Chinese language hacking group Aoqin Dragon quietly spied orgs for a decade


A beforehand unknown Chinese language-speaking menace actor has been found by menace analysts SentinelLabs who have been capable of hyperlink it to malicious exercise going way back to 2013.

Named Aoqin Dragon, the hacking group is concentrated on cyber-espionage, focusing on authorities, schooling, and telecommunication organizations primarily based in Singapore, Hong Kong, Vietnam, Cambodia, and Australia.

The menace actor’s methods have developed all through the years, however some techniques and ideas stay unchanged.

Intrusion and an infection techniques

Aoqin Dragon has employed three distinct an infection chains because it was first noticed, in accordance with SentinelLabs. The earliest, used between 2012 and 2015, entails Microsoft Workplace paperwork that exploit recognized vulnerabilities like CVE-2012-0158 and CVE-2010-3333.

This tactic was noticed by FireEye in 2014 in a spear-phishing marketing campaign coordinated by the Chinese language-backed Naikon APT group, focusing on an APAC authorities entity and a US assume tank.

The second an infection methodology is masking malicious executables with pretend anti-virus icons, tricking the customers into launching them, and activating a malware dropper on their units.

From 2018 till now, Aoqin Dragon has turned to utilizing a detachable disk shortcut file that, when clicked, performs DLL hijacking and hundreds an encrypted backdoor payload.

The malware runs underneath the title “Evernote Tray Utility” and executes upon system begin. If the loader detects detachable units, it additionally copies the payload to contaminate different units on the goal’s community.

Most recent infection chain used by Aoqin Dragon
Most up-to-date an infection chain utilized by Aoqin Dragon (SentinelLabs)

Aoqin Dragon’s toolset

SentinelLabs has recognized two totally different backdoors utilized by the actual menace group, Mongall and a modified model of Heyoka. Each are DLLs which can be injected into reminiscence, decrypted, and executed.

Mongall has been underneath growth since at the least 2013, and up to date variations function an upgraded encryption protocol and Themida wrapping designed to guard it in opposition to reverse engineering.

Its main objective is to profile the host and ship the small print to the C2 server utilizing an encrypted channel, nevertheless it’s additionally able to performing file actions and executing shell.

The opposite backdoor, Heyoka, is an open-source exfiltration instrument that makes use of spoofed DNS requests to create a bidirectional communication tunnel.

They use this instrument when copying recordsdata from compromised units to make it tougher for defenders to detect the group’s information theft exercise.

Heyoka mods (left) and source code (right)
Heyoka mods (left) and supply code (proper) (SentinelLabs)

Aoqin Dragon’s malware builders have modified Heyoka to create a customized backdoor with assist for the next instructions:

  • open a shell
  • get host drive data
  • search file operate
  • enter information in an exit file
  • create a file
  • create a course of
  • get all course of data on this host
  • kill course of
  • create a folder
  • delete file or folder

The exfil instrument additionally comes with two hardcoded command-and-control (C2) server addresses for redundancy, additionally utilized by Mongall, so there’s an overlap within the group’s main infrastructure.

“Based mostly on our evaluation of the targets, infrastructure and malware construction of Aoqin Dragon campaigns, we assess with average confidence the menace actor is a small Chinese language-speaking group with potential affiliation to the Naikon APT group, along with UNC94,” SentinelLabs mentioned.


Aoqin Dragon managed to remain within the shadows for a decade, with solely components of its operation surfacing in older reviews [PDF] by cybersecurity companies.

The group has achieved this by repeatedly evolving its methods and altering techniques, which is able to doubtless occur once more following the publicity it received after SentinelLabs’ report.

Contemplating that its actions align with Chinese language authorities political pursuits, it is virtually sure that Aoqin Dragon will proceed its cyber-espionage operations, enhancing its detection avoidance and switching to new evasion techniques.

Recent Articles


Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Stay on op - Ge the daily news in your inbox