The sample analysis of APT-C-27’s recent attack | 360 Total Security Blog Published: 2018-10-19 · Archived: 2026-04-05 14:01:26 UTC Learn more about 360 Total Security Background APT-C-27 is a group that has long been engaged in cyber attacks against Arab countries such as Syria. It mainly uses APK, PE, VBS, JS files as attack vectors, involving Android and Windows platforms, using social networks and spear phishing email to spread malicious payloads. The malicious sample captured by 360 CERT(360 Computer Emergency Readiness Team) is the Office phishing document with the embedded Package object. From the sample type, the attack was suspected to be delivered to the victim by means of a spear phishing email. The United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) issued a public letter embedding an important form to induce victims to execute Package objects to carry out attack payloads. Attack analysis From the sample captured by 360 CERT, the attack started with the Office phishing document containing the Package object. The entire attack chain consists of phishing documents, Dropper scripts, and backdoors. The bait file shows an official letter issued by UNRWA. After the victim executes the embedded Package object, another Word document <الذاتية السرية