Crimson Palace Resurfaces: Chinese Cyberespionage Campaign Expands in Southeast Asia

Sophos X-Ops released a report detailing renewed cyberespionage efforts by what they assess with high confidence as a Chinese state-directed cyber operation.

Crimson Palace Resurfaces: Chinese Cyberespionage Campaign Expands in Southeast Asia
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (September 2024)

Introduction

On September 10, 2024, Sophos X-Ops released a report detailing renewed cyberespionage efforts by what they assess with high confidence as a Chinese state-directed cyber operation. The campaign, codenamed Operation Crimson Palace, has re-emerged, targeting multiple government and public service organizations across Southeast Asia.

Sophos X-Ops previously tracked three distinct security threat activity clusters (STACs) involved in this campaign—Cluster Alpha (STAC1248)Cluster Bravo (STAC1870), and Cluster Charlie (STAC1305)—from March to August 2023. All activity went dormant in late 2023, but recent telemetry shows a resumption of Cluster Charlie operations, now expanded across multiple sectors.

Sophos Managed Detection and Response (MDR) first observed suspicious activity in a prominent Southeast Asian government agency in early 2023, which led to the identification of three security clusters involved in the espionage campaign. Each cluster exhibited distinct tactics, tools, and procedures (TTPs), allowing Sophos to track their activities closely. After dormancy, Sophos observed Cluster Charlie's resurgence in late 2023, leveraging new tools and techniques, including a custom keylogger named TattleTale.

Report Overview

In the second phase of Crimson Palace, threat actors associated with Cluster Charlie employed several off-the-shelf tools and advanced malware to evade detection. To maintain persistence, the attackers adapted their tactics by using previously stolen credentials and deploying web shells on compromised Microsoft Exchange servers.

In late 2023, Sophos blocked Cluster Charlie's custom implants, which forced the group to pivot to new techniques:

  • Havoc C2 Framework: Used to support surveillance and control operations.
  • Cobalt Strike: Leveraged as part of their command and control (C2) infrastructure.
  • SharpHound: Deployed for Active Directory mapping, providing detailed insights into the target's infrastructure.

Attackers also sideloaded malicious DLLs via legitimate processes, a tactic that allowed them to remain undetected by endpoint protection solutions. They executed remote tasks to move laterally across networks and employed tactics such as scheduled tasks to maintain their foothold.

The renewed activity primarily impacted Southeast Asian government agencies and public service organizations. Sophos identified at least 11 new entities compromised during this phase, indicating the attackers' growing reach. Organizations with critical government functions were particularly targeted, raising concerns about the theft of sensitive data, including intelligence and login credentials.

Insights and Analysis

According to Sophos X-Ops, the main objective of these renewed attacks was to exfiltrate valuable intelligence. Cluster Charlie specifically focused on mapping the network environment and capturing login credentials. Their techniques suggest a systematic approach to establishing a long-term presence in the target networks.

Sophos advises organizations, especially those in government and critical sectors, to implement the following measures to protect against Crimson Palace and similar espionage campaigns:

  • Multi-factor Authentication (MFA): Reducing reliance on passwords, especially for sensitive systems.
  • Endpoint Detection and Response (EDR): Deploying advanced EDR solutions to detect unusual activities like sideloading or C2 communication.
  • Regular Network Audits: Conduct frequent internal audits to detect anomalies in network traffic or login patterns.
  • Patch Management: Ensuring all critical systems are updated regularly to prevent exploitation of known vulnerabilities.

The resurgence of Operation Crimson Palace demonstrates the evolving nature of state-sponsored espionage campaigns. Organizations in Southeast Asia and beyond must remain vigilant as attackers continue refining their tactics to evade detection and achieve their objectives. 

Indicators of Compromise (IOC)

IndicatorTypeDescription
58a7be39056c2084bbb4aec9843db732dfe115ec4ee0c7cc4cf8884621b5142dsha256Malicious File used in conjunction with cmdline containing '172.19.120[.]60 65211' and '178.128.221[.]202 443'
776d427a19d8389464f855b2f70e0ac11e896162a9f9b50bcb23f0f0aea5044fsha256Malicious DLL
430bf24c9a7843895cb266b440c1f911ae600a7e6b8f3885d1c000622da52b2bsha256Malicious DLL
a22b8ef40b8abe2bd7161f425484e82207f322fef1d0562de5bf98e2f642b477sha256EDR unhooking, benign version of ntdll.dll
cc19c785702eea660a1dd7cbf9e4fef80b41384e8bd6ce26b7229e0251f24272sha256SharpHound/BloodHound
e65645af3894ec55f0b55472302d288e860a10d97bc19b699facc400f778c4eesha256DonutLoader
fa7d4fb4b43e1672c7f4656cd4275c330c2e13aff8451d68e4f305e5e5aea395sha256Havoc
e5620b4b6371b786c72e830dc24012354642b7067bd5902da7073ce0421456b7sha256Malicious DLL sideloaded by swprv service
e5620b4b6371b786c72e830dc24012354642b7067bd5902da7073ce0421456b7sha256MSiSCSI payload
6d94049b24c6ac2373d3b517515fcaeeb392458342bbb5ad4c4316e124805b5bsha256Malicious DLL sideloaded by swi_update.exe
3cc8e21798462468d3bc05ddef35a558fe0dff268c433d42bd01385155084f53sha256Malicious File, no execution data
da9a53ff7486cf128e5ba80e66fcf3b1d8993d553bd9634ae8e90cbab31fd8dasha256Havoc
8b16a3a3047f0eb93ef2b55613a76a9f5f19506428895a5ffbb3c1c44780aad7sha256Havoc
75403191ee834075ab5334e92bda8aab267545a03ed5ed3508db36f21f4acf50sha256Havoc / Xiebro?
609fc96700f49f7fdfa71248e642a4dfcd8b3d35f6da3b7c2ce7daad25a844a9sha256Web shell
e4b7a1372233aef6d495743bb726fcd5037d4e90e043085498c21587335d36c7sha256Havoc ?
5f959f480a66a33d37d9a0ef6c8f7d0059625ca2a8ae9236b49b194733622655sha256Web shell
bdcedd81555c9c2eb9f4329626c27ec8c7b91a0f2a9f6e0c55dbcd3f99e82b5dsha256Shellcode loader
4995b91badc8f9bf549548a734d3c14fa2a1c21080743484028b5362440808a0sha256Shellcode Loader for Havoc
4dd0debf03eeb938fbaca1f1fd391523358c23cbf18959a149c29133cc3c9caesha256Shellcode Loader for Havoc
101bf8dcdd414f09ba46cdecbd96e8606c79b0e76b6a2ce040395e775cb4da86sha256Web shell
9ccf0e46f6aadbb20f4c269d8ac85cc9b4e6ce56bf226d45eda4347a20785c88sha256Web shell
1622ef497f2b767a43e25bcd9a9a629cbe7bed49cb27dc4f08fe0863730580d9sha256Havoc
5f959f480a66a33d37d9a0ef6c8f7d0059625ca2a8ae9236b49b194733622655sha256Web shell
101bf8dcdd414f09ba46cdecbd96e8606c79b0e76b6a2ce040395e775cb4da86sha256Web shell
5298c1aadac203285c8a95a4e3f62ec14b984729bf768a405c8028291e34fe1bsha256Invoke WMI
299b1e82f6941cc049a16c7854230fb37c97af32e2cf5cb335495f42446dc43fsha256Shellcode Loader for Havoc / DonutLoader?
c36173f28bfd99db86533d5fdb0ce4dd565488ca56d4b9df1997ee9201b3b704sha256Shellcode Loader for Havoc
8d54da0f807d771edb1197e463cdff8848651e14745c4c468386c31953c340ffsha256Shellcode Loader for Havoc
71ccc2c30dc43f20833c3e54d1fe86f8b68263d876461a3f7f7f8702e92cbe81sha256Alcatraz Git Project EDR Evasion
d86790104f59b89edbdb1478f320d4589155d465d4710bcb57ff015383eefb38sha256Shellcode loader
2892aa48e12e72ba25c4caa9471b41ce316624ff98ed79f56e3c6b3a51026504sha256DonutLoader
b67d50652be6be9997b4b0fe386964a89ed7df078577929aff0910f774b03996sha256Havoc (Shellcode loader?)
c6e1bf2b7ac0fd3c34761099d2ec17fccd0604e2e62e94f297943260d15368cesha256Shellcode loader
f30b04a9ebc95c50fdc116260068d4d8da8005104b6366c29d0f24dbbf798957sha256Tattletale malware ?
4600ddd81ccc18eca2b1bc272250b14217d866dee2a11e168b6122c1adb1ea64sha256Keylogger which saves the logged key to file C:\Users\public\log.dat
fb2e5baba8c69ddac2abc8b6881aaebd0578ac121363f0c3505294ed8c86f861sha256Shellcode loader (injects Cobalt Strike Reflective Loader into svchost.exe)
ff71eef0f1d7b26e1946cb700e9f41ccb920a5ace45c56ee9f80a9537070f120sha256Cobalt Strike payload
3414b510afa61ad74f4ec44b3838fa0fbb860b29b5b7173c8043656b49fbe14esha256C2 Implant
141.136.44.219ipHavoc C2
gsenergyspeedtest.comdomainCobalt Strike C2
45.77.46.245:443ip_portHavoc C2
191.96.53.132ipXiebroC2

MITRE ATT&CK Techniques

TacticTechniqueIDDescription
Command and ControlWeb ShellT1505.003Deployment of web shells to maintain access to compromised web servers.
ExecutionScheduled Task/JobT1053Use of scheduled tasks to execute malicious DLLs and maintain persistence.
DiscoverySystem Network Configuration DiscoveryT1016Reconnaissance of network infrastructure, including Active Directory mapping with SharpHound.
Defense EvasionDLL Side-LoadingT1073Use of DLL side-loading to evade detection by running malicious code via legitimate processes.
PersistenceValid AccountsT1078Leveraging stolen credentials to maintain access to compromised systems.
Lateral MovementRemote Services (RDP)T1021.001Use of Remote Desktop Protocol (RDP) for lateral movement between systems.
CollectionInput CaptureT1056Keylogger "TattleTale" used for capturing login credentials and system data.

References

Crimson Palace returns: New Tools, Tactics, and Targets
Chinese cyberespionage campaign renews efforts in multiple organizations in Southeast Asia, blending tactics and expanding efforts
IoCs/crimson_palace_2.csv at master · sophoslabs/IoCs
Sophos-originated indicators-of-compromise from published reports - sophoslabs/IoCs