569 uses specific subdomains within a domain to host and distribute different malware families.
Fbi.cab
The fake FBI domain is one of the group’s favourites. The actor registered at least 11 different subdomains under this
domain zone, five of which are observed to be used as the C2 server for malware such as KEYPLUG, SOGU, Cobalt Strike
BEACON, GRAYRABBIT and Gh0st.
We summarize our findings on this infrastructure in Table 4.
C&C server Malware MD5 Description
v2.fbi.cab GRAYRABBIT c97fddb7a96f168b1eccaf4c95468dba
ap123.fbi.cab SOGU 2355190aeed42b5698d7307c51fbe07c SOGU sample wrapped by
the commercial botnet tool
from @fuccccci
xp.fbi.cab SOGU d751e18272ec62a33d5468963b93ab2b
cs.fib.cab BEACON.Stager bf426ecb47ec9bc9a4c8ab1ed0268663 Masquerades as document
file
sf.fbi.cab GH0ST 7b027d93ebd128260a043bb06ad1cf51 Masquerades as Adobe
Manager
gen.fbi.cab KEYPLUG.LINUX f9029a1455738901380d887f3b3ca6ad
os.fbi.cab KEYPLUG.LINUX e9021b834ff35ae4234841bffbe3c099
Table 4: Malware associated with fbi.cab subdomains.
Active-microsoft.com
This fake Microsoft domain zone is another of UNC3569’s favourites. The subdomains are associated with SOGU, Cobalt
Strike BEACON, and the downloader LITTLEEGRET.
C&C server Malware MD5 Description
cdn.active-microsoft.com BEACON.Stager 8ae14f0b21f9689418525b716a47bb23 Masquerades as Adobe
Manager
ns1.active-microsoft.com BEACON 3a9c326214d16782314e29a5c7a95dc0
ns2.active-microsoft.com BEACON 3a9c326214d16782314e29a5c7a95dc0
plug.active-microsoft.com SOGU 99a6637268d7965fa60c8f8a004b2cf7 SOGU sample wrapped by
the commercial botnet tool
from @fuccccci
tjj.active-microsoft.com LITTLEEGRET 5a122e86a8f134e42ebae8510404df3d Simple downloader to run
second stage
Table 5: Malware associated with active-microsoft.com subdomains.
Ofo.ac
Under this domain zone, UNC3569 has used the Linux backdoor HELLOBOT together with SOGU and Cobalt Strike
BEACON in its operations.
C&C server Malware MD5 Description
aw.ofo.ac SOGU 5ba969da1347cb0e8dea7513f0dac827 SOGU sample wrapped by
the commercial botnet tool
from @fuccccci
cdn.ofo.ac SOGU 648ea096099a8bf0c32d0a8ac04d4d68 SOGU sample wrapped by
the commercial botnet tool
from @fuccccci
go.ofo.ac HELLOBOT 41eda76872fa2a966e1d1ed16e88cc6b
Table 6: Malware associated with ofo.ac subdomains.
Apart from the malicious domain zone above, the actor also registered a number of other malicious domain zones, shown
in Figure 15.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
15VIRUS BULLETIN CONFERENCE OCTOBER 2024
Figure 15: Malware on different domain zones.
Notably, the forged Google Chrome domain ‘version.google-chrome.org’ was found in a GRAYRABBIT sample, which
masqueraded as an Adobe Flash application. Although we didn’t find other backdoors associated with the rest of the sibling
domains under the google-chrome.org zone, two of them (‘data.google-chrome.org’ and ‘xss.google-chrome.org’) resolved
to the same IP address during the suspect operation time (18 Aug 2022 – 31 Dec 2022).
Extend infrastructure efficiently with similar GRAYRABBIT server configuration
Based on commonalities in UNC3569’s infrastructure, we surmise that the actor deployed its operation environment either
on different servers with similar configurations or on a copied VM image, to use the new infrastructure more efficiently.
Server IP Backdoor Service provider Open ports
8.218.120.134 GRAYRABBIT ALIBABA-CN-NET Alibaba US
Technology Co., Ltd. (45102)
443/UNKNOWN, 139/NETBIOS, 445/SMB,
3389/RDP, 47001/HTTP
8.218.124.102 GRAYRABBIT ALIBABA-CN-NET Alibaba US
Technology Co., Ltd. (45102)
443/UNKNOWN, 9999/UNKNOWN, 139/
NETBIOS, 445/SMB, 3389/RDP
8.210.232.195 GRAYRABBIT ALIBABA-CN-NET Alibaba US
Technology Co., Ltd. (45102)
443/UNKNOWN, 139/NETBIOS, 445/SMB,
3389/RDP, 7001/UNKNOWN, 47001/HTTP
103.218.242.86 GRAYRABBIT &
CROSSWALK
UCLOUD-HK-AS-AP UCLOUD
INFORMATION TECHNOLOGY
HK LIMITED (135377)
443/UNKNOWN, 139/NETBIOS, 445/SMB,
3389/RDP, 5985/HTTP, 47001/HTTP
152.32.134.159 GRAYRABBIT &
CROSSWALK
UCLOUD-HK-AS-AP UCLOUD
INFORMATION TECHNOLOGY
HK LIMITED (135377)
80/HTTP, 137/NETBIOS, 139/NETBIOS,
445/SMB, 3389/RDP, 5985/HTTP, 47001/
HTTP
Table 7: GRAYRABBIT server configuration.
TOOLING
UNC3569 incorporates publicly available tools as well as some that are only available from private sources.
Private tools
UNC3569 uses a number of backdoors commonly shared among PRC-nexus operations:
• SOGU
• CROSSWALK
• KEYPLUG.LINUX
• ANGRYREBEL.LINUX
Other backdoors are observed in UNC3569 or suspected related clusters of activity:
http://version.google-chrome.org
http://version.google-chrome.org
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
16 VIRUS BULLETIN CONFERENCE OCTOBER 2024
• GRAYRABBIT
• HELLOBOT
• DRAFTGRAPH
• STREAMSERVE
• SERVEPLUG
• SKYNEEDLE
• ELECTRONAURA
UNC3569 also boasts .NET capability to enable a .NET-based malware dropper to deploy the SOGU backdoor. Among the
SOGU samples, we found one with keyword ‘whg’, which is evidence that this shellcode source could originally have been
developed by the Chinese hacker Zhao Jibin [20]. This sample communicates with a different C2 domain, ‘cdn.ofo.ac’.
GRAYRABBIT
GRAYRABBIT is one of the malware families that UNC3569 has used repeatedly over the years across multiple different
attacks. It is a lightweight and simple backdoor that supports simple file operation, system information collection, running
modularized plugins, and executing a remote command shell.
UNC3569 seems to use GRAYRABBIT as its first-stage trojan for early stage infiltration. The attackers have varied the
malware that delivers GRAYRABBIT and used it together with other powerful remote control tools, but seem to be most
comfortable with GRAYRABBIT. We have continuously observed their use of GRAYRABBIT since November 2021.
Figure 16: GRAYRABBIT activity timeline.
GRAYRABBIT has both x86 and x64 variants.
The earliest x86 sample (MD5: 6467ecbbb69aaab966f02ff27d359e42) is a C++ application that was downloaded from the
malicious domain ‘wps-cn.com’. The domain name likely references WPS Office, a popular word processor in China. This
GRAYRABBIT backdoor communicates with 152.32.134.159, which is also set up as a CROSSWALK C2 server on a
different traffic port. Notably, UNC3569 abused another server, 103.218.242.86, for both GRAYRABBIT and
CROSSWALK as a C2 server on different ports, again around 2023 – 2024.
MD5 Filename C2 Timestamp Description
9ce73f397c765588a
ee3c9a82d8579e6
updatexxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx
xxxxxxxxxx.exe
152.32.134.159:443 First seen timestamp:
2021-11-13 23:38:04
Dropper, CROSSWALK
payload has no proxy
credential, ITW=http://
wps-cn[.]com/updatexxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxx.exe
6467ecbbb69aaab96
6f02ff27d359e42
corexxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx
xxxxxxxx.exe
152.32.134.159:9999 First seen timestamp:
2021-11-15 22:26:58
ITW=http://wps-cn[.]com/
corexxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx.exe
Table 8: CROSSWALK malware dropper and malware sample details.
The earliest x64 version of GRAYRABBIT (MD5: 0921396ce1da2ac2bebb0c76b11a39dd) appeared in May 2022. This
sample differs from the initial x86 sample in that part of the related remote commands were replaced by numbers. This
made the file commands consistent with the earliest x86 variant.
GRAYRABBIT seems to be used as a disposable first-stage trojan. Compared to the variety of different dropper and
downloader samples used together with GRAYRABBIT, the backdoor itself has evolved very little over two years.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
17VIRUS BULLETIN CONFERENCE OCTOBER 2024
Most of the samples share mostly the same code structures and only have a few minor modifications, such as encrypting
the C2 domain and changing the number of export functions. This suggests that this tool may be a disposable backdoor
with more complex tools saved for later infection stages.
Figure 17: C2 domain decryption by simple XOR operation.
The earliest x86 variant (MD5: 6467ecbbb69aaab966f02ff27d359e42) and the earliest x64 variant (MD5:
c97fddb7a96f168b1eccaf4c95468dba) share highly similar command structure. Notably, however, the file-related
commands replace string commands in favour of numeric commands in the x64 variant.
CMD string 1 CMD string 2 Command code Description
msg - core Used to run CoreClientInstall or CoreClientStart PE export functions
msg - 0x1 Create CMD.exe console; if console exists, execute CMD command
msg - 0x2 Terminate CMD.exe console
msg - 0x3 Initialize and run modules from the C2 controller
msg - 0x4 Report Hostname, UserName, ProcessID and module filename to C2 server
Data in format: [Hostname]+[Username]+[Module Filename]:[ProcessID]|
msg - 0x5 Terminate CMD.exe console and backdoor process
msg - 0x7 Execute module function
file f_c (0x665F6300) Copy file
file f_e (0x665F6500) Execute file
file f_s (0x665F7300) Search file
Table 9: GRAYRABBIT x86 command structure.
CMD string 1 CMD string 2 Command code Description
msg - core Used to run CoreClientInstall or CoreClientStart PE export functions
msg - 0x1 Create CMD.exe console; if console exists, execute CMD command
msg - 0x3 Execute code or function and write execution results to the log file
msg - 0x4 Terminate CMD.exe console
msg - 0x5 Initialize and run modules from the C2 controller
msg - 0x6 Report Hostname, UserName, ProcessID, and module filename to C2 server
Data in format: [Hostname]+[Username]+[Module]
msg - 0x7 Terminate CMD.exe console and backdoor process
file 0x63 Copy file
file 0x65 Execute file
file 0x73 Search file
Table 10: GRAYRABBIT x64 command structure.
The C2 traffic pattern response packets related to GRAYRABBIT samples can be divided into four parts dedicated to
command strings, export functions, one-byte command codes for the msg functionality, and a four-byte command code for
the command functionality. The following packet structure response delineation was observed:
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
18 VIRUS BULLETIN CONFERENCE OCTOBER 2024
Data offset Bytes Received content Description
Recv_data [0] DWORD command string
‘msg’ or ‘file’
Specifies command string type as msg or file-related function
Recv_data [12] Command string ‘core’ Specifies core command string used to run export functions
related to GRAYRABBIT payload
Recv_data [268] 1 byte Command code for msg series 1-byte numeric code to designate specific msg-related commands
Recv_data [276] 4 bytes Command code for file series 4-byte string value to designate specific file-related commands
Table 11: Traffic pattern of GRAYRABBIT.
Some of the x64 variant samples have a unique PDB string with username ‘alice’, but we don’t see many significant
differences between the rest of samples.
For the reader’s convenient reference, we summarize the different variants of GRAYRABBIT and related tools in Table 12.
Variant Launcher Features
GRAYRABBIT (x86) N/A 1. Exports: CoreClientInstall, CoreClientStart, Start
2. C2 domain in plaintext
GRAYRABBIT (x64) RABBITCAVE, RABBITWING,
RABBITFUR
1. Two types of exports:
- CoreClientInstall, start, start
- CoreClientInstall, CoreClientStart, start
2. Three types of C2 domain format:
- Plaintext
- Divided into a couple of Hexadecimal strings
- Byte operation encoded
GRAYRABBIT (x64
with Alice pdb string)
AtomLdr, RABBITMOUND Alice variant
1. Exports: CoreClientInstall, CoreClientStart, Start
2. C2 domain in plaintext
3. Unique PDB string = ‘C:\Users\alice\source\sr\
corecpp_r\x64\Release\corecpp.pdb’
Table 12: Versions of GRAYRABBIT.
Bypassing anti-virus
The UNC3569 actor prefers to use public tools or to quickly build new simple downloader or dropper components alongside
obfuscation, shellcode, and simple encryption methods to escape detection by anti-virus software for the early stage of the attack.
Shellcode dropper
UNC3569 used a short section of shellcode as its backdoor launcher. This shellcode decrypts the embedded PE payload
using a simple XOR operation and then executes the payload. The shellcode was interlaced into many Windows
applications to deliver GRAYRABBIT.
Figure 18: XOR decryption routine in the shellcode.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
19VIRUS BULLETIN CONFERENCE OCTOBER 2024
Shellcode runner and backdoor dropper
To evade detection and anti-virus software, UNC3569 developed multiple shellcode runners and backdoor droppers, and
modified code structures, API usage, obfuscation techniques and decryption routines to make detection increasingly challenging.
The use of a Rust-based shellcode runner – potentially a commercial tool shared among different actors – may be an
indication of the group’s approach and blending with other activity.
RABBITMOUND
API combination:
VirtualAlloc,
VirtualProtect
CreateThread
Decryption routine:
Single-byte XOR
decryption routine
Figure 19: RABBITMOUND.
RABBITNEST
API combination:
VirtualAlloc
VirtualProtect
RtlCopyMemory
CreateThread
Decryption routine:
16-byte key XOR
decryption routine
Figure 20: RABBITNEST.
Rust-based shellcode
runner
API combination:
LoadResource
VirtualAlloc
Figure 21: Rust-based shellcode runner.
Downloader
We also observed that UNC3569 used a simple downloader, RABBITFUR, to deliver the GRAYRABBIT backdoor. The
payload, hosted on an open directory server, is a shellcode with the GRAYRABBIT backdoor encoded by a single-byte
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
20 VIRUS BULLETIN CONFERENCE OCTOBER 2024
XOR operation. Forged Microsoft domains, including ‘https://cloudwps[.]cn/chr0me/payload’ and its sibling domains,
serve as C2 domains for the backdoor.
Launcher
SIDESTEP is a shellcode launcher that UNC3569 used to run its reconnaissance tool OXEEYE.
Figure 22: SIDESTEP code snippets.
Component type Component
Downloader RABBITFUR
Dropper AtomLdr, RABBITNEST, RABBITASH, RABBITMOUND, RABBITWING, Rust-based
shellcode runner
Launcher SIDESTEP
Table 13: UNC3569’s malware components.
Public tools
UNC3569 uses public hacking tools for various reasons: proven effectiveness, adaptability, and cost-efficiency compared
to developing custom tools. Public tools usually have a track record of success and can be customized to suit specific
needs. This is also a cost-effective way for the group to achieve its purpose, whereas developing new custom tools from
scratch requires significant time and resources.
The following are UNC3569’s public toolsets that have served as resources for gaining access, reconnaissance, lateral
movement, and credential harvesting.
Exploit tools
• Proxyshell-auto [4]
- CVE-2021-34473
- CVE-2021-31206
- CVE-2021-34523
- CVE-2021-31207
• Proxyshell [5]
- CVE-2021-34473
- CVE-2021-34523
- CVE-2021-31207
• ProxyVulns [6]
- CVE-2021-26855
- CVE-2021-27065
- CVE-2021-31195
- CVE-2021-31196
- CVE-2021-34473
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
21VIRUS BULLETIN CONFERENCE OCTOBER 2024
- CVE-2021-34523
- CVE-2021-31207
• PaloAltoRceDetectionAndExploit [9]
- CVE-2017-15944
• Other CVEs
- CVE-2021-44228
- CVE-2022-47986
- CVE-2022-21587
- CVE-2021-26857
Backdoors
• GH0ST
• BEACON
• TROCHILUS
Webshells
• BEHINDER (available on GitHub [21])
• REGEORG.NEO (available on GitHub [22])
Hacking tools
• HackBrowserData – a credential stealer that is available on GitHub [16]
• OXEEYE – a port forwarding and proxy utility, known on GitHub simply as ‘iox’ [3].
Mua-Remote-Control-Trojan (origin: MUA远控木马)
The GRAYRABBIT C2 domain ‘version.google-chrome.org’ and two other sibling domains resolved to the same IP
address, ‘103.113.157.134’, from 27 April 2022 to 16 November 2022. During this time, UNC3569 used this server as C2
for the Mua-Remote-Control-Trojan qwe.dll (MD5: ceb00e0548255bd6205a63f34a60deb7).
Figure 23: Connection between MUA trojan and GRAYRABBIT.
We surmise that this MUA trojan could be a test sample from UNC3569; however, we don’t have evidence to confirm
whether they used this simple open-source backdoor in a real-time attack operation, as opposed to just during training.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
22 VIRUS BULLETIN CONFERENCE OCTOBER 2024
Commercial tools
NSecsoft Ping32
Ping32 (MD5: ffbfb09021bad36aeaf4a8f9bdd0d324) is a commercial hacking tool used by UNC3569. Ping32 was originally
developed for information technology (IT) department managers to monitor employees and manage mobile storage devices.
To keep the remote controller updated, we found a convenient NSecsoft updater also abused by the actor to deliver the latest
version of controller.
The NSecsoft updater’s filename determines the first-stage C2 server. When executed, it parses the filename, stores information
related to the C2 server in the registry, and starts a second process. This process retrieves the stored information from the
registry and fetches ‘update.xml’ from the C2 server. The XML file contains details about the next payload version, MD5 hash,
and filename, which is hosted on the same C2 server. The following are the five different possible filename patterns:
1. ‘setup_ip_[IP_addr].exe’: the C2 is the [IP_addr] specified in the filename (port 28987 in our case). From the
payload of the msi sample downloaded from VT, the filename of the updater is setup_ip_154.211.18.193.exe, but
the information on VT shows that this file has been uploaded with a different filename / [IP_addr].
2. ‘setup_wid_[string].exe’: the downloader will send an HTTP GET request to cloud.nsecsoft.com::8987/ndns/
[string]. If the string matches an existing ID, the server will return the C2 IP address and port.
3. ‘setup_[string].exe’: same as (2).
4. ‘sg_setup.exe’: the C2 will be a hard-coded address, in our case: 10.141.186.98 (intranet IP). Likely for testing.
5. Other than the four formats above, the downloader will terminate itself and not start the second process.
CONNECTING THE DOTS
Potential connection with UNC251
Artifacts identified from UNC3569’s infrastructure, including multiple signals like a JARM fingerprint, certificate
configuration, and habitual naming convention overlap with PRC-nexus cluster UNC3246, suggest either that these two
groups may have access to shared resources or that they cooperate closely.
We found the following in terms of connections between UNC3569 and UNC3246:
• A unique JARM fingerprint (‘services.jarm.fingerprint:22d19d00022d22d22c22d19d22d22dcade67768786e23
ca695466fb7f94658’) – evidence that the C2 server 8.218.48.121 has similar Transport Layer Security (TLS)
configurations to two servers, 35.201.196.246 and 35.220.154.238, used by UNC3246.
• Both groups employ domains using ‘fbi’.
• UNC3569 hosted a VMProtected ANGRYREBEL.LINUX on http://8[.]218[.]48[.]121/caonima, containing a
profanity in Chinese Pinyin, ‘caonima’. This word is also found in a C2 domain used by UNC3246, ‘caonimade.11i.
me’. We also see that UNC3246’s TTPs contain lots of profanities, such as ‘daji8’ in ‘tools.daji8.me’.
Figure 24: Connections between UNC3569 and UNC3246.
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
23VIRUS BULLETIN CONFERENCE OCTOBER 2024
We found the following in terms of connections between UNC251 and UNC3246:
• A shared SSL certificate (MD5: 42f44f647e28f7a0c456811841bff28a)
- Version: 3 (0x2)
- Serial Number: 08:55:e5:ae:f0:5b:7c:ba:ba:f3:6a:0f:12:ff:0b:41
- Issuer: C = CN, O = “TrustAsia Technologies, Inc.”, OU = Domain Validated SSL, CN =
TrustAsia TLS RSA CA
- Validity
- Not Before: Dec 20 00:00:00 2019 GMT
- Not After : Dec 19 12:00:00 2020 GMT
- Subject: CN = ascnhub.com
The SSL certificates are associated with the domains ‘hack520.co.kr’ and ‘zhu.kr’ used by UNC251 and UNC3246’s
‘github.wiki’. The ‘hack520.co.kr’ domain was reported to be used by China-nexus contractor hacker ‘Hack520’, who
manages a VPS hosting service [23].
Similar to UNC251, UNC3569 also has various tools that demonstrate resource sharing among other contractor‑nexus
hackers, such as CROSSWALK and KEYPLUG.Linux.
Connection with i-SOON
In February 2024, an i-SOON data package was leaked in public and an interesting IP address, 8.218.67.52, appeared in the
discussion logs.
According to the conversation logs shown in Figure 25, 兵哥 (wxid_c9yv0nsla3yn22) asked 濤哥 (wxid_zb45i0rc71tk21)
for tunnelling server information for a person.
Wxid_zb45i0rc71tk21 responded by providing the proxy server 8.218.67.52 and TCP tunnel information and claimed that
this was their own server.
Figure 25: Leaked i-SOON conversation logs.
The proxy server IP address 8.218.67.52 was found abused together with the C2 domain files.amazonawsgarages.com in a
sample of the ELECTRONAURA backdoor used by UNC3569. ELECTRONAURA has an anti-debugging feature and
capability to report collected system information back to its C2 server. Trend Micro reported that the ELECTRONAURA
backdoor was being used as the second-stage backdoor in probing weaponized chat applications for supply-chain attacks [24].
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
24 VIRUS BULLETIN CONFERENCE OCTOBER 2024
Additionally, there were traffic logs that indicated that the actor accessed the GRAYRABBIT server 152.32.134.159 via
RDP from the IP addresses 8.219.167.156 and 8.219.138.129.1
Figure 26: Connections between UNC3569 and i-SOON.
CONCLUSION
Operations that overlap with what Mandiant tracks as UNC3569 have been reported by Symantec [26], CrowdStrike [14],
Trend Micro [24], and others. This group has maintained a high level of activity for years and we expect it to be an ongoing
threat to entities of interest to the PRC government in the future. The group’s emphasis on operational efficiency has likely
allowed it to conduct a wide range of operations. While these operations may be discovered, the group is also able to
employ new capabilities to adapt and continue its success.
The complex affiliations between UNC3569, UNC3246 and UNC251, combined with UNC3569’s use of open-source tools
and its potential ties to state-sponsored actors, demonstrate the difficulty in tracking this activity precisely. As businesses
are caught between ageing on-premises activity and the cloud, threat actors like UNC3569 are capitalizing on the
vulnerabilities exposed during the transitional period of cloud adoption. Significantly, the use by threat actors of
open‑source platforms to host payloads further enhances their ability to exploit legitimate services for malicious purposes,
hindering detection and mitigation efforts.
The evolution of the GRAYRABBIT backdoor demonstrates the transformation of the threat landscape in the Chinese
contractor and mercenary world.
REFERENCES
[1] Sichuan i-Soon Information Technology: Emerging from the Shadows of China’s Intelligence Operations.
https://advantage.mandiant.com/reports/24-10001719.
[2] NUL0x4C / AtomLdr. https://github.com/NUL0x4C/AtomLdr.
[3] EddieIvan01 / iox. https://github.com/EddieIvan01/iox.
[4] Udyz / proxyshell-auto. https://github.com/Udyz/proxyshell-auto.
[5] horizon3ai / proxyshell. https://github.com/horizon3ai/proxyshell.
[6] hosch3n / ProxyVulns. https://github.com/hosch3n/ProxyVulns.
[7] noperator / panos-scanner. https://github.com/noperator/panos-scanner.
[8] 0ki / mikrotik-tools. https://github.com/0ki/mikrotik-tools.
1 The server 8.219.167.156 was resolved by C2 domains api.microsoftfileapis.com and selfhelp.windowstearns.com. These two domains were also
observed being used in the previous supply-chain attack operation conducted by the same actor. The IoCs overlap in reports by CrowdStrike [14]
and Cloud Security Alliance [25].
https://advantage.mandiant.com/reports/24-10001719
https://github.com/NUL0x4C/AtomLdr
https://github.com/EddieIvan01/iox
https://github.com/Udyz/proxyshell-auto
https://github.com/horizon3ai/proxyshell
https://github.com/hosch3n/ProxyVulns
https://github.com/noperator/panos-scanner
https://github.com/0ki/mikrotik-tools
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
25VIRUS BULLETIN CONFERENCE OCTOBER 2024
[9] surajraghuvanshi / PaloAltoRceDetectionAndExploit. https://github.com/surajraghuvanshi/
PaloAltoRceDetectionAndExploit.
[10] je6k / CVE-2021-34473-Exchange-ProxyShell. https://github.com/je6k/CVE-2021-34473-Exchange-ProxyShell.
[11] threatexpress / cs2modrewrite. https://github.com/threatexpress/cs2modrewrite.
[12] alt3kx / CVE-2021-21985_PoC. https://github.com/alt3kx/CVE-2021-21985_PoC.
[13] mgargiullo / cve-2018-1207. https://github.com/mgargiullo/cve-2018-1207.git.
[14] CrowdStrike. Supply Chain Attack via a Trojanized Comm100 Chat Installer. 30 September 2022.
https://www.crowdstrike.com/blog/new-supply-chain-attack-leverages-comm100-chat-installer/.
[15] https://advantage.mandiant.com/reports/24-10000191.
[16] moonD4rk / HackBrowserData. https://github.com/moonD4rk/HackBrowserData.
[17] 52pojie. Urgent-phpMyAdmin import sql database file error. https://www.52pojie.cn/thread-1172881-1-1.html.
[18] sysalong. https://woj.app/1439.html.
[19] sysalong / xss_pt. https://github.com/sysalong/xss_pt.
[20] Intrusion Truth. Chinese APTs: Interlinked networks and side hustles. 24 July 2022.
https://intrusiontruth.wordpress.com/2022/07/24/chinese-apts-interlinked-networks-and-side-hustles/.
[21] rebeyond / Behinder. https://github.com/rebeyond/Behinder.
[22] L-codes / Neo-reGeorg. https://github.com/L-codes/Neo-reGeorg.
[23] Trend Micro. Examining a Possible Member of the Winnti Group. 19 April 2017. https://www.trendmicro.com/
en_za/research/17/d/pigs-malware-examining-possible-member-winnti-group.html.
[24] Horejsi, J.; Chen, J. C. Probing Weaponized Chat Applications Abused in Supply-Chain Attacks. Trend Micro.
14 December 2022. https://www.trendmicro.com/en_no/research/22/l/probing-weaponized-chat-applications-
abused-in-supply-chain-atta.html.
[25] Cloud Security Alliance. Supply Chain Attack via a Trojanized Comm100 Chat Installer. 2 November 2022.
https://cloudsecurityalliance.org/blog/2022/11/02/supply-chain-attack-via-a-trojanized-comm100-chat-installer.
[26] Symantec. Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong.
22 August 2023. https://symantec-enterprise-blogs.security.com/threat-intelligence/carderbee-software-supply-
chain-certificate-abuse.
[27] Cyble. Higaisa APT Resurfaces via Phishing Website targeting Chinese Users. 26 October 2023.
https://cyble.com/blog/higaisa-apt-resurfaces-via-phishing-website-targeting-chinese-users/.
[28] Passilly, T.; Tartare, M. The SideWalk may be as dangerous as the CROSSWALK. We Live Security. 24 August
2021. https://www.welivesecurity.com/2021/08/24/sidewalk-may-be-as-dangerous-as-crosswalk/.
[29] Brown, R.; Ta, V.; Bienstock, D.; Ackerman, G.; Wolfram, J. Does This Look Infected? A Summary of APT41
Targeting U.S. State Governments. Mandiant. 8 March 2022. https://cloud.google.com/blog/topics/threat-
intelligence/apt41-us-state-governments/.
APPENDIX – IOCs
CROSSWALK
ddefbecbf799414bac4769e24cc25ec233f860a845ae731ed49e7b2be791c8a9
a31d1515ac1fbc037d2dcbba3fec816b1fbb1d33ac719dff774939ed7a2296d4
5a56bddde6d6e7877ff791d8d87e3b37eac575deb62bc3952674942cc345bcbc (Dropper)
001dc13ecea26a7344816d77d145fdc2d8e26de200bda7c410dfb3a870da2cdd (CROSSWALK Binary)
GRAYRABBIT
46a5ab30e88476f4c4531a6b7fc1e983b72969721d6c285c70376036233f5e8c
fad2dc7b74f8c2e9d07656a961e2afad914e9a2ae60d361c5b0106e84715542d
06c57766935eff4358acf111536419172dd1067c0ecc9642e3cd99f3248062ec
62031cfedb010a42934fa37a0f9a8f30e4a7b62683278c448c85edf6a2247e8e
1ee0e86706d7396b6c4af48b57f3c89e28731b1845b0b6eee7ba490668f0e254
f3d1778d95a4d159dd79684dee33d1d2a3952ebedb1e567c448ff64140fe14b9
76c9e779324b4607caa0e054abef0887cc05014440cb624a342e89af378deee5
https://github.com/surajraghuvanshi/PaloAltoRceDetectionAndExploit
https://github.com/surajraghuvanshi/PaloAltoRceDetectionAndExploit
https://github.com/je6k/CVE-2021-34473-Exchange-ProxyShell
https://github.com/threatexpress/cs2modrewrite
https://github.com/alt3kx/CVE-2021-21985_PoC
https://github.com/mgargiullo/cve-2018-1207.git
https://www.crowdstrike.com/blog/new-supply-chain-attack-leverages-comm100-chat-installer/
https://advantage.mandiant.com/reports/24-10000191
https://github.com/moonD4rk/HackBrowserData
https://www.52pojie.cn/thread-1172881-1-1.html
https://woj.app/1439.html
https://github.com/sysalong/xss_pt
https://intrusiontruth.wordpress.com/2022/07/24/chinese-apts-interlinked-networks-and-side-hustles/
https://www.trendmicro.com/en_za/research/17/d/pigs-malware-examining-possible-member-winnti-group.html
https://www.trendmicro.com/en_za/research/17/d/pigs-malware-examining-possible-member-winnti-group.html
https://www.trendmicro.com/en_no/research/22/l/probing-weaponized-chat-applications-abused-in-supply-chain-atta.html
https://www.trendmicro.com/en_no/research/22/l/probing-weaponized-chat-applications-abused-in-supply-chain-atta.html
https://cloudsecurityalliance.org/blog/2022/11/02/supply-chain-attack-via-a-trojanized-comm100-chat-installer
https://symantec-enterprise-blogs.security.com/threat-intelligence/carderbee-software-supply-chain-certificate-abuse
https://symantec-enterprise-blogs.security.com/threat-intelligence/carderbee-software-supply-chain-certificate-abuse
https://cyble.com/blog/higaisa-apt-resurfaces-via-phishing-website-targeting-chinese-users/
https://www.welivesecurity.com/2021/08/24/sidewalk-may-be-as-dangerous-as-crosswalk/
https://cloud.google.com/blog/topics/threat-intelligence/apt41-us-state-governments/
https://cloud.google.com/blog/topics/threat-intelligence/apt41-us-state-governments/
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
26 VIRUS BULLETIN CONFERENCE OCTOBER 2024
782b6c2b7de5fb19310bd0da6482adb810266fce1ff66c054103950b763a966b
d20c46d5bb49a92f4528f9565a4fa58e26b41ef97bf3580f6003b9fe3ba36a15
96e7a1a4cd7d7ebc998bef3e6e3f0c0783494e134d1156a38f2f26903367d6e6
89081cb6e813a2470160758dd379dc8795f5055d426975cd8f7286c524466dce
RABBITNEST
2de211a8ffd369297ff867aff2557f2a5493524b15684643b3b2bcf9638762b1
c5c93ce4bfff60ca583728c76a9dedc266caba376d413b12b37f9514ce8b3781
c1f5f26447e7330fe7a955e22edd4c891ac990f7160ef9eb87fd8205e1720d0c
f84925e7536126360d5b35744a48f280c01c55799fd5c0c09902f60213d19696
2aacbfa94804ed98990af2c09281193481fb785d6bea6fb52d47acd395b6e78c
RABBITASH
71040c61852ff9c6648920c3a63e96f82b3a70aa62ff7a948e2e181fef4bd494
d40f3da965399eaea6f828fb599147b6a26cfa2203adce695dc8db8a026eb1d8
RABBITCAVE
469b4e1a928e30c4f62c29bd1eb204a5c22aa69975bb3928dffb5d44eb091877
b403a2c08163d5c32a66629f844ef76452e9c099ac5437c07b46ca5018fc1a15
0790dcfb6d08ef87ce7bfecabe2366afb5a1246325289a492c10d20a507a9698
RABBITMOUND
21497e412d7c8983b99fee0741ca35a2dae870b8e2c071ac70cb12add80f9ed6
62c72e97fe329e341f9dbedb5ca09cc9271195381db68c01366bf82991e6e25e
RABBITWING
d681b86f61e5bec5fbf2c73010db9b6598a3ecec916f3a56747479f32b46d5a0
46c0f4b6fcd8e5e46dfe6cbd89cdcf047be1cde02b68ffdfb06d4a88c7e1a8e1
RABBITFUR
a5d4adab977c759dc241bbe5b62f7d3e7bd3273bcbf903ac6612d8c138f75f9c
Rust-based dropper
7ae55c34aedc14e8ace09ad2f5cc0d74b48d5aa6851b683df2dee10e6bdb8046
DOUBLESTEP
feab16498369b6a24ee34f57459ebde7f60cbd0e9aa5c943d0718b75db2ce85f
03ccd9ab1ff49b374c233aa89e45b683cbf3b7ee87b3a257421c4e541330ae3e
FIBERSTEP
0502497436bef43a04a8416de7e14ad27c0df29a2e6a9b8d9de7394b07439367
DATASTEP
2c4f14a2bc4baffd0c035c1a5f5c257e9697e728a1f96ee03ba0287ae7defc70
DRAFTGRAPH
fe8f99445ad139160a47b109a8f3291eef9c6a23b4869c48d341380d608ed4cb
fa6043f4812830bd98e2e0d2800ed754d0d3588090f0180659f8f562308691a6
SIDESTEP & OXEEYE
15835b6dd703e69d22d4ab941ccd5f6e78c3abc22ae123366da5e950eaa62e2b SIDESTEP
e0e96d619a80afd6c23ca35bd48bf644184492ad66bf69e9b61563336728b6b4 Encrypted Payload File
efa7c9bebc6d610ec03c9fba6f50787f1c87bf4a4d971c1a1556ecd56488ee89 OXEEYE
TROCHILUS
e91763dab902988273c02781b8e627cadb50b2337a8e0d1c9f529f45bc5f22df
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
27VIRUS BULLETIN CONFERENCE OCTOBER 2024
HELLOBOT
69bb8b8d61873ffaf55051fffce8a0ee1419ff1ee054ace288fcebb7e0bc327b
ce89863a16787a6f39c25fd15ee48c4d196223668a264217f5d1cea31f8dc8ef
SOGU
b15fd68eba2c4dc29bbd0d33da7e7f9eab9c1be44b89ce736fee9727feab64f2
35564cf8b7b18a28fff88a7b82e5cd2ec019419ce3d5bb9f2483302a82987af2
5aae195fc44a7163a73406c02057ae5cc79eda87507f09bb956fe745fab328b9
3f3ad56e23986efa52139f86968e01ca6d44dc87300c2871b25743a13e33e5b2
b43fabebea2304f555f5f4c4c567d3810c5c62be4602509414532378e671fba2
KEYPLUG.Linux
36dbc30489d98ed4ca520773929cc775bd7b822c521d688dc2877b37084d3788
9f6f29c960f9421bd7bae9185b135c3a11bc2bc71bf77a2bb257811b263215d6
ELECTRONAURA
2dc08bd401d5396c2f99a41bbdbc378421f43318adc8627a2ae9a63e44f9b147
BEACON
14d2194faa1366d1c1ab2472f2fb3d5ea1641764a96fd33bd68711730c15ff91
Used domains
kf.2023kf1.top
chuanqiliebiao-1314.oss-cn-shanghai.aliyuncs.com
cloudwps.cn
wps-cn.com
www.gobay.info
active-microsoft.com
plug.active-microsoft.com
up.active-microsoft.com
tjj.active-microsoft.com
up.active-microsoft.com
cdn.active-microsoft.com
stream-google.com
api.stream-google.com
ssl.stream-google.com
google-chrome.org
version.google-chrome.org
stream-amazon.com
cdn.stream-amazon.com
up.stream-amazon.com
api.stream-amazon.com
myrnicrosoft.com
profile.myrnicrosoft.com
cloud.myrnicrosoft.com
update.myrnicrosoft.com
center.myrnicrosoft.com
proxyx.myrnicrosoft.com
fbi.cab
ap123.fbi.cab
cs.fbi.cab
xp.fbi.cab
DOWN THE GRAYRABBIT HOLE – EXPOSING UNC3569 AND ITS MODUS OPERANDI SU ET AL.
28 VIRUS BULLETIN CONFERENCE OCTOBER 2024
sf.fbi.cab
v2.fbi.cab
gen.fbi.cab
os.fbi.cab
ofo.ac
x.ofo.ac
go.ofo.ac
cdn.ofo.ac
aw.ofo.ac