Self Assessment

APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware

Published On : 2025-06-21
Share :
APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware

Executive Summary

APT36, also known as Transparent Tribe, is a Pakistan-based cyber espionage group that has been actively targeting Indian defense personnel through highly sophisticated phishing campaigns. According to CYFIRMA’s findings, the group disseminates phishing emails containing malicious PDF attachments that are meticulously designed to resemble official government documents.

When a recipient opens one of these PDFs, it displays a blurred background along with a button that imitates the login interface of the National Informatics Centre (NIC). Clicking this button redirects a user to a fraudulent URL and initiates the download of a ZIP archive containing a malicious executable file, which is disguised as a legitimate application.

This campaign highlights APT36’s ongoing emphasis on credential theft and its strategic objective of establishing long-term infiltration within Indian defense networks. The operation highlights the urgent need for robust email security mechanisms, comprehensive user awareness programs, and proactive threat detection and monitoring systems to mitigate such targeted cyber threats.

Introduction

In today’s increasingly complex cyber threat landscape, nation-state actors continue to evolve their tactics to conduct targeted espionage. One such threat actor is “APT36” (AKA Transparent Tribe), a Pakistan-based cyber-espionage group, which has come under renewed scrutiny for its sophisticated campaigns aimed at infiltrating India’s defense infrastructure.

The group distributes malicious PDFs that mimic official documents and lead users to fake NIC login pages, ultimately downloading disguised malware with the aim of credential-harvesting for long-term access to sensitive networks. This highlights the urgent need for strong email security, user awareness training, and continuous threat monitoring.

Target Technologies Windows Operating System
Threat Type Phishing Campaign
Written In C/C++
File Types PE (Portable Executable)
Key Malware Identifiers PO-003443125.pdf, PO-003443125.pdf.7z
Observed First  2025-05-07
Impact Credential Harvesting, Data Exfiltration
MD5 Hashes PO-003443125.pdf “6ee3b0f4cb84e18751e7088043741e9a”
PO-003443125.pdf.7z“cdb9fb87dcb44d8f3040f4fb87d89508”
PO-003443125.pdf.exe “154f4cdcd4b822314293ad566d7255fa”

Phishing Campaign Analysis

In this campaign, the group distributes phishing emails containing an embedded PDF file named “PO-003443125.pdf”.

When opened, the document presents a blurred background (a deliberate tactic used to create a false sense of authenticity), a PDF icon, the file name “PO-003443125.pdf”, and a message stating: “This is a protected document. Click the button below to access content”. A prominently displayed button – labeled “Click to View Document” – lures the recipient to engage.

Upon interaction, the user is redirected to a malicious URL “hXXps://superprimeservices[.]com/nishat/order/PO-003443125.pdf.7z”, that initiates the download of a “PO-003443125.pdf.7z” archive.

The archive contains a malicious executable file named “PO-003443125.pdf.exe”, deceptively displaying a PDF icon to appear legitimate. This file is crafted to mislead users and when executed, can compromise the target system by enabling unauthorized access.

The domain in question was registered on October 23, 2024, with an expiration date of October 23, 2025, indicating its recent creation and potential use for short-term malicious purposes. It resolves to the IP address 104[.]21[.]0[.]118, which is hosted by Cloudflare Inc. in São Paulo, Brazil, and is currently shared with more than 655 other domains.

Technical Analysis of “PO-003443125.pdf.exe”

Malware Functionalities

Upon further investigation, it is revealed that the executable file is built by using a freeware scripting language.

Anti-debugging and anti-reversing:

The Windows API function “IsDebuggerPresent” is commonly utilized as an anti-analysis technique to determine whether the program is being executed within a debugging environment, such as x64dbg, WinDbg, or OllyDbg. If detected, the malware displays a critical message (“This is a third-party compiled script”) and then terminates the process.

Anti-VM

The malware uses IsWow64Process to detect if it’s running in a 32-bit process on a 64-bit system, a common sign of a virtualized or analysis environment.
If WOW64 is detected, it sets a flag and terminates execution to evade analysis.
This behavior indicates anti-VM and anti-sandbox techniques used to avoid detection.

Loading Malicious Script from Resources:

FindResourceExW locates a resource named “SCRIPT”, type 0x0A in its own module. It then loads and locks this resource, obtaining its size and data, which is written into a stream created via CreateStreamOnHGlobal.

Finally, it invokes method calls (likely COM or ActiveScript interfaces) to execute or parse the embedded script, enabling fileless or in-memory execution.

Process Creation and Execution:

The malware prepares STARTUPINFO and PROCESS_INFORMATION structures and uses CreateProcessW to spawn a new process using the command line passed in arg1, setting flags for normal priority and a default environment, indicating a stealthy launch. If successful, it closes the process handle, indicating executing payloads or commands.

Execution:

ShellExecuteW is used to trigger secondary stages of an attack.

The OpenWindowStationW, GetProcessWindowStation, SetProcessWindowStation, and OpenDesktopW functions are used to access and manipulate window stations and desktops, enabling the malware to interact with user sessions, inject code, evade detection, and maintain persistence within targeted environments.

Defense Evasion:

The Sleep function suspends execution temporarily. The malware leverages it to delay activities, evade analysis, and avoid detection.

The malware uses GetCurrentProcess and TerminateProcess for process control, privilege escalation, code injection, and anti-analysis.

The LoadLibraryExW function loads a DLL into a process address space, which attackers exploit for DLL side-loading to execute malicious code by loading unauthorized libraries through legitimate applications.

SetEnvironmentVariableA and GetEnvironmentVariableW are used by the malware to modify and access system environment variables, supporting persistence, configuration, and evasion techniques.

Persistence:

The GetStartupInfo function obtains process startup parameters. The malware uses it to adapt execution and enhance stealth.

Data Discovery:

GetDriveTypeW is used by attackers to identify removable or network drives as targets for their attacks.

FindNextFileExW is used to search the files in the directory for data exfiltration.

FileNextFilew is used to continue the files enumeration started by FindFirstFileExW

FileClose is used to release the handle from FindFirstFileExW.

Credential Access:

The GetForegroundWindow function is used to identify the currently active window, often to capture user activity.

The functions GetAsyncKeyState and GetKeyState are utilized to monitor and capture keystrokes in real time. The malware leverages these APIs to detect user input, facilitating keylogging activities and enabling the theft of sensitive data, such as credentials and confidential messages.

OpenClipboard, IsClipboardFormatAvailable, and GetClipboardData are used to access clipboard contents and steal sensitive information, such as copied passwords or cryptocurrency wallet addresses.

The program creates a concealed window with a specific class name and embeds an “edit” control as its child. Both the parent and child windows are hidden using standard window manipulation functions (e.g., ShowWindow with the SW_HIDE flag). This configuration allows the script to simulate user interactions in a covert manner, potentially evading basic keylogger or automation detection mechanisms by mimicking the behavior of legitimate applications.

Command and Control:

Malware utilizes the socket, connect, bind, listen, send, and closesocket functions to establish, manage, and terminate network communications. These functions facilitate command-and-control (C2) interactions, data exfiltration, and remote access operations.

Malware Behaviors

Anti-Analysis Behavior: The executable PO-003443125[.]pdf[.]exe exhibits anti-analysis behaviour by masquerading as a legitimate PDF document. This naming convention is intentionally misleading, designed to trick users and evade casual detection by analysts or basic security tools that may not display full file extensions. Additionally, spawning a legitimate-looking Windows process (svchost.exe) as a child can be an attempt to blend into normal system activity and avoid suspicion during manual inspection or automated monitoring.

Process Activity: The process tree shows PO-003443125[.]pdf[.]exe as a parent process launching svchost.exe as a child. This is anomalous, as svchost.exe is typically started by the Windows operating system, not by user-launched applications. The parent process is consuming 100% of a CPU core, which may indicate resource-intensive malicious behavior such as crypto mining, keylogging, or network beaconing. This irregular activity pattern is a strong indicator of potential malware execution.

Obfuscation: The file uses a double extension (.pdf.exe), a classic obfuscation technique to appear benign. This approach leverages the common user setting in Windows that hides known file extensions, thereby displaying the file deceptively as a harmless PDF. This technique is frequently used to bypass user scrutiny and simple file-type filters, increasing the chances of successful execution.

Credential and Data Theft: The malware targets browser data cookies, saved credentials, form inputs, email client credentials, and system clipboard contents. It employs form-grabbing techniques, keylogging via API hooks, and clipboard surveillance to exfiltrate sensitive data before it is encrypted or masked by legitimate applications.

Network Communication: DNS queries to multiple low-reputation and malicious domains, many using suspicious TLDs like .xyz, .buzz, .ru, and .sbs, are observed.

Encrypted HTTP(S) communication with C2 servers is detected, with infrastructure hosted on major CDN providers (e.g., Cloudflare, AWS), likely for concealment and delivery resilience.

MITRE ATT&CK Framework

MITRE MAPPING
Tactic ID Technique Name
Initial Access T1566 Phishing
T1566.001 Spear phishing Attachment
Execution T1203 Exploitation for Client Execution
T1059 Command and Scripting Interpreter
Persistence 1542 Pre-OS Boot
T1542.003 Bootkit
T1574 Hijack Execution Flow
T1574.002 DLL Side-Loading
T1112 Modify Registry
T1547 Boot or Logon AutoStart Execution
T1547.009 Shortcut Modification
Privilege Escalation T1055 Process Injection
T1574 Hijack Execution Flow
T1574.002 DLL Side-Loading
T1134 Access Token Manipulation
T1134.001 Token Impersonation/ Theft
T1547 Boot or Logon AutoStart Execution
T1547.009 Shortcut Modification
Defense Evasion T1014 Rootkit
T1036 Masquerading
T1055 Process Injection
T1542 Pre-OS Boot
T1542.003 Bootkit
T1564 Hide Artifacts
T1564.001 Hidden Files and Directories
T1564.003 Hidden Window
T1497 Virtualization/Sandbox Evasion
T1562 Impair Defenses
T1562.001 Disable or Modify Tools
T1027 Obfuscated Files of Information
T1027.002 Software Packing
T1112 Modify Registry
T1134 Access Token Manipulation
T1134.001 Token Impersonation/ Theft
T1222 Files and Directory Permission Modification
T1497.002 User Activity Based Checks
T1574 Hijack Execution Flow
T1574.002 DLL Side-Loading
Credential Access T1003 OS Credential Dumping
T1056 Input Capture
T1056.001 Keylogging
Discovery T1012 Query Registry
T1057 Process Discovery
T1083 Files and Directory Discovery
T1010 Application Window Discovery
T1082 System Information Discovery
T1497 Virtualization/Sandbox Evasion
T1518 Software Discovery
T1518.001 Security Software Discovery
T1016 System Network Configuration Discovery
T1018 Remote System Discovery
T1614 System Location Discovery
T1033 System Owner/User Discovery
T1087 Account Discovery
T1497.002 User Activity Based Checks
T1614.001 System Language Discovery
Collection T1005 Data from Local System
T1114 Email Collection
T1057 Input Capture
T1056.001 Keylogging
T1113 Screen Capture
T1115 Clipboard Data
T1185 Browser Session Hijacking
Command and control T1071 Application Layer Protocol
T1095 Non-Application Layer Protocol
T1573 Encrypted Channel
T1105 Ingress Tool Transfer
Impact T1485 Data Destruction
T1496 Resource Hijacking
T1529 System Shutdown/Reboot

Conclusion

APT36 poses a significant and ongoing cyber threat to national security, specifically targeting Indian defense infrastructure. The group’s use of advanced phishing tactics and credential theft exemplifies the evolving sophistication of modern cyber espionage. Addressing this challenge requires the implementation of a comprehensive, multi-layered cybersecurity framework, encompassing robust email security measures, continuous user education, and vigilant threat detection and response capabilities.

Recommendations

Based on the detailed analysis of the APT36 campaign targeting Indian defense personnel through phishing emails and disguised malware, CYFIRMA recommends the following recommendations and mitigation strategies are specifically tailored for the Indian defense sector:

Enhance Email Security Infrastructure

  • Deploy Government-Grade Email Security Solutions: Use advanced threat protection for government communication platforms (e.g., NIC mail) that scans for embedded malware in PDF, .7z, and .exe file formats.
  • Strict Attachment Handling Policies: Block or quarantine emails with suspicious file types (e.g., .pdf.7z, .exe with spoofed icons).
  • Implement Email Authentication Protocols: Enforce DMARC, SPF, and DKIM on official defense email domains to prevent spoofing and impersonation by APT36.

User Awareness and Training

  • Mandatory Cyber Hygiene Training: Conduct regular, mandatory training sessions for all personnel—military and civilian—on identifying phishing attempts, especially those mimicking official NIC documents.
  • Simulated Phishing Exercises: Periodically run red team exercises with phishing simulations using formats and techniques like those used by APT36 (e.g., fake protected PDFs).
  • Clear Reporting Protocols: Establish easy-to-use reporting channels for suspected phishing emails and unusual activity.

Network and Endpoint Security

  • Endpoint Detection and Response (EDR): Deploy EDR solutions on all defense endpoints to detect and respond to file-based threats such as:
  • PO-003443125.pdf – MD5: 6ee3b0f4cb84e18751e7088043741e9a
  • PO-003443125.pdf.7z – MD5: cdb9fb87dcb44d8f3040f4fb87d89508
  • PO-003443125.pdf.exe – MD5: 154f4cdcd4b822314293ad566d7255fa
  • Block Malicious Domains and URL: hXXps://superprimeservices[.]com/nishat/order/PO-003443125[.]df[.]7z

Access Control and Authentication

  • Mandate Multi-Factor Authentication (MFA): Enforce MFA for all access to sensitive defense networks and NIC systems, reducing the effectiveness of stolen credentials.
  • Regular Password Rotation and Audits: Implement strict password policies and periodic credential audits to detect misuse.

Infrastructure and Threat Intelligence Monitoring

  • Monitor Cloudflare-Hosted Traffic: Closely inspect defense-related network logs for connections to newly registered Cloudflare-hosted domains—APT36 frequently uses this provider to mask infrastructure.
  • Integrate Threat Feeds: Subscribe to real-time intelligence on APT36 and other regional threats to proactively block indicators of compromise (IOCs).

Incident Response Preparedness

  • Establish Sector-Specific IR Teams: Form dedicated cyber incident response teams within defense units trained on APT36 TTPs.
  • Run Tabletop and Live Drills: Regularly test defense units’ readiness against phishing campaigns and post-compromise activities like credential harvesting or lateral movement.

Stay updated with CYFIRMA’s threat intelligence sharing platform to effectively detect emerging TTPs, enhance situational awareness, and enable timely mitigation of threats relevant to your industry and region.

Leverage YARA rules and Indicators of Compromise (IOCs) provided by CYFIRMA to enhance the detection of malicious files and behavior through file integrity monitoring and behavioral analysis. Regularly update them on your SIEM platform.

Indicators of Compromise

Kindly refer to the IOCs section to exercise controls on your security systems.

S.No Indicator Remarks
1 f03ac870cb91c00b51ddf29b6028d9ddf42477970eafa7c556e3a3d74ada25c9 Block
2 55b7e20e42b57a32db29ea3f65d0fd2b2858aaeb9307b0ebbcdad1b0fcfd8059 Block
3 55972edf001fd5afb1045bd96da835841c39fec4e3d47643e6a5dd793c904332 Block
4 SuperPrimeServices[.]com Block
5 Advising-Receipts[.]com Block
6 FunDay24[.]ru Block
7 slotgacorterbaru[.]xyz Monitor
8 servisyeni[.]xyz Monitor
9 chillchad[.]xyz Monitor
10 ggpoker[.]xyz Monitor
11 boldcatchpoint[.]shop Monitor
12 zhangthird[.]shop Monitor
13 vipwin[.]buzz Monitor
14 wholly-well[.]info Monitor
15 rapio[.]site Monitor
16 55cc[.]info Monitor
17 megasofteware[.]net Monitor
18 worrr19[.]sbs Monitor
19 kp85[.]cyou Monitor
20 mczacji[.]top Monitor
21 59292406[.]xyz Monitor
22 76[.]223[.]54[.]146 Monitor
23 188[.]114[.]97[.]7 Monitor
24 13[.]248[.]169[.]48 Monitor
25 84[.]32[.]84[.]32 Monitor
26 217[.]114[.]10[.]11 Monitor
27 207[.]244[.]126[.]106 Monitor
28 172[.]67[.]148[.]140 Monitor
29 198[.]252[.]111[.]31 Monitor
30 15[.]197[.]148[.]33 Monitor
31 162[.]254[.]38[.]217 Monitor
32 104[.]21[.]41[.]144 Monitor

YARA Rule

rule APT36_IOCs_Indicators
{
meta:
author = “Cyfirma Research”
description = “Detects known APT36-related indicators (hashes, IP, domains)”
date = “2025-06-08”
threat_group = “APT36 / Transparent Tribe”

strings:
// SHA256 file hashes (can be used for memory or file scan)
$hash1 = “f03ac870cb91c00b51ddf29b6028d9ddf42477970eafa7c556e3a3d74ada25c9”
$hash2 = “55b7e20e42b57a32db29ea3f65d0fd2b2858aaeb9307b0ebbcdad1b0fcfd8059”
$hash3 = “55972edf001fd5afb1045bd96da835841c39fec4e3d47643e6a5dd793c904332”

// Domains used by APT36
$domain1 = “SuperPrimeServices.com”
$domain2 = “Advising-Receipts.com”
$domain3 = “FunDay24.ru”
$domain4 = “slotgacorterbaru.xyz”
$domain5 = “servisyeni.xyz”
$domain6 = “chillchad.xyz”
$domain7 = “ggpoker.xyz”
$domain8 = “boldcatchpoint.shop”
$domain9 = “zhangthird.shop”
$domain10 = “vipwin.buzz”
$domain11 = “wholly-well.info”
$domain12 = “rapio.site”
$domain13 = “55cc.info”
$domain14 = “megasofteware.net”
$domain15 = “worrr19.sbs”
$domain16 = “kp85.cyou”
$domain17 = “mczacji.top”
$domain18 = “59292406.xyz”

// IPs used by APT36
$ip1 = “76.223.54.146”
$ip2= “188.114.97.7”
$ip3= “13.248.169.48”
$ip4= “84.32.84.32”
$ip5= “217.114.10.11”
$ip6= “207.244.126.106”
$ip7= “172.67.148.140”
$ip8= “198.252.111.31”
$ip9= “15.197.148.33”
$ip10= “162.254.38.217”
$ip11= “104.21.41.144”
condition:
any of ($hash*) or any of ($domain*) or any of ($ip*)
}