{
	"id": "b6a6777c-fd35-44fc-a5bd-ea44e5e64bb5",
	"created_at": "2026-04-06T00:12:10.503513Z",
	"updated_at": "2026-04-10T03:37:40.914553Z",
	"deleted_at": null,
	"sha1_hash": "5b522e8abe9cf28c0a33eb6961a8d7675ec8a6e2",
	"title": "越南国家背景APT组织“海莲花”利用疫情话题攻击我国政府机构",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1318523,
	"plain_text": "越南国家背景APT组织“海莲花”利用疫情话题攻击我国政府机构\r\nBy 安全威胁情报\r\nArchived: 2026-04-05 15:37:03 UTC\r\nTAG：高级可持续攻击、海莲花、中国、APT32、OceanLotus、DenesRAT、政府\r\nTLP：白（报告使用及转发不受限制）\r\n日期：2020-03-05\r\n概述\r\n新型肺炎近期在全球范围内引起广泛关注，微步情报局监测发现，自新型肺炎爆发以来，有大量APT组织\r\n和黑产团伙利用作为话题发起攻击，如白象、绿斑、蔓灵花、海莲花、Kimsuky和Hades等，微步在线已\r\n撰写了多篇相关报告披露来此类攻击活动。\r\n“海莲花”，又名APT32和OceanLotus，是越南背景的黑客组织。该组织至少自2012年开始活跃，长期针对\r\n中国能源相关行业、海事机构、海域建设部门、科研院所和航运企业等进行网络攻击。除中国外，“海莲\r\n花”的目标还包含全球的政府、军事机构和大型企业，以及本国的媒体、人权和公民社会等相关的组织和\r\n个人。\r\n近期，微步情报局通过威胁狩猎系统再次捕获“海莲花”利用疫情话题针对我国发起攻击活动的样本文件，\r\n分析有如下发现：\r\n攻击者以“湖南省家禽H5N1亚型高致病性禽流感疫情情况”、“冠状病毒实时更新：中国正在追踪来\r\n自湖北的旅行者”等时事热点为诱饵进行鱼叉攻击，攻击活动或发生于今年2月。\r\n攻击者利用带数字签名的WPS文件，通过社会工程学诱导受害者点击执行，运行以后会通过侧加载\r\n方式装载恶意DLL，释放诱饵文档并且在内存中加载DenesRAT木马。\r\nDenesRAT木马具备文件操作、注册表读写、设置环境变量和远程执行代码等功能的后门，该后门\r\n被插入大量花指令用于对抗分析。\r\n通过C2域名关联发现，“海莲花”此次攻击活动的目标或涉及我国某部委及武汉市多家政府机构，性\r\n质极为恶劣。\r\n微步在线通过对相关样本、IP和域名的溯源分析，共提取5条相关IOC，可用于威胁情报检测。微\r\n步在线的威胁情报平台（TIP）、威胁检测平台（TDP）、API等均已支持此次攻击事件和团伙的检\r\n测。\r\n详情\r\nhttps://www.secrss.com/articles/17900\r\nPage 1 of 10\n\n自活跃以来，“海莲花”一直持续针对我国进行网络攻击。在攻击过程中，“海莲花”一直在尝试不同方法以\r\n实现在目标系统上执行恶意代码和绕过安全检测，其中经常使用的包含白利用和C2流量伪装等。白利用\r\n和压缩文件结合是“海莲花”惯用的木马投递手法。\r\n近日，微步情报局再次捕获到多个“海莲花”利用合法WPS可执行程序加载恶意DLL针对我国等目标的攻击\r\n样本。\r\n诱饵一：湖南省家禽H5N1亚型高致病性禽流感疫情情况.docx\r\n诱饵二：冠状病毒实时更新：中国正在追踪来自湖北的旅行者.doc\r\nhttps://www.secrss.com/articles/17900\r\nPage 2 of 10\n\n相关攻击的整体攻击流程如下：\r\n由于诱饵文档相关内容均出现于今年2月上旬，据此推断攻击活动或发生在2月期间。\r\nhttps://www.secrss.com/articles/17900\r\nPage 3 of 10\n\n样本分析\r\n攻击者通过带数字签名的WPS文件侧加载恶意DLL krpt.dll，krpt.dll执行后会解压DLL携带的资源文件并\r\n释放出诱饵文档，同时在内存中构造出后门DLL数据，然后修复导入表和重定位表。接着调用这个DLL的\r\nDllMain函数完成初始化，最后调用这个DLL的导出函数DllEntry执行后门功能。\r\n由于投递的两个样本代码和C2基本完全一致，下文以其中一个为例进行分析。\r\n1、 基本信息如下：\r\n恶意文件名称 krpt.dll\r\nhttps://www.secrss.com/articles/17900\r\nPage 4 of 10\n\nSHA256 c0d295d414ccd0b84a0e6c9f8c42083355a92ba97182d3aed9d5e8a99e3a99b1\r\nSHA1 5ba69be6ff537224fcc1cd1090ffd0303af69d88\r\nMD5 c8ea645fc5ac975af53e568566b90131\r\n样本大小 1. 17 MB (1,230,848 字节)\r\n样本格式 DLL\r\n2、 侧加载方式装载“krpt.dll”文件并调用“_force_link_krpt”导出函数，然后将DLL携带的诱导文档资源释\r\n放到“%TEMP%”目录，相关代码：\r\nhttps://www.secrss.com/articles/17900\r\nPage 5 of 10\n\n3、 释放完诱导文档后，加载资源文件中的Shellcode代码，相关代码：\r\nhttps://www.secrss.com/articles/17900\r\nPage 6 of 10\n\n4、 Shellcode头部为循环解密代码，相关代码：\r\n5、 接着会获取HTTP接口函数，获取计算机名和用户名，通过HTTP方式提交\r\n到“libjs.inquirerjs.com\"/script/x.png?CN=计算机名称\u0026UN=用户名称\u0026C=Windows_N”，如下图：\r\nhttps://www.secrss.com/articles/17900\r\nPage 7 of 10\n\n6、 执行完HTTP请求后，跳转到插入大量“海莲花”常用花指令的Shellcode，最终在内存中加载DenesRAT\r\n后门，截图为DLL功能入口：\r\n7、 解密后的DenesRAT的C2配置为“vitlescaux.com”，如下：\r\nhttps://www.secrss.com/articles/17900\r\nPage 8 of 10\n\n8、 然后连接C2：“vitlescaux.com:28194”，通过TCP协议发送加密后的数据到C2服务器，相关截图：\r\n9、 最终释放的DenesRAT为“海莲花”组织私有木马，能够根据C2服务器下发的指令执行相应的功能，主\r\n要功能有：\r\n文件操作，比如创建文件或目录、删除文件或目录、查找文件；\r\n注册表读写；\r\n远程执行代码，比如创建进程、执行DLL等；\r\nhttps://www.secrss.com/articles/17900\r\nPage 9 of 10\n\n设置环境变量。\r\n关联分析\r\n综合分析此次攻击的背景、TTPs、以及所使用的木马和网络资产，确定幕后攻击者为“海莲花”。\r\n对libjs.inquirerjs.com进行关联分析发现，该域名曾在之前“海莲花”的攻击中被使用。\r\n此外，该域名近期还出现了多个可疑URL地址，涉及x****c@china*****.gov.cn 、\r\nwu****zs@wuhan.gov.cn、y****c@126.com等邮箱地址。根据微步情报局对“海莲花”历史活动的分析，这\r\n些URL应是被用于对目标邮箱的探测行为。而相关邮箱分别属于我国某部委及武汉市多家政府机构，暴\r\n露出“海莲花”此次攻击活动的险恶用心。\r\n声明：本文来自安全威胁情报，版权归作者所有。文章内容仅代表作者独立观点，不代表安全内参立\r\n场，转载目的在于传递更多信息。如有侵权，请联系 anquanneican@163.com。\r\nSource: https://www.secrss.com/articles/17900\r\nhttps://www.secrss.com/articles/17900\r\nPage 10 of 10",
	"extraction_quality": 1,
	"language": "ZH",
	"sources": [
		"ETDA",
		"Malpedia"
	],
	"references": [
		"https://www.secrss.com/articles/17900"
	],
	"report_names": [
		"17900"
	],
	"threat_actors": [
		{
			"id": "8670f370-1865-4264-9a1b-0dfe7617c329",
			"created_at": "2022-10-25T16:07:23.69953Z",
			"updated_at": "2026-04-10T02:00:04.716126Z",
			"deleted_at": null,
			"main_name": "Hades",
			"aliases": [
				"Operation TrickyMouse"
			],
			"source_name": "ETDA:Hades",
			"tools": [
				"Brave Prince",
				"Gold Dragon",
				"GoldDragon",
				"Lovexxx",
				"Olympic Destroyer",
				"Running RAT",
				"RunningRAT",
				"SOURGRAPE",
				"running_rat"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "af509bbb-8d18-4903-a9bd-9e94099c6b30",
			"created_at": "2023-01-06T13:46:38.585525Z",
			"updated_at": "2026-04-10T02:00:03.030833Z",
			"deleted_at": null,
			"main_name": "APT32",
			"aliases": [
				"OceanLotus",
				"ATK17",
				"G0050",
				"APT-C-00",
				"APT-32",
				"Canvas Cyclone",
				"SeaLotus",
				"Ocean Buffalo",
				"OceanLotus Group",
				"Cobalt Kitty",
				"Sea Lotus",
				"APT 32",
				"POND LOACH",
				"TIN WOODLAWN",
				"Ocean Lotus"
			],
			"source_name": "MISPGALAXY:APT32",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "870f6f62-84f5-48ca-a18e-cf2902cd6924",
			"created_at": "2022-10-25T15:50:23.303818Z",
			"updated_at": "2026-04-10T02:00:05.301184Z",
			"deleted_at": null,
			"main_name": "APT32",
			"aliases": [
				"APT32",
				"SeaLotus",
				"OceanLotus",
				"APT-C-00",
				"Canvas Cyclone"
			],
			"source_name": "MITRE:APT32",
			"tools": [
				"Mimikatz",
				"ipconfig",
				"Kerrdown",
				"Cobalt Strike",
				"SOUNDBITE",
				"OSX_OCEANLOTUS.D",
				"KOMPROGO",
				"netsh",
				"RotaJakiro",
				"PHOREAL",
				"Arp",
				"Denis",
				"Goopy"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "191d7f9a-8c3c-442a-9f13-debe259d4cc2",
			"created_at": "2022-10-25T15:50:23.280374Z",
			"updated_at": "2026-04-10T02:00:05.305572Z",
			"deleted_at": null,
			"main_name": "Kimsuky",
			"aliases": [
				"Kimsuky",
				"Black Banshee",
				"Velvet Chollima",
				"Emerald Sleet",
				"THALLIUM",
				"APT43",
				"TA427",
				"Springtail"
			],
			"source_name": "MITRE:Kimsuky",
			"tools": [
				"Troll Stealer",
				"schtasks",
				"Amadey",
				"GoBear",
				"Brave Prince",
				"CSPY Downloader",
				"gh0st RAT",
				"AppleSeed",
				"Gomir",
				"NOKKI",
				"QuasarRAT",
				"Gold Dragon",
				"PsExec",
				"KGH_SPY",
				"Mimikatz",
				"BabyShark",
				"TRANSLATEXT"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "760f2827-1718-4eed-8234-4027c1346145",
			"created_at": "2023-01-06T13:46:38.670947Z",
			"updated_at": "2026-04-10T02:00:03.062424Z",
			"deleted_at": null,
			"main_name": "Kimsuky",
			"aliases": [
				"G0086",
				"Emerald Sleet",
				"THALLIUM",
				"Springtail",
				"Sparkling Pisces",
				"Thallium",
				"Operation Stolen Pencil",
				"APT43",
				"Velvet Chollima",
				"Black Banshee"
			],
			"source_name": "MISPGALAXY:Kimsuky",
			"tools": [
				"xrat",
				"QUASARRAT",
				"RDP Wrapper",
				"TightVNC",
				"BabyShark",
				"RevClient"
			],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "c8bf82a7-6887-4d46-ad70-4498b67d4c1d",
			"created_at": "2025-08-07T02:03:25.101147Z",
			"updated_at": "2026-04-10T02:00:03.846812Z",
			"deleted_at": null,
			"main_name": "NICKEL KIMBALL",
			"aliases": [
				"APT43 ",
				"ARCHIPELAGO ",
				"Black Banshee ",
				"Crooked Pisces ",
				"Emerald Sleet ",
				"ITG16 ",
				"Kimsuky ",
				"Larva-24005 ",
				"Opal Sleet ",
				"Ruby Sleet ",
				"SharpTongue ",
				"Sparking Pisces ",
				"Springtail ",
				"TA406 ",
				"TA427 ",
				"THALLIUM ",
				"UAT-5394 ",
				"Velvet Chollima "
			],
			"source_name": "Secureworks:NICKEL KIMBALL",
			"tools": [
				"BabyShark",
				"FastFire",
				"FastSpy",
				"FireViewer",
				"Konni"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "5da6b5fd-1955-412a-81aa-069fb50b6e31",
			"created_at": "2025-08-07T02:03:25.116085Z",
			"updated_at": "2026-04-10T02:00:03.668978Z",
			"deleted_at": null,
			"main_name": "TIN WOODLAWN",
			"aliases": [
				"APT32 ",
				"Cobalt Kitty",
				"OceanLotus",
				"WOODLAWN "
			],
			"source_name": "Secureworks:TIN WOODLAWN",
			"tools": [
				"Cobalt Strike",
				"Denis",
				"Goopy",
				"JEShell",
				"KerrDown",
				"Mimikatz",
				"Ratsnif",
				"Remy",
				"Rizzo",
				"RolandRAT"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "2439ad53-39cc-4fff-8fdf-4028d65803c0",
			"created_at": "2022-10-25T16:07:23.353204Z",
			"updated_at": "2026-04-10T02:00:04.55407Z",
			"deleted_at": null,
			"main_name": "APT 32",
			"aliases": [
				"APT 32",
				"APT-C-00",
				"APT-LY-100",
				"ATK 17",
				"G0050",
				"Lotus Bane",
				"Ocean Buffalo",
				"OceanLotus",
				"Operation Cobalt Kitty",
				"Operation PhantomLance",
				"Pond Loach",
				"SeaLotus",
				"SectorF01",
				"Tin Woodlawn"
			],
			"source_name": "ETDA:APT 32",
			"tools": [
				"Agentemis",
				"Android.Backdoor.736.origin",
				"AtNow",
				"Backdoor.MacOS.OCEANLOTUS.F",
				"BadCake",
				"CACTUSTORCH",
				"CamCapture Plugin",
				"CinaRAT",
				"Cobalt Strike",
				"CobaltStrike",
				"Cuegoe",
				"DKMC",
				"Denis",
				"Goopy",
				"HiddenLotus",
				"KOMPROGO",
				"KerrDown",
				"METALJACK",
				"MSFvenom",
				"Mimikatz",
				"Nishang",
				"OSX_OCEANLOTUS.D",
				"OceanLotus",
				"PHOREAL",
				"PWNDROID1",
				"PhantomLance",
				"PowerSploit",
				"Quasar RAT",
				"QuasarRAT",
				"RatSnif",
				"Remy",
				"Remy RAT",
				"Rizzo",
				"Roland",
				"Roland RAT",
				"SOUNDBITE",
				"Salgorea",
				"Splinter RAT",
				"Terracotta VPN",
				"Yggdrasil",
				"cobeacon",
				"denesRAT",
				"fingerprintjs2"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "71a1e16c-3ba6-4193-be62-be53527817bc",
			"created_at": "2022-10-25T16:07:23.753455Z",
			"updated_at": "2026-04-10T02:00:04.73769Z",
			"deleted_at": null,
			"main_name": "Kimsuky",
			"aliases": [
				"APT 43",
				"Black Banshee",
				"Emerald Sleet",
				"G0086",
				"G0094",
				"ITG16",
				"KTA082",
				"Kimsuky",
				"Larva-24005",
				"Larva-25004",
				"Operation Baby Coin",
				"Operation Covert Stalker",
				"Operation DEEP#DRIVE",
				"Operation DEEP#GOSU",
				"Operation Kabar Cobra",
				"Operation Mystery Baby",
				"Operation Red Salt",
				"Operation Smoke Screen",
				"Operation Stealth Power",
				"Operation Stolen Pencil",
				"SharpTongue",
				"Sparkling Pisces",
				"Springtail",
				"TA406",
				"TA427",
				"Thallium",
				"UAT-5394",
				"Velvet Chollima"
			],
			"source_name": "ETDA:Kimsuky",
			"tools": [
				"AngryRebel",
				"AppleSeed",
				"BITTERSWEET",
				"BabyShark",
				"BoBoStealer",
				"CSPY Downloader",
				"Farfli",
				"FlowerPower",
				"Gh0st RAT",
				"Ghost RAT",
				"Gold Dragon",
				"GoldDragon",
				"GoldStamp",
				"JamBog",
				"KGH Spyware Suite",
				"KGH_SPY",
				"KPortScan",
				"KimJongRAT",
				"Kimsuky",
				"LATEOP",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"Lovexxx",
				"MailPassView",
				"Mechanical",
				"Mimikatz",
				"MoonPeak",
				"Moudour",
				"MyDogs",
				"Mydoor",
				"Network Password Recovery",
				"PCRat",
				"ProcDump",
				"PsExec",
				"ReconShark",
				"Remote Desktop PassView",
				"SHARPEXT",
				"SWEETDROP",
				"SmallTiger",
				"SniffPass",
				"TODDLERSHARK",
				"TRANSLATEXT",
				"Troll Stealer",
				"TrollAgent",
				"VENOMBITE",
				"WebBrowserPassView",
				"xRAT"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434330,
	"ts_updated_at": 1775792260,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/5b522e8abe9cf28c0a33eb6961a8d7675ec8a6e2.pdf",
		"text": "https://archive.orkl.eu/5b522e8abe9cf28c0a33eb6961a8d7675ec8a6e2.txt",
		"img": "https://archive.orkl.eu/5b522e8abe9cf28c0a33eb6961a8d7675ec8a6e2.jpg"
	}
}