Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. During the operation,
the malware was used to dox 400,000 members of Vietnam Airlines.
The payload, distributed disguised as antivirus, is a variant of Korplug RAT (aka PlugX) – a spyware with former associations with Chinese APT groups, and known from
targeted attacks at important institutions of various countries.
In this article we will describe the process of extracting the final payload out of it’s cover.
Analyzed samples
Set #1:
Execution flow:
McAfee.exe -> McUtil.dll -> McUtil.dll.mc -> payload (DLL)