404 — File still found By DCSO CyTec Blog Published: 2024-01-18 · Archived: 2026-04-05 16:54:05 UTC In early February 2022, we came across a tweet from ShadowChasing1 identifying a SideWinder-related word document which referenced a template URL. In this article, we share our insights from investigating the file and other infrastructure connected to it. https://twitter.com/ShadowChasing1/status/1490984172797984770 This blog was authored by Axel Wauer First Look The file mentioned in the tweet is named ‘Briefing on Ongoing Projects.docx’(eeeb99f94029fd366dcde7da2a75a849833c5f5932d8f1412a89ca15b9e9ebb7) and is available on VirusTotal and on our GitHub. Press enter or click to view image in full size https://medium.com/@DCSO_CyTec/404-file-still-found-d52c3834084c Page 1 of 13 Content of ‘Briefing on Ongoing Projects.docx’ as seen on VirusTotal. The document itself contains little information and appears empty aside from the address block. However, a deeper inspection of the document structure reveals that the document loads an RTF template from https://dgmp-paknavy.mod-pk[.]com/14325/1/10/2/0/0/0/m/files-5291bef6/file.rtf which we assume represents the next stage of the attack. At the time of our analysis, this file was not available under the given URL anymore, yet the domain still resolved to 185.255.17.46 . After unpacking the document structure, we could locate the suspicious URL under the path word/ _rels\document.xml.rels. It generally refers to relations and in this case aims to download a RTF template as shown in the code snippet below: # word/_rels\document.xml.rels /0/0/0/m/files-/file.rtf) which supports the assumption of a possible connection between them. We list the domains below. http://dgmp-paknavy.mod-pk[.]com/14325/1/10/2/0/0/0/m/files-5291bef6/file.rtfhttp://dgpr.paknvay-pk[ A quick check of the domains led to related posts attributing the domains to the same APT, shown in the list below. +-----------------------+---------------------------+ | Attribution source | Domains | +-----------------------+---------------------------+ | @_jsoo_ | bahariafoundation[.]live | +-----------------------+---------------------------+ | @uslss_etr | cvix[.]live | +-----------------------+---------------------------+ https://medium.com/@DCSO_CyTec/404-file-still-found-d52c3834084c Page 11 of 13 | Checkpoint Research | kpt-pk[.]net | +-----------------------+---------------------------+ | @ShadowChasing1 | ksew[.]org | +-----------------------+---------------------------+ | @ShadowChasing1 | ministry-pk[.]net | +-----------------------+---------------------------+ | @uslss_etr | mod-pk[.]com | +-----------------------+---------------------------+ | @JVPv5sIM3eFmGyi | moma-pk[.]org | +-----------------------+---------------------------+ | @uslss_etr | paknvay-pk[.]net | +-----------------------+---------------------------+ In conclusion, this placeholder file creates a relationship between several different attacks, supporting the attribution made by other researchers. In addition, we checked the validity period of the TLS certificates on crt.sh for the domains in question. The graphic below illustrates the validity periods of the relevant TLS certificates, and even though we can’t be sure when exactly the attacks were carried out, we can at least narrow down the time frame. Press enter or click to view image in full size Validity span of TLS certificates for each identified domain Conclusion A sample attributed to SideWinder was published on Twitter. We analysed the sample and followed related IoCs as far as possible. Along this analysis, we found related work verifying the file structure and attribution. We also noticed that different SideWinder samples downloaded the same nearly empty RTF file which we assume acts as placeholder file after the original payload was delivered. This placeholder file itself is not considered a default file which allowed us to identify related domains of this campaign. https://medium.com/@DCSO_CyTec/404-file-still-found-d52c3834084c Page 12 of 13 All extracted and deobfuscated files can be downloaded from our GitHub repository DCSO CyTec. IoCs We provide a MISP event on our GitHub. ### SHA256## Document from Tweet eeeb99f94029fd366dcde7da2a75a849833c5f5932d8f1412a89ca15b9e9ebb7## Placeholder RTF Template 1955c6914097477d5141f720c9e8fa44b4fe189e854da298d85090cbc338b35a## Malicious RTF Template 4e3c4ea383e6ed5c00672e08adabe24fc142cd05c86830a79c15c90412a2f588## Malicious embedded JavaScript c2809dcc935ed3c7923f1da67d1c5dddc4ece2353a4c0eab8c511a14fa7e04c1## Malicious embedded .Net file 95f99d5da860ece23154ddef0bb289797dc2bd711034ce39c1ac85b9305919cb## Documents linked to RTF placeholde cb933361cd6c26ca61c441a40da394a505086f572fd7e9bd425bf086adf50edc 6a00b6f20123258fb8db9ccb3e6b07947475da3d8e797cdcfe01ce8144139e38 146e2c51cd7c904e0eeb641daa6ee956e80b48b198b9d2a9fd9b92b68399f9d1 d3a0b7c5a1eafbf7d381b6ee064083496476163da5dfed53096fac36c2b30738 f09ed1c47f61e918fd67e66c342eb45476c6a5bb8367a24dbea63a1b8fd979d3 f765b0b6e4a34eb95c6f0ddf058bc88d5ef9ec2b11a5f3504d1673f4f69aceca 60017e193cfd0df017eb8d0cc5f4bfc49593d90430a3e89a287f6afb83672236### URLshttp://dgmp-paknavy.mod-pk[. http://dgpr.paknvay-pk[.]net/5330/1/1330/2/0/0/0/m/files-4d9d0395/file.rtf http://mohgovsg.bahariafoundation[.]live/5320/1/13/2/0/0/0/m/files-1ddf5195/file.rtf https://cabinet-gov-pk.ministry-pk[.]net/14300/1/1273/2/0/0/0/m/files-68ebf815/file.rtf https://careitservices.paknvay-pk[.]net/5359/1/4586/2/0/0/0/m/files-266ad911/file.rtf https://defencelk.cvix[.]live/3023/1/54082/2/0/0/0/m/files-0c31ed2d/file.rtf https://dgmp-paknavy.mod-pk[.]com/14325/1/10/2/0/0/0/m/files-5291bef6/file.rtf https://dgpr.paknvay-pk[.]net/5330/1/1330/2/0/0/0/m/files-4d9d0395/file.rtf https://mailaplf.cvix[.]live/2968/1/50390/2/0/0/0/m/files-7630e91a/file.rtf https://mohgovsg.bahariafoundation[.]live/5320/1/13/2/0/0/0/m/files-1ddf5195/file.rtf https://sppc.moma-pk[.]org/5281/1/4265/2/0/0/0/m/files-d2608a99/file.rtf https://srilankanavy.ksew[.]org/5471/1/1101/2/0/0/0/m/files-cd6e6dbd/file.rtf http://maritimepakistan.kpt-pk[.]net/5434/1/3694/2/0/0/0/m/files-ce32ed85/file.rtf https://maritimepakistan.kpt-pk[.]net/5434/1/3694/2/0/0/0/m/files-ce32ed85/file.rtf### Domainsbaharia cvix[.]live kpt-pk[.]net ksew[.]org ministry-pk[.]net mod-pk[.]com moma-pk[.]org paknvay-pk[.]net Source: https://medium.com/@DCSO_CyTec/404-file-still-found-d52c3834084c https://medium.com/@DCSO_CyTec/404-file-still-found-d52c3834084c Page 13 of 13