{"id":9082,"date":"2017-09-05T07:40:13","date_gmt":"2017-09-05T15:40:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/05\/news-2855\/"},"modified":"2017-09-05T07:40:13","modified_gmt":"2017-09-05T15:40:13","slug":"news-2855","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/05\/news-2855\/","title":{"rendered":"Rehashed RAT Used in APT Campaign Against Vietnamese Organizations"},"content":{"rendered":"<p><strong>Credit to Author: Jasper Manuel, Artem Semenchenko| Date: Tue, 05 Sep 2017 15:30:00 +0000<\/strong><\/p>\n<div class=\"entry\">\n<p>Recently, FortiGuard Labs came across several malicious documents that exploit the vulnerability CVE-2012-0158. To evade suspicion from the victim, these RTF files drop decoy documents containing politically themed texts about a variety of Vietnamese government-related information. It was believed in a recent <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/vietnam-lands-in-chinese-hackers\/\">report<\/a> that the hacking campaign where these documents were used was led by the Chinese hacking group 1937CN. The link to the group was found through malicious domains used as command and control servers by the attacker. In this blog, we will delve into the malware used in this campaign and will try to provide more clues as to the instigator of this campaign.<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC1.png\" style=\"width: 514px; height: 314px;\" \/><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC%20more\/APTC1b.png\" style=\"width: 454px; height: 315px;\" \/><\/p>\n<p align=\"center\"><em>Sample decoy documents<\/em><\/p>\n<p>When the documents are opened, they drop several files in one of the following folders:<\/p>\n<p style=\"margin-left:.5in;\">&nbsp;%AppData%MicrosoftCredentials<\/p>\n<p style=\"margin-left:.5in;\">%AppData%MicrosoftSystemCertificates<\/p>\n<p style=\"margin-left:.5in;\">%AppData%MicrosoftWindowsTemplates<\/p>\n<p>Some samples drop the following files:&nbsp;<\/p>\n<p style=\"margin-left:1.0in;\">Taskeng.exe &ndash; signed legitimate GoogleUpdate.exe version 1.3.33.5<\/p>\n<p style=\"margin-left:1.0in;\">Psisrndrx.ebd &ndash; encrypted blob containing malware file<\/p>\n<p style=\"margin-left:1.0in;\">Goopdate.dll &ndash; decrypter and loader of malware file<\/p>\n<p>Some drop the following files:<\/p>\n<p style=\"margin-left:.5in;\">SC&amp;Cfg.exe &ndash; signed legitimate McAfee AV application<\/p>\n<p style=\"margin-left:.5in;\">Vsodscpl.dll &ndash; contains the malware file<\/p>\n<p>Others drop the following files:<\/p>\n<p style=\"margin-left:.5in;\">Systemm.exe &#8211; signed legitimate GoogleUpdate.exe version 1.3.30.3<\/p>\n<p style=\"margin-left:.5in;\">Systemsfb.ebd &#8211; encrypted blob containing malware file<\/p>\n<p style=\"margin-left:.5in;\">Goopdate.dll &ndash; decrypter and loader of malware file<\/p>\n<p>Similar to other APT attacks, such as <a href=\"https:\/\/blog.fortinet.com\/2017\/04\/05\/in-depth-look-at-new-variant-of-monsoon-apt-backdoor-part-1\">MONSOON APT<\/a>, this APT uses DLL hijacking to evade the behavior monitoring technologies of security programs.<\/p>\n<h2>DLL Hijacking<\/h2>\n<p>DLL hijacking is a technique used by some APT malware in which instead of the legitimate application (.exe) loading the benign DLL, the application is tricked into loading a DLL containing malicious code. This technique is employed to evade Host Intrusion Prevention System (HIPS) of security programs that monitor the behaviors of executed files. Most HIPS tools whitelist signed or trusted files, thereby excluding malware loaded using DLL hijacking by signed files from behavior monitoring.<\/p>\n<p>In the context of this attack, taskeng.exe and SC&amp;Cfg.exe are signed legitimate applications; however, they are tricked into loading malware that are disguised as the legitimate Goopdate.dll and Vsodscpl.dll files.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC2.png\" style=\"width: 501px; height: 211px;\" \/><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC%20more\/APTC2b.png\" style=\"width: 457px; height: 210px;\" \/><\/p>\n<p align=\"center\"><em>Taskeng.exe and SC&amp;Cfg.exe file information<\/em><\/p>\n<p>Next, Taskeng.exe needs to load and import some functions from the original Goopdate.dll file; however, the Goopdate.dll was hijacked to contain malicious code, effectively changing the original code execution to execution of the malicious code.<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC3.png\" style=\"width: 418px; height: 68px;\" \/><\/p>\n<p align=\"center\"><em>Snippet from taskenge.exe that loads goopdate.dll<\/em><\/p>\n<p>In the same fashion, SC&amp;Cfg.exe imports the &ldquo;dll_wWinMain&rdquo; function from the original vsodscpl.dll, but this DLL was hijacked as well, and also contains malicious code.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC4.png\" style=\"width: 590px; height: 83px;\" \/><\/p>\n<p align=\"center\"><em>SC&amp;Cfg.exe import table containing import from vsodscpl.dll<\/em><\/p>\n<p>Once the malicious DLLs are loaded, the DLLs decrypt (from psisrndrx.ebd (1<sup>st<\/sup> case) or from its body (2<sup>nd<\/sup> case)) and load a Trojan downloader. The Trojan downloader is a DLL file. It is not dropped on disk but is only executed in memory. Also, the actual Trojan downloader in memory when dumped will not run. This is because the &lsquo;MZ&rsquo; in the IMAGE_DOS_HEADER, the DOS stub, and the &lsquo;PE&rsquo; signature were deliberately removed. This was done to prevent the dumped file from being analyzed properly in a debugger and decompiler. However, we can easily fix the dump by adding the &lsquo;MZ&rsquo;, a DOS stub, and the &lsquo;PE&rsquo; signature.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC5.png\" style=\"width: 300px; height: 361px;\" \/><\/p>\n<p align=\"center\"><em>Missing header items as anti-analysis<\/em><\/p>\n<p>This Trojan downloader downloads a RAT (Remote Access Trojan), which we will call &ldquo;NewCore&rdquo; RAT, from the following domains:<\/p>\n<p>web.thoitietvietnam.org<\/p>\n<p>dalat.dulichovietnam.net<\/p>\n<p>halong.dulichculao.com<\/p>\n<h2>Trojan Downloader<\/h2>\n<p>The Trojan downloader first creates an autostart registry entry so it runs whenever the machine is rebooted:<\/p>\n<p style=\"margin-left:.5in;\">HKLM\/HKCUSoftwareMicrosoftWindowsCurrentVersionRun<\/p>\n<p style=\"margin-left:.5in;\">Microsoft Windows Media = &ldquo;%AppData%MicrosoftCredentials<legitimate file=\"\">.exe&rdquo;<\/legitimate><\/p>\n<p>As an anti-VM, it checks whether the environment has the registry key:<\/p>\n<p>HKCRApplicationsVMwareHostOpen.exe<\/p>\n<p>Before it can download the NewCore RAT, it needs to send the following information to the C&amp;C server:<\/p>\n<ul>\n<li>OS version<\/li>\n<li>Processor speed<\/li>\n<li>Number of processors<\/li>\n<li>Physical memory size<\/li>\n<li>Computer name<\/li>\n<li>User name<\/li>\n<li>User privilege<\/li>\n<li>Computer IP address<\/li>\n<li>Volume serial number<\/li>\n<\/ul>\n<p>The above information is converted to its hex string representation, and then sent to the C&amp;C server via HTTP GET:<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC6.png\" style=\"width: 702px; height: 236px;\" \/><\/p>\n<p align=\"center\"><em>GET request to the C&amp;C server<\/em><\/p>\n<p>The response is an XOR encrypted data that includes the encrypted NewCore RAT.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC7.png\" style=\"width: 693px; height: 272px;\" \/><\/p>\n<p align=\"center\"><em>Response from the server<\/em><\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC8.png\" style=\"width: 587px; height: 445px;\" \/><\/p>\n<p align=\"center\"><em>XOR decryption of response from the C&amp;C server<\/em><\/p>\n<h2>NewCore Remote Access Trojan<\/h2>\n<p>We named this RAT &lsquo;NewCore&rsquo; after we found the project name used by the author, which is indicated on the following PDB file string:<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC9.png\" style=\"width: 976px; height: 26px;\" \/><\/p>\n<p align=\"center\"><em>Malware project name<\/em><\/p>\n<p>According to its compilation time stamp, this malware was compiled on March 16, 2017.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC10.png\" style=\"width: 429px; height: 51px;\" \/><\/p>\n<p align=\"center\"><em>Compilation time<\/em><\/p>\n<p>However, as of this writing, only a few Antivirus engines, including Fortinet detect this malware according to VirusTotal.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC%20more\/New%20image.png\" style=\"width: 550px; height: 116px;\" \/><\/p>\n<p align=\"center\"><em>VirusTotal positives<\/em><\/p>\n<p>This RAT is a DLL file. Its malicious routines are contained in its imported function &ldquo;ProcessTrans&rdquo;. However, executing the DLL without using the downloader will not work as the C&amp;C server string is not embedded in its body. When the downloader calls the function &ldquo;ProcessTrans&rdquo;, it supplies to the function the C&amp;C server string and a handle to the C&amp;C server internet session. In this case, Heuristic detection based on behavior will not work on the DLL alone.<\/p>\n<p>This RAT is capable of the following:<\/p>\n<ul>\n<li>Shutdown the machine<\/li>\n<li>Restart the machine<\/li>\n<li>Get disk list<\/li>\n<li>Get directory list<\/li>\n<li>Get file information<\/li>\n<li>Get disk information<\/li>\n<li>Rename files<\/li>\n<li>Copy files<\/li>\n<li>Delete files<\/li>\n<li>Execute files<\/li>\n<li>Search files<\/li>\n<li>Download files<\/li>\n<li>Upload files<\/li>\n<li>Screen monitoring<\/li>\n<li>Start command shell<\/li>\n<\/ul>\n<p align=\"center\">&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC%20more\/APTC12.png\" style=\"width: 336px; height: 110px;\" \/><\/p>\n<p align=\"center\"><em>Shutdown and restart machine commands<\/em><\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC%20more\/APTC13.png\" style=\"width: 488px; height: 350px;\" \/><\/p>\n<p align=\"center\"><em>File manager, monitor screen, command shell commands<\/em><\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC%20more\/APTC14.png\" style=\"width: 531px; height: 693px;\" \/><\/p>\n<p align=\"center\"><em>File manager subcommands<\/em><\/p>\n<p>Based on the strings found in its body, this malware may have been derived from the PcClient and PcCortr backdoors whose source codes are publicly available, especially on Chinese language coding forums. PcClient detections usually include PcCortr.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC%20more\/APTC15.png\" style=\"width: 864px; height: 43px;\" \/><\/p>\n<p align=\"center\"><em>Strings related to PcCortr modules<\/em><\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC%20more\/APTC16.png\" style=\"width: 600px; height: 684px;\" \/><\/p>\n<p align=\"center\"><em>PcClient and PcCortr source codes can be downloaded from Chinese coding forums<\/em><\/p>\n<p>PcClient was used in the past by some APT groups such as <a href=\"https:\/\/www.scmagazine.com\/palo-alto-network-researchers-discover-further-nitro-attacks\/article\/539986\/\">Nitro<\/a>, which were also linked to a China-based hacker.<\/p>\n<p>According to the PDB file string embedded in the NewCore RAT body, the creator of the project is someone using the handle &ldquo;hoogle168&rdquo;.<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC%20more\/APTC17.png\" style=\"width: 975px; height: 30px;\" \/><\/p>\n<p>We have little clue as to who this individual is, so we tried to look for information about this handle. Our investigation led us to several Chinese language forum pages. Looking at these forums, it seems like a user using the handle &ldquo;hoogle168&rdquo; is very active on a certain coding forums, and is proficient in C and VC++. This user even replied to a thread and gave advice on what to learn to develop remote control software. We don&rsquo;t know for sure if this person is the NewCore author.<\/p>\n<h2>Solution:<\/h2>\n<p>To prevent triggering this RTF exploit, it is important to apply the <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms12-027.aspx\">patches<\/a> released by Microsoft that cover CVE-2012-0158 vulnerability.<\/p>\n<p>Fortinet also covers detection for these threats as MSOffice\/Dropper!exploit.CVE20120158 for the malicious RTF files, and W32\/NewCore.A!tr.bdr for the payload.<\/p>\n<p>C&amp;C URLs were also blocked using <a href=\"https:\/\/fortiguard.com\/iprep?data=109.228.49.213\">Fortinet&#39;s FortiGuard Web Filtering<\/a>.<\/p>\n<h2>Conclusion<strong>:<\/strong><\/h2>\n<p>NewCore RAT may just be a rehashed PcClient RAT, but it proves to be effective in evading AV detection by using a combination of simple techniques such as DLL-hijacking, file-less execution of downloaded malware, and passing C&amp;C information as parameter from downloader to the downloaded file.<\/p>\n<p>As always, Fortiguard Labs will keep an eye on threats like NewCore to protect our customers against these threats.<\/p>\n<p><em>Thank you to Tien Phan for additional insights.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>-= FortiGuard Lion Team =-<\/p>\n<p>&nbsp;<\/p>\n<h2>IOCs:<\/h2>\n<p><strong>Lure<\/strong>:<\/p>\n<p>2a4e8ae006be3a5ed2327b6422c4c6f8f274cfa9385c4a540bc617bff6a0f060<\/p>\n<p>3faacef20002f9deb1305c43ea75b8422fd29a1559c0cf01cf1cee6a1b94fc0e<\/p>\n<p>5bdbf536e12c9150d15ae4af2d825ff2ec432d5147b0c3404c5d24655d9ebe52<\/p>\n<p>14b4d8f787d11c7d72f66231e80997ef6ffa1d868d9d8f964bea36871e1c2ff2<\/p>\n<p>637c156508949c881763c019d2dca7c912da9ec63f01e3d3ba604f31b36e52ab<\/p>\n<p>5573f6ec22026b0c00945eec177f04212492bb05c33b4b80f73c65ce7fe5119a<\/p>\n<p>00466938836129a634b573d2b57311200ab04aba7252cfbf6b77f435612ca6c6<\/p>\n<p>c375946ba8abee48948f79a89ea5b4f823d8287c2feb3515755b22ba5bd8849d<\/p>\n<p>f6a4bab7d5664d7802f1007daa04ae71e0e2b829cd06faa9b93a465546837eb4<\/p>\n<p>fabf4debacb7950d403a84f4af25c084d0b576783006d334052ebf7ea432196e<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Loader<\/strong>:<\/p>\n<p>9cebae97a067cd7c2be50d7fd8afe5e9cf935c11914a1ab5ff59e91c1e7e5fc4<\/p>\n<p>ea5b3320c5bbe2331fa3c0bd0adb3ec91f0aed97709e1b869b79f6a604ba002f<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Trojan Downloader<\/strong>:<\/p>\n<p>edbcc384b8ae0a2f52f239e2e599c3d2053f98cc1f4bc91548ec420bec063be6<\/p>\n<p>49efab1dedc6fffe5a8f980688a5ebefce1be3d0d180d5dd035f02ce396c9966<\/p>\n<p>df8475669a14a335c46c802f642dd5569c52f915093a680175c30cc9f28aacdb<\/p>\n<p>&nbsp;<\/p>\n<p><strong>NewCore RAT<\/strong>:<\/p>\n<p>37bd97779e854ea2fc43486ddb831a5acfd19cf89f06823c9fd3b20134cb1c35<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Command and Control Servers<\/strong>:<\/p>\n<p>web.thoitietvietnam.org<\/p>\n<p>dalat.dulichovietnam.net<\/p>\n<p>halong.dulichculao.com<\/p>\n<\/div<br \/><a href=\"https:\/\/blog.fortinet.com\/2017\/09\/05\/rehashed-rat-used-in-apt-campaign-against-vietnamese-organizations\" target=\"bwo\" >https:\/\/blog.fortinet.com\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/APTC\/APTC1.png\"\/><\/p>\n<p><strong>Credit to Author: Jasper Manuel, Artem Semenchenko| Date: Tue, 05 Sep 2017 15:30:00 +0000<\/strong><\/p>\n<p>Early last week, FortiGuard Labs came across several malicious documents that exploit the vulnerability CVE-2012-0158. To evade suspicion from the victim, these RTF files drop decoy documents containing politically themed texts about a variety of Vietnamese government-related information.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-9082","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9082"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9082\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9082"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}