ESET researchers noticed a number of campaigns focusing on governmental establishments in Thailand, beginning in 2023. These assaults leveraged revamped variations of elements beforehand attributed by different researchers to the China-aligned superior persistent risk (APT) group Mustang Panda, and later, a brand new set of instruments that abuse service suppliers equivalent to Pastebin, Dropbox, OneDrive, and GitHub to execute instructions on compromised computer systems and exfiltrate delicate paperwork.
Primarily based on our findings, we determined to trace this exercise cluster because the work of a separate risk actor. The quite a few occurrences of the string [Bb]ectrl within the code of the group’s instruments impressed us to call it CeranaKeeper; it’s a wordplay between the phrases beekeeper and the bee species Apis Cerana, or the Asian honey bee.
Key factors of this blogpost:
- ESET researchers found a brand new China-aligned risk actor, CeranaKeeper, focusing on governmental establishments in Thailand. A few of its instruments have been beforehand attributed to Mustang Panda by different researchers.
- The group continually updates its backdoor to evade detection and diversifies its strategies to assist large knowledge exfiltration.
- CeranaKeeper abuses fashionable, legit cloud and file-sharing companies equivalent to Dropbox and OneDrive to implement customized backdoors and extraction instruments.
- The group makes use of GitHub’s pull request and difficulty remark options to create a stealthy reverse shell, leveraging GitHub, a well-liked on-line platform for sharing and collaborating on code, as a C&C server.
CeranaKeeper has been lively since no less than the start of 2022, primarily focusing on governmental entities in Asian international locations equivalent to Thailand, Myanmar, the Philippines, Japan, and Taiwan; we imagine it’s aligned with China’s pursuits. The group’s relentless hunt for knowledge is outstanding, with its attackers deploying a wide selection of instruments geared toward extracting as a lot info as doable from compromised networks. Within the operation we analyzed, the group turned compromised machines into replace servers, devised a novel method utilizing GitHub’s pull request and difficulty remark options to create a stealthy reverse shell, and deployed single-use harvesting elements when amassing whole file bushes.
We briefly launched CeranaKeeper within the ESET APT Exercise Report This fall 2023–Q1 2024, which was launched in Could 2024. On this blogpost, we describe these beforehand undocumented, customized instruments deployed by CeranaKeeper and share extra of our findings in regards to the operations of this risk actor.
We introduced a few of our findings about CeranaKeeper and the compromise in Thailand on the Virus Bulletin convention on October 2nd, 2024, and in our white paper, which you’ll learn in full right here. This month, Virus Bulletin may also publish our white paper about this matter on its web site.
Attribution
Whereas a few of CeranaKeeper’s actions had beforehand been attributed to Mustang Panda (aka Earth Preta or Stately Taurus) by Talos, Pattern Micro, and Palo Alto Networks Unit 42, we’ve got determined to trace this exercise cluster because the work of CeranaKeeper. We imagine CeranaKeeper makes use of the publicly documented toolset referred to as bespoke stagers (or TONESHELL), closely depends on the side-loading method, and makes use of a particular sequence of instructions to exfiltrate information from a compromised community. Moreover, we contemplate using political lures and PlugX elements to be the work of MustangPanda. Regardless of some similarities of their actions (related side-loading targets, archive format), we noticed distinct organizational and technical variations between the 2 teams, equivalent to variations of their toolsets, infrastructure, operational practices, and campaigns. We additionally famous variations in the best way the 2 teams accomplish related duties.
In its operations, CeranaKeeper deploys elements referred to as TONEINS, TONESHELL, and PUBLOAD, that are distinctive to the group. The group stands out for its creativity and adaptableness in its assaults, equivalent to utilizing revamped variations of the aforementioned elements and new instruments that abuse companies equivalent to Pastebin, Dropbox, OneDrive, and GitHub. We describe these instruments within the Toolset aiding large exfiltration part.
Moreover, the group left some metadata in its code that supplied us with insights into its improvement course of, additional solidifying our separation of the 2 teams and our attribution to CeranaKeeper. Each risk actors could depend on the identical third social gathering, equivalent to a provider of instruments used within the deployment part, which isn’t unusual amongst China-aligned teams, or have some degree of knowledge sharing, which might clarify the hyperlinks that we’ve got noticed. In our opinion, this can be a extra possible clarification than a single risk actor sustaining two fully separate units of instruments, infrastructure, operational practices, and campaigns.
Compromising machines in the identical community
The compromise vectors that CeranaKeeper used within the case we analyzed have but to be discovered. When the group obtained a foothold within the community of a Thai governmental establishment, in the midst of 2023, a compromised machine performed brute-force assaults in opposition to a website controller server within the native space community.
After gaining privileged entry, the attackers put in the TONESHELL backdoor, deployed a instrument to dump credentials, and used a legit Avast driver and a customized software to disable safety merchandise on the machine. From this compromised server, they used a distant administration console to deploy and execute their backdoor on different computer systems within the community. Moreover, CeranaKeeper used the compromised server to retailer updates for TONESHELL, turning it into an replace server.
The group deployed a brand new BAT script throughout the community, extending its attain to different machines in the identical area by exploiting the area controller to achieve area admin privileges. This enabled CeranaKeeper to maneuver to the following part of its operation and obtain the ultimate aim: large knowledge harvesting.
Toolset aiding large exfiltration
After deploying their TONESHELL backdoor and performing a number of lateral actions, it seems that the attackers discovered and chosen a number of compromised computer systems of enough curiosity to deploy beforehand undocumented, customized instruments. These help instruments have been used not solely to facilitate the exfiltration of paperwork to public storage companies but in addition to behave as various backdoors. The backdoors and exfiltration instruments we describe have been deployed to extremely focused machines solely.
WavyExfiller: A Python uploader abusing Dropbox and PixelDrain
The primary of a sequence of unknown elements we found in June 2023 is WavyExfiller, a Python bundle bundled into an executable utilizing PyInstaller and a direct Python implementation of the exfiltration technique described by Unit 42. We named this part WavyExfiller as a result of .wav extension of an area file that incorporates search masks for figuring out and compressing paperwork prepared for export. The PyInstaller-bundled executable is called SearchApp.exe (SHA-256: E7B6164B6EC7B7552C93713403507B531F625A8C64D36B60D660D66E82646696).
The module has three essential features: to retrieve an encrypted Dropbox token from a Pastebin web page (a web-based service for storing and sharing plain textual content knowledge), to create password-protected archives of paperwork present in customers’ directories, and to add these archives to Dropbox.
In October 2023, we noticed a variant (SHA-256: 451EE465675E674CEBE3C42ED41356AE2C972703E1DC7800A187426A6B34EFDC) saved beneath the title oneDrive.exe. Regardless of its title, this model makes use of the file-sharing service PixelDrain to exfiltrate the archived information. Identical to SearchApp.exe talked about above, this variant checks the C drive, which generally incorporates the working system, put in applications, and native customers’ paperwork. Moreover, oneDrive.exe makes an attempt to gather information from mapped drives, if any, starting from letter D to N (besides L) as illustrated in Determine 1, which can signify linked exterior storage gadgets like USBs and arduous drives, networked drives in an workplace atmosphere, or digital drives created by particular software program. This exhibits that CeranaKeeper stepped up its degree of greediness and tried reaching different potential or recognized sources of knowledge. Nevertheless, it’s unclear whether or not the exfiltration operation was profitable, as checking uploaded information on PixelDrain just isn’t doable by way of the uncovered API.

DropboxFlop: A Python backdoor abusing Dropbox
In October 2023, across the similar time that we discovered the PixelDrain variant, we found a brand new PyInstaller bundled executable with SHA-256 hash DAFAD19900FFF383C2790E017C958A1E92E84F7BB159A2A7136923B715A4C94F. Evidently CeranaKeeper created it primarily based on a publicly accessible venture referred to as Dropflop, which is a reverse shell with add and obtain capabilities. The compiled Python file is named dropboxflop.pyc. The backdoor retrieves an encrypted Dropbox token and is dependent upon information current within the distant Dropbox repository to execute instructions on the machine. It creates a novel folder regionally and generates a “heartbeat” by updating the distant file referred to as lasttime each 15 seconds. It additionally checks for a file named duties that, if discovered, is downloaded and parsed as a JSON file. There are two sorts of duties carried out: command execution and file add. As soon as accomplished, the backdoor sends the outcomes by updating the content material of the file output.
OneDoor: A C++ backdoor abusing OneDrive
A couple of days after deploying the Python backdoor DropboxFlop, CeranaKeeper returned with a statically linked C/C++ backdoor abusing OneDrive that we’ve got named OneDoor. The pattern (SHA-256: 3F81D1E70D9EE39C83B582AC3BCC1CDFE038F5DA31331CDBCD4FF1A2D15BB7C8) is called OneDrive.exe. The file mimics the legit executable from Microsoft, as proven within the properties view in Determine 2.

OneDoor behaves in a similar way to the DropboxFlop backdoor, however makes use of the OneDrive REST API of the Microsoft Graph API to obtain instructions and exfiltrate information.
OneDoor creates a log file and makes an attempt to entry a file named config.ini. If it’s not current, OneDoor makes use of a hardcoded buffer. The file or buffer begins with a key and an initialization vector, that are used to decrypt the remainder of the information utilizing AES-128 in CBC mode. The plaintext incorporates a URL, which the malware makes use of in an HTTP GET request. The response incorporates a OneDrive token, which is utilized in subsequent requests to Microsoft OneDrive.
OneDoor additionally retrieves the ID of a folder referred to as approot, which is used to retailer software knowledge.
Much like the config.ini file, the malware makes an attempt to entry a file named errors.log. If the file doesn’t exist, it makes use of a hardcoded buffer. The content material of the file or buffer is decrypted; the plaintext knowledge incorporates a 1024-bit RSA public key. A key-IV pair is generated, encrypted with RSA, and uploaded to the distant approot folder. This pair is used for encrypting and decrypting knowledge.
Lastly, the malware retrieves lists of information from two folders positioned on OneDrive, E and F. A thread is began for every listing, which downloads and decrypts the information. The information saved beneath the E folder include instructions to be executed, whereas those saved beneath the F folder include a listing of information to be uploaded. The outcomes of those operations are encrypted and saved in a 3rd OneDrive folder, D. The unique information are then deleted from OneDrive.
BingoShell: A Python backdoor abusing GitHub
We noticed the most recent specimen of the group’s exfiltration toolset in February 2024 and named it BingoShell due to the string bingo# used within the title of a GitHub pull request (PR) it creates. The analyzed pattern (SHA-256: 24E12B8B1255DF4E6619ED1A6AE1C75B17341EEF7418450E661B74B144570017) is a file named Replace.exe that makes use of a Microsoft Workplace brand as its icon, as noticed in Determine 3. In response to its PE compilation timestamp, apparently it was inbuilt late January 2024.

BingoShell is a backdoor written in Python that makes use of GitHub to regulate compromised machines. As soon as run, it makes use of a hardcoded token to entry a personal GitHub repository. In response to the preliminary commit of the primary department, the repository was in all probability created on January twenty fourth, 2024. BingoShell creates a brand new department within the repository and a corresponding pull request. The backdoor reads feedback on the newly created PR to obtain instructions to execute on the compromised machine, as illustrated in Determine 4.

This demonstrates a brand new covert method to leverage GitHub as a command and management (C&C) server, displaying the sophistication of the attackers, who cleaned up after themselves by closing pull requests and eradicating feedback from the repository.
Every new department created by BingoShell on the non-public GitHub repository ought to signify an entry to a compromised machine. As a result of we found 25 closed pull requests (proven in Determine 5), we might infer that CeranaKeeper had entry, by way of BingoShell, to 25 compromised machines.

Conclusion
The risk actor behind the assaults on the Thailand authorities, CeranaKeeper, appears significantly relentless, because the plethora of instruments and strategies the group makes use of retains evolving at a fast price. The operators write and rewrite their toolset as wanted by their operations and react relatively rapidly to maintain avoiding detection. This group’s aim is to reap as many information as doable and it develops particular elements to that finish. CeranaKeeper makes use of cloud and file-sharing companies for exfiltration and doubtless depends on the truth that site visitors to those fashionable companies would principally appear legit and be tougher to dam when it’s recognized.
All through our analysis, we have been in a position to set up sturdy connections between the beforehand documented and new toolsets and one widespread risk actor. The evaluate of the ways, strategies and procedures (TTPs), code, and infrastructure discrepancies leads us to imagine that monitoring CeranaKeeper and MustangPanda as two separate entities is important. Nevertheless, each China-aligned teams may very well be sharing info and a subset of instruments in a standard curiosity or by the identical third social gathering.
The focused marketing campaign we investigated gave us insights into CeranaKeeper’s operations and future campaigns will possible reveal extra, because the group’s quest for delicate knowledge continues.
For a extra detailed evaluation of the instruments deployed by CeranaKeeper, you possibly can entry the complete ESET Analysis white paper right here.
For any inquiries about our analysis printed on WeLiveSecurity, please contact us at threatintel@eset.com.ESET Analysis presents non-public APT intelligence reviews and knowledge feeds. For any inquiries about this service, go to the ESET Menace Intelligence web page.
IoCs
A complete listing of indicators of compromise (IoCs) and samples could be present in our GitHub repository.
Recordsdata
SHA-256 | Filename | Detection | Description |
B25C79BA507A256C9CA12A9BD34DEF6A |
EACore.dll |
Win32/Agent.VJO |
YK0130 reverse shell. |
E7B6164B6EC7B7552C93713403507B53 |
SearchApp.exe |
Python/Agent.AGT |
WavyExfiller. |
3F81D1E70D9EE39C83B582AC3BCC1CDF |
OneDrive.exe |
Win32/Agent.VKV |
OneDoor. |
DAFAD19900FFF383C2790E017C958A1E |
dropbox.exe |
Python/Agent.AQN |
PyInstaller DropFlop. |
24E12B8B1255DF4E6619ED1A6AE1C75B |
Replace.exe |
Python/Agent.AJJ |
BingoShell. |
451EE465675E674CEBE3C42ED41356AE |
oneDrive.exe |
Python/Agent.AGP |
WavyExfiller PixelDrain variant. |
E6AB24B826C034A6D9E152673B911592 |
MsOcrRes.orp |
Win32/Agent.AFWW |
TONESHELL sort B. |
6655C5686B9B0292CF5121FC6346341B |
avk.dll |
Win32/Agent.VJQ |
TONESHELL variant. |
B15BA83681C4D2C2716602615288B7E6 |
TurboActivate.dll |
Win32/Agent.AFWX |
TONESHELL loader. |
Community
IP | Area | Internet hosting supplier | First seen | Particulars |
104.21.81[.]233 172.67.165[.]197 |
www.toptipvideo[.]com | CLOUDFLARENET (AS13335) | 2023‑08‑14 | C&C server for the YK0130 reverse shell. |
103.245.165[.]237 | dljmp2p[.]com inly5sf[.]com |
Bangmod Enterprise administrator (AS58955) | 2023‑04‑21 | C&C servers for TONESHELL variants. |
103.27.202[.]185 | www.dl6yfsl[.]com | Bangmod Enterprise administrator (AS58955) | 2023‑08‑10 | C&C server for TONEINS variant. |
103.27.202[.]185 | www.uvfr4ep[.]com | Bangmod Enterprise administrator (AS58955) | 2023‑09‑22 | C&C server for TONEINS variant. |
MITRE ATT&CK strategies
This desk was constructed utilizing model 15 of the MITRE ATT&CK framework.
Tactic | ID | Identify | Description |
Useful resource Improvement | T1583.001 | Purchase Infrastructure: Domains | CeranaKeeper acquired domains for a few of its C&C servers. |
T1583.003 | Purchase Infrastructure: Digital Personal Server | CeranaKeeper acquired entry to a VPS to function a C&C server. | |
T1587.001 | Develop Capabilities: Malware | CeranaKeeper develops its personal elements. | |
T1585.003 | Set up Accounts: Cloud Accounts | CeranaKeeper acquired cloud accounts for exfiltration functions. | |
Execution | T1072 | Software program Deployment Instruments | CeranaKeeper abuses the ESET Distant Administration console to carry out lateral motion. |
Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | The YK0130 reverse shell establishes persistence by way of the registry Run key. |
T1574.002 | Hijack Execution Movement: DLL Facet-Loading | Most elements come as side-loaded libraries together with the legit program. | |
Protection Evasion | T1140 | Deobfuscate/Decode Recordsdata or Info | Configuration information utilized by the OneDrive backdoor are encrypted. |
T1036.005 | Masquerading: Match Professional Identify or Location | CeranaKeeper makes use of legit library names to mix in. | |
Assortment | T1560.001 | Archive Collected Knowledge: Archive by way of Utility | WavyExfiller makes use of WinRAR to compress collected knowledge. |
T1005 | Knowledge from Native System | WavyExfiller collects knowledge from the native drive (C:). | |
T1039 | Knowledge from Community Shared Drive | WavyExfiller collects knowledge from community shares. | |
T1074.001 | Knowledge Staged: Native Knowledge Staging | Collected knowledge is archived in a particular folder earlier than being uploaded. | |
Command and Management | T1071.001 | Utility Layer Protocol: Net Protocols | The completely different backdoors talk utilizing HTTP/S. |
T1132.002 | Knowledge Encoding: Non-Normal Encoding | The community protocol utilized by the YK0130 reverse shell employs customized, XOR-based encoding. | |
T1573.001 | Encrypted Channel: Symmetric Cryptography | AES-128 mode CBC is utilized by the OneDrive backdoor to encrypt community communication. | |
T1573.002 | Encrypted Channel: Uneven Cryptography | The generated key and IV for the OneDrive backdoor are encrypted by way of RSA. | |
T1090.001 | Proxy: Inner Proxy | One of many variants of the YK0130 reverse shell implements a reverse proxy. | |
T1102.002 | Net Service: Bidirectional Communication | OneDrive and Dropbox are used as C&C servers. | |
Exfiltration | T1567.002 | Exfiltration Over Net Service: Exfiltration to Cloud Storage | Collected knowledge are exfiltrated by way of cloud companies. |