Emerging Nation-State Tradecraft: Silver Dragon’s Multi-Stage Malware Operations

Summary :

Since mid-2024, a threat cluster known as Silver Dragon, associated with the APT41 ecosystem, has targeted government organizations across Europe and Southeast Asia. The campaign combines phishing operations and the exploitation of internet-exposed servers to deliver malware loaders that ultimately deploy the Cobalt Strike framework for persistence and post-exploitation activity.

Attackers employ stealth techniques, including service hijacking, DLL sideloading, and DNS tunnelling, while abusing legitimate cloud services such as Google Drive for covert command-and-control communication and data exfiltration. The campaign highlights the increasing sophistication of modern APT tradecraft and underscores the need for improved monitoring of cloud communications, suspicious system behavior, and multi-stage malware activity.

Technical Description :

The Silver Dragon campaign operates through a multi-stage infection chain designed to deliver malware discreetly and maintain persistent access within compromised environments. Initial access is achieved through phishing emails containing malicious LNK shortcut attachments or by exploiting vulnerable internet-facing services.

Once access is obtained, attackers distribute compressed packages containing batch scripts that deploy custom loaders such as MonikerLoader and BamboLoader. These loaders decrypt and execute additional payloads directly in memory, minimizing disk artifacts and reducing detection by traditional security tools.

The loaders ultimately deploy the Cobalt Strike post-exploitation framework using techniques such as DLL sideloading, service registration, and process injection into legitimate Windows processes to evade detection. Additionally, the attackers use a proprietary backdoor named GearDoor, which communicates with the attacker's infrastructure through the legitimate cloud platform Google Drive. This backdoor enables covert command execution, system reconnaissance, and data exfiltration while blending malicious traffic with legitimate cloud communications. The details and technicalities of the attack campaign are discussed further,

Delivery and Infection Chain:

The Silver Dragon threat group primarily gains initial access through phishing attacks and the exploitation of vulnerable public-facing systems. In phishing campaigns, victims receive emails containing malicious LNK shortcut attachments that execute PowerShell commands through cmd.exe, initiating the download and execution of additional payloads.

The campaign also distributes compressed archive packages, typically RAR files, containing batch scripts and malware loaders designed to infiltrate target systems. These techniques enable attackers to bypass traditional email filtering and endpoint defenses while launching multi-stage malware deployments. The Infection chain was identified as follows,

  • Attackers obtain initial access through phishing emails containing malicious LNK shortcut attachments or by exploiting vulnerable public-facing servers to deliver compressed archives containing malicious scripts.
  • The delivered archive commonly contains a batch script that launches a loader such as MonikerLoader, a. NET-based component that decrypts and executes additional payloads directly in memory.
  • In another variant, a loader known as BamboLoader is installed as a Windows service, where it decrypts and decompresses shellcode stored on disk before injecting it into legitimate Windows processes such as taskhost.exe to evade detection.
  • In phishing-based attacks, a legitimate executable vulnerable to DLL side-loading loads a malicious DLL that decrypts an encrypted payload and deploys Cobalt Strike on the compromised host.
  • After the system is compromised, attackers establish persistence and conduct post-exploitation activities while communicating with command-and-control infrastructure, including cloud platforms such as Google Drive for tasking and data exfiltration.

Technical Capabilities:

Silver Dragon demonstrates advanced technical capabilities designed to maintain covert and persistent access within compromised environments. The threat actors utilize multiple custom malware components, including loaders such as MonikerLoader and BamboLoader, which decrypt and execute payloads directly in memory to evade detection by conventional security solutions.

The attackers also employ techniques such as DLL sideloading, service registration, and process injection into legitimate Windows processes to conceal malicious operations within normal system activity. Following initial compromise, attackers deploy post-exploitation utilities including SilverScreen, which captures periodic screenshots of user activity, and SSHcmd, a. NET-based tool that enables remote command execution and file transfer.

The campaign further incorporates a custom backdoor named GearDoor, designed to maintain long-term control over infected systems. These backdoor supports system reconnaissance, directory enumeration, file manipulation, and command execution through scheduled tasks or command-line operations. Communication with attacker infrastructure occurs through covert command-and-control channels that leverage legitimate cloud services such as Google Drive. By blending malicious traffic with legitimate cloud activity, attackers reduce the likelihood of detection while enabling covert data exfiltration. These techniques indicate a highly capable threat actor capable of conducting prolonged cyber-espionage operations.

Attribution and Evolution:

Security researchers have attributed the Silver Dragon campaign to the broader APT41 ecosystem, a threat group known for conducting both cyber-espionage and financially motivated attacks. The attribution is based on overlapping tradecraft, similarities in malware tooling, and shared encryption and decryption techniques observed in previous APT41 campaigns.

The emergence of Silver Dragon reflects the continued evolution of APT41 operations, including the development of new custom loaders, improved command-and-control mechanisms, and expanded use of legitimate cloud services to conceal malicious activity.

Active Campaign and Geographic Spread:

The Silver Dragon campaign has primarily targeted government organizations in Europe and Southeast Asia, with significant phishing activity reported against entities in Uzbekistan. The threat actors appear to prioritize high-value targets, including government agencies and critical infrastructure organizations, likely for strategic intelligence collection.

The campaign demonstrates a wide operational reach and sustained focus on geopolitically sensitive regions, indicating coordinated and ongoing cyber-espionage activities.

Conclusion:

The Silver Dragon campaign illustrates the growing sophistication of cyber-espionage operations linked to APT41. By combining phishing attacks, custom malware loaders, stealth persistence techniques, and the abuse of legitimate cloud platforms such as Google Drive, the threat group demonstrates adaptability and operational maturity.

To mitigate the risks posed by such advanced threat actors, organizations, particularly government entities, should strengthen email security, monitor unusual service activity, and improve detection of anomalous cloud communication patterns.

Impact:

Successful Silver Dragon intrusions may result in significant operational and security consequences for targeted organizations. The attackers’ ability to maintain persistent access, monitor user activity, execute remote commands, and exfiltrate sensitive data poses serious risks to government networks and critical infrastructure systems.

Compromised environments may be used for long-term intelligence gathering, lateral movement across networks, and potential disruption of critical services.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Persistence, Execution, Defense Evasion, Command and Control, Collection
Technique Name Phishing
Exploitation of Public-Facing Applications
Command and Control over Web Services
Process Injection
DLL Side-Loading
Sub Technique Name Spearphishing Attachment (LNK files)
Service Execution
PowerShell Execution
Process Injection into legitimate Windows processes
Cloud-based C2
Attack Type Malware
Targeted Applications Windows operating systems, PowerShell, cmd.exe, Windows Services, legitimate executables vulnerable to DLL side-loading
Region Impacted Europe and Southeast Asia
Industry Impacted Government entities and public sector organizations
IOC’s Domains
zhydromet[.]com
ampolice[.]org
onedriveconsole[.]com
copilot-cloud[.]net
drivefrontend.pa-clients.workers[.]dev
revitpourtous[.]com
wikipedla[.]blog
protacik[.]com
oicm[.]org
mindssurpass[.]com
exchange4study[.]com
splunkds[.]com
bigflx[.]net

SHA-256 Hash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 NA

Recommended Actions:

  • Implement advanced email filtering and phishing awareness programs to detect and prevent malicious LNK attachments and spear-phishing attempts.
  • Regularly patch and secure public-facing servers to mitigate exploitation of known vulnerabilities.
  • Monitor the creation and execution of unusual Windows services and processes, particularly those associated with DLL side-loading or process injection.
  • Deploy endpoint detection solutions capable of identifying in-memory execution and abnormal PowerShell activity.
  • Monitor network traffic for suspicious communication with cloud storage services such as Google Drive and indicators of DNS tunneling activity.
  • Implement application allowlisting and restrict execution of untrusted or unknown binaries to prevent unauthorized loaders from running.
  • Conduct regular threat-hunting exercises focused on identifying Cobalt Strike beacons, custom loaders, and post-exploitation tools such as MonikerLoader, BamboLoader, and GearDoor.
  • Enforce multi-factor authentication and least-privilege access policies across critical systems to reduce the impact of potential intrusions.

Reference:

https://research.checkpoint.com/2026/silver-dragon-targets-organizations-in-southeast-asia-and-europe/