Earth Kurma APT Campaign Targets Government and Telecom Sectors in Southeast Asia

Earth Kurma, a newly identified APT group, has been targeting government and telecom sectors in Southeast Asia since June 2024. The campaign involves sophisticated tactics including the use of custom malware, kernel-level rootkits, and cloud services like Dropbox and OneDrive for data exfiltration. Affected countries include the Philippines, Vietnam, Thailand, Malaysia, and other Asia countries. The attacks focus on espionage, credential theft, and maintaining persistent access. Notably, Earth Kurma’s activity dates back to 2020, using tools such as TESDAT and SIMPOBOXSPY.

Technical Description

The threat actors employ advanced custom malware, kernel-level rootkits, and abuse trusted cloud storage services like Dropbox and OneDrive for data exfiltration. Earth Kurma demonstrates adaptive toolsets and complex evasion techniques to maintain persistent, undetected access. Countries impacted include the Philippines, Vietnam, Thailand, Malaysia, and other Asia countries. The campaign poses significant business risks, including espionage, credential theft, and compromise of sensitive data.

Initial Access and Infection Workflow:

The exact initial access vectors remain unidentified, as analysis commenced several years after the earliest compromises. Earth Kurma employs a multi-stage infection chain that leverages various tools for reconnaissance and lateral movement, including NBTSCAN, LADON, FRPC, WMIHACKER, and ICMPinger. ICMPinger, a lightweight ICMP-based host discovery tool, is used to identify active systems and is promptly deleted after execution to reduce forensic traces. LADON, an open-source scanner, is delivered via a PyInstaller-packed reflective loader that uses unique XOR keys to evade detection while probing the network. WMIHACKER enables remote command execution over port 135, eliminating reliance on SMB, whereas traditional SMB-based commands like net use are utilized for malware deployment and network enumeration.

Lateral Propagation and Credential Theft:

Earth Kurma achieves lateral movement using a mix of open-source and custom tools. NBTSCAN and WMIHACKER facilitate network traversal, while a custom keylogger, KMLOG, captures credentials by logging keystrokes to %AppData%\Roaming\Microsoft\Windows\Libraries\infokey.zip. This file is masked with a fake ZIP (PK) header and employs XOR 0xDB encryption to obfuscate window titles, timestamps, and keystrokes. Malicious DLLs like vdmsc.dll are copied via SMB commands, and persistence is maintained by creating services such as “katech.” Tools like ICMPinger and LADON blend in with legitimate activity, while FRPC enables remote access, allowing stealthy movement across the victim network.

Persistent Access Through In-Memory Loaders:

It ensures persistence through in-memory loaders like DUNLOADER, TESDAT, and DMLOADER to evade disk-based detection. DUNLOADER loads payloads via rundll32.exe, while TESDAT uses SwitchToFiber to execute .dat files stealthily. DMLOADER decodes payloads in memory with functions like DoMain, and all loaders are hidden in user directories with randomized, legitimate-looking filenames to enhance stealth.

MORIYA and KRNRAT Rootkit Techniques:

It deploys rootkits MORIYA and KRNRAT to gain kernel-level control over compromised systems. MORIYA intercepts TCP traffic, concealing malicious payloads within TCP packets by checking six magic bytes through IOCTL code 0x222004. It injects AES-decrypted payloads from \SystemRoot\system32\drivers\{driver_name}.dat into svchost.exe using syscall enumeration to evade detection. KRNRAT, a flexible backdoor derived from open-source projects (e.g., Blackbone, Cronos-Rootkit), utilizes various IOCTL codes for process termination, file hiding, and network obfuscation. Its internal name is revealed through the PDB string N:\project\li\ThreeTools\KrnRat\code\x64\Debug\SmartFilter.pdb. The KRNRAT user-mode agent, a memory-resident stager, communicates with command-and-control servers while concealing processes and connections via additional IOCTL codes.

Document Collection and Exfiltration Strategies:

It exfiltrates specific document formats (.pdf, .doc, .xls, .ppt) using TESDAT, which collects files into a “tmp” folder. These files are archived with WinRAR, password-protected, and named after the host. SIMPOBOXSPY uploads the archives to Dropbox using access tokens, creating timestamped folders with extensions like “.z” or “.7z.” ODRIZ, an older tool, uploads files to OneDrive via refresh tokens. Exfiltrated archives are moved to the AD sysvol folder, leveraging DFSR to sync across domain controllers, enabling data extraction via any compromised server. PowerShell scripts optimize file collection by filtering those modified in the last 30 days.

Overlapping Tools and Attribution Difficulties:

Earth Kurma’s toolset shows similarities to those used in ToddyCat and Operation TunnelSnake campaigns. For example, SIMPOBOXSPY and its exfiltration scripts align with ToddyCat’s tools, while MORIYA shares similarities with a variant from Operation TunnelSnake. However, differences in attack patterns and the lack of unique tools make definitive attribution difficult. The generic nature of SIMPOBOXSPY hints at potential tool-sharing across APT groups, and the customized loader used in ToddyCat campaigns lacks execution logs linking it to TESDAT. As a result, analysts classify Earth Kurma as a unique APT group, noting its adaptive use of both open-source and custom tools.

Infrastructural Exploitation and Evasion Strategies:

It exploits legitimate infrastructure, including syssetup.dll and INF files (e.g., SmartFilter.inf), to deploy rootkits. By leveraging trusted cloud platforms like Dropbox and OneDrive for data exfiltration, the group avoids detection. To enhance stealth, they use randomly named loaders in user directories, reflective loading with unique XOR keys, and syscall-based execution (e.g., NtCreateThreadEx). The group also deletes tools like ICMPinger after use and employs memory-resident payloads, minimizing forensic traces and complicating detection and response efforts.

Conclusion:

In conclusion, Earth Kurma is a sophisticated APT group employing advanced tactics to target government and telecommunications sectors in Southeast Asia. The group uses a combination of custom tools, rootkits, and cloud services to maintain persistent access, exfiltrate sensitive data, and evade detection. By exploiting legitimate infrastructure and employing memory-resident payloads, Earth Kurma complicates detection and response efforts. Despite toolset overlaps with other APT groups, the group’s adaptive approach and unique attack patterns highlight its distinct nature and advanced capabilities.

Impact

Earth Kurma’s attacks target sensitive government and telecom data across Southeast Asia, facilitating long-term, undetected access. The group’s use of credential theft and data exfiltration through trusted cloud platforms poses significant risks to national security and operational continuity. Kernel-level rootkits establish persistent access, increasing the likelihood of espionage and data breaches.

IOC and Context Details

Topics Details
Tactic Name Exfiltration, Execution, Lateral Movement, Defense Evasion, Discovery, Credential Access, Collection
Technique Name Exfiltration: Exfiltration Over C2 Channel
Execution: Command and Scripting Interpreter
Lateral Movement: Remote Services
Defense Evasion: Process Injection, Obfuscated Files or Information, Modify Registry
Discovery: Network Service Discovery
Credential Access: Input Capture
Collection: Archive Collected Data
Sub Technique Name Execution – Command and Scripting Interpreter: PowerShell
Lateral Movement – Remote Services: SMB / Windows Admin Shares
Defense Evasion – Process Injection: Dynamic-link Library Injection
Defense Evasion – Obfuscated Files or Information: Embedded Payloads
Credential Access – Input Capture: Keylogging
Attack Type Malware, Cyberespionage
Targeted Applications Windows
Region Impacted Malaysia, Philippines, Vietnam, South Asia, East Asia
Industry Impacted Government, Telecommunications
IOC’s IP Addresses:
103[.]238[.]214[.]88
166[.]88[.]194[.]53
38[.]147[.]191[.]103
45[.]77[.]250[.]21
38[.]60[.]199[.]225
185[.]239[.]225[.]106
149[.]28[.]147[.]63

SHA-256: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SHA-1:
c4e8d3c5c18c5be05988d144ce5edbab5c50951d
9ad3ecabcba8ac55e6157b0e805b11e916c16d8b
136076ee6164f20feb4bb322fe0656bc755ebdaf
ebb90582a0589d355c7c770fb8a1235050b7344a
205ed479eda3e605985c5d7bd1ace5ee5d1141d0
5f6bcdb04184091c9bc198c175af394cb4303512

MD5:
8aa37b228a76dca1f3e02297d9bd6d52
b1fbdcf9057825ee2fe726798d376e5e
67165600be58fc451de2059d1d754353
1f276e6545d92a0607dee715b594ef8d
60554308955996496aa1e7c4e4399816
066729fdf942acf829bb00c82d0d98e3

Domains:
www[.]igtsadlb2ra[.]pw
www[.]vidsec[.]cc
www[.]ihyvcs5t[.]pw
www[.]dfsg3gfsga[.]space
CVE NA

Recommended Actions

  • Enforce Digital Driver Signing: Implement Group Policies to allow only digitally signed drivers, preventing the installation of malicious rootkits.
  • Strengthen Active Directory Security: Regularly audit sysvol directories and DFSR events to mitigate the risk of data exfiltration.
  • Limit SMB Protocol: Restrict SMB usage to prevent lateral movement and unauthorized file transfers within the network.
  • Deploy Endpoint Detection: Utilize solutions like Trend Vision One™ to detect and block malicious payloads and components.
  • Monitor Cloud Traffic: Actively monitor traffic to platforms like Dropbox and OneDrive for abnormal upload activities.
  • Improve Network Segmentation: Isolate critical systems to restrict lateral movement and reduce potential attack surface.
  • Conduct Regular Security Audits: Perform routine infrastructure scans to identify tools like ICMPinger and LADON.
  • Implement Keylogger Protection: Watch for suspicious files in the %Appdata% folder to detect keyloggers like KMLOG.

References

https://www.trendmicro.com/en_us/research/25/d/earth-kurma-apt-campaign.html