Task-specific Atlas Agents investigate threats at machine speed with full transparency, expert validation, and explainable outcomes you can trust.
Atlas Extended Detection and ResponseOpen XDR with Agentic AI & machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Atlas User ExperienceSee what our SOC sees, review investigations, and see how we are protecting your business.
Atlas Platform IntegrationsSeamless integrations and threat investigation that adapts to your tools and evolves with your business.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Threat Response Unit (TRU)Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Cyber Resilience TeamExtend your team capabilities and prevent business disruption with expertise from eSentire.
Response and RemediationWe balance automated blocks with rapid human-led investigations to manage threats.
Combine AI-driven security operations, multi-signal attack surface coverage and 24/7 Elite Threat Hunters to help you take your security program to the next level.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level eSentire MDR
Next Level eSentire MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Identity ResponseStop identity-based cyberattacks.
Zero Day AttacksDetect and respond to zero-day exploits.
Cybersecurity ComplianceMeet regulatory compliance mandates.
Third-Party RiskDefend third-party and supply chain risk.
Cloud MisconfigurationEnd misconfigurations and policy violations.
Cyber RiskAdopt a risk-based security approach.
Mid-Market SecurityMid-market security essentials to prioritize.
Sensitive Data SecurityProtect your most sensitive data.
Cyber InsuranceMeet insurability requirements with MDR.
Cyber Threat IntelligenceOperationalize cyber threat intelligence.
Security LeadershipBuild a proven security program.
A critical authentication bypass vulnerability, CVE-2025-59718 (CVSS: 9.8), affecting multiple Fortinet products including FortiOS, FortiWeb, FortiProxy, and FortiSwitchManage, is currently…
On January 21st, 2026, Cisco published an advisory for CVE-2026-20045 (CVSS: 8.2), a zero-day Remote Code Execution (RCE) vulnerability. The following Cisco products are impacted:Cisco…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
About Us Leadership Careers Event Calendar → Newsroom → Aston Villa Football Club →We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Search our site
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
In early December 2025, the eSentire Threat Response Unit (TRU) identified an ongoing campaign deploying a sophisticated, multi-stage backdoor for the likely purpose of long-term espionage.
The campaign targets residents of India with phishing emails that impersonate the Income Tax Department of India, luring victims into downloading a malicious archive. The threat actor's primary objective is to gain persistent, elevated access to the victim's machine for continuous monitoring of user activities, file operations, and exfiltration of sensitive information.
The infection chain demonstrates a high level of sophistication, beginning with a DLL side-loading technique where a legitimate, signed Microsoft application is used to load a malicious DLL. This initial loader is equipped with extensive anti-debugging and anti-analysis checks to thwart inspection.
Upon successfully passing these checks, the malware contacts a Command-and-Control (C2) server to download a packed shellcode. This second stage unpacks itself in memory and employs two key methods for privilege escalation and defense evasion:
A key feature of this malware is its specific targeting of Avast Free Antivirus. The unpacked DLL is identified as a variant of the Blackmoon malware family. When Avast is detected, the malware uses automated mouse simulation to navigate Avast's interface and add malicious files to the antivirus exclusion list, effectively whitelisting them to bypass detection.
The next stage of the attack deploys a custom toolkit that establishes permanent access. This toolkit uses a collection of batch scripts to weaken system security and installs a core component as a Windows service, configuring it to run even in Safe Mode. This ensures the backdoor remains active and resilient, allowing the threat actor to conduct spying activities undetected.
The final stage of the attack deploys the SyncFuture TSM (Terminal Security Management System), a commercial data security product developed by Nanjing Zhongke Huasai Technology Co., Ltd in China. While marketed as a legitimate enterprise tool, it is repurposed in this campaign as a powerful, all-in-one espionage framework. By deploying this system as their final payload, the threat actors establish resilient persistence and gain a rich feature set to monitor victim activity and centrally manage the theft of sensitive information.
eSentire's Threat Response Unit tracks this activity as "SyncFuture Espionage campaign" based on the abuse of SyncFuture/Yangtu enterprise software, the extensive use of valid code-signing certificates spanning 2019-2024, and the sophisticated multi-stage infection chain targeting Indian entities.
The campaign demonstrates characteristics consistent with advanced persistent threat (APT) operations focused on long-term espionage rather than financial gain.
eSentire has observed targeted attacks on residents of India via spam emails sent by Sendgrid's email delivery service, with varying sender domains impersonating "भारत सरकार / Government of India" Income Tax Notice. The Subjects of the emails were "कर अनुपालन की कमी और दंड सूचना" (Translation - "Tax Compliance Deficiency and Penalty Notice") as shown below.
Despite Microsoft Defender for O365 successfully blocking delivery of the phishing emails, we were able to obtain the phishing lure (illustrated below). The lure featured a "Download Documents" link using the shortened URL "https://surl[.]li/wuvdwi" that redirected victims to a malicious file named "Inspection.zip" hosted on "gfmqvip[.]vip".
The threat actor's use of URL shortening techniques suggests an attempt to evade detection.
In the process of searching for similar campaigns, we identified the following list of IP addresses and associated websites:
Our investigation into these campaigns revealed that the threat actors employ dual delivery methods - not only do they embed phishing content directly within emails, but they also utilize direct links to thematically consistent phishing pages as an alternative attack vector.
The next figure lists the contents of the malicious zip archive. All files inside the archive are hidden except for an executable named, "Inspection Document Review.exe". This executable is a legitimate Microsoft Signed binary (Windows Defender Advanced Threat Protection Sense CE module) and is used for DLL Sideloading of the malicious payload "MpGear.dll".
The illustration below presents the digital signatures for all relevant files, specifically highlighting the sideloaded payload, "MpGear.dll", which exhibits an invalid signature.
Our examination of MpGear.dll revealed that the threat actors likely employed specialized tools to clone a legitimate Microsoft binary's digital signature into MpGear.dll.
Given the location of the Security Directory RVA, the tool allocated space at the end of MpGear.dll for the stolen signature, inserted the signature data into this reserved space, and then modified the PE's data directories members (Security Directory RVA/Size) to point to the transplanted signature and size.
The MPGear.dll implements a multi-layered anti-debugging routine with fallback mechanisms (Figure 8):
This layered approach with fallbacks ensures detection even when individual APIs are hooked.
Following this, the function retrieves the current time from the internet by attempting to connect to a series of hardcoded domains. It achieves this by iterating through two char arrays containing the domains and associated URI paths.
The full list of hard-coded domains is worldtimeapi[.]org, timeapi[.]io, and www.google.com. The list of hard-coded URI paths is also shown below. Each domain/URI path is used in an HTTP GET request. The primary method for obtaining the time reads and parses the "Date" header in the HTTP response.
If that fails, and the domain is either worldtimeapi.org or timeapi.io, it implements a fallback mechanism that reads the content of the response and manually parses it, searching for the JSON keys "unixtime": or "unixTime": to extract the timestamp value directly. The inclusion of www.google.com serves as a highly reliable fallback for obtaining a standard HTTP date header if the other specialized time APIs are inaccessible. The function returns a calculated timestamp upon success or zero and exits.
Following successful anti-analysis validation, the loader contacts the C2 server to download and execute the next-stage payload. The download function (see Figure 10) establishes an HTTP connection to the hardcoded C2 endpoint 8.217.152[.]225:80 and issues a GET request for the '/1bin' resource.
The downloaded shellcode is read into a temporary buffer via InternetReadFile in a loop until all bytes are retrieved. Once downloaded, the malware allocates a new region of executable memory using VirtualAlloc with PAGE_EXECUTE_READWRITE permissions. The shellcode is then copied from the download buffer into this newly allocated executable memory region.
Execution is transferred to the shellcode by calling CreateThread with the thread start address pointing to the allocated payload buffer (qword_180021C70). The main thread then calls WaitForSingleObject with the INFINITE parameter (0xFFFFFFFF), effectively blocking until the payload thread terminates, at which point the thread handle is automatically signaled by the operating system and execution returns to the main thread.
The encrypted blob is unpacked in multiple stages, beginning with dynamic API resolution, followed by decryption and decompression layers to ultimately reveal a second-stage PE file.
API Hashing Routine
This function iterates through a given string converting each character to lowercase and applying the formula new_hash = char + 0x83 * old_hash. The malware computes hashes for required API names and then searches through the export tables of loaded DLLs (like ntdll.dll), hashing each function name until it finds a match. Resolving those APIs reveals Native APIs. Hashdb API resolver was able to identify this algorithm.
XOR Decryption
Cyberchef Recipe:
Take_bytes(0,105664,false)
XOR({'option':'Hex','string':'E665C7333181E7EB3D2736DB31D5497CDED9F60909C2FF20BB1442552C672E114A2552EE8DF50BDDD60866A31803709D4CDE10C87EF080D160AD94531A63CDD56E26E642CAE7A18F9427084A5E797D17BE68727B6AF9BE5CBF3BB65C9E598E61C5C468E97414A0D3269886A9F00386E8A687AFB1437B0DD9244292C8EA658C82D6064166CAAD3B9BF8D9D5EE62398B871923B422595C824ADF493D88A0179C49D5E8030DB4C64A1C2384107155BEABFFF4719668FD46D270F2E548B9535399B6A4621CA1251F1BD3062AD8C8D479838C3EA6D6BE655EF01E33C525A1E7DD838466BB513C0494B1874034469372FBAE42694D10CFDD903D844BCE47B2C40E5DA2D0DA6FDA4CBBA1C1AB1BB95FC78A4C05A228D6A3FC0A966A5B6DDBDB42166AA927F834BC30C8107DAE210461769ACD6B270296DFDC37C4D876C792B83FFA11BC73FD21F6802E7675BFA9A4E2875B91062638DA4DECB72A273BB28BE58118FCEE022CBCC9B596979E91005917B226E8DE9E3E8AFD89CCFC532BC3B17D72671B93FA3B1C8225D6253D182B8A1147ECEF6C38F28DB682266360A3D16B75C07F02CA49F90E371A082E8CC68CA26070F9FF2C35999824E8FE4BFCCB447F3176BA93368599E8436BF06BF8AC3F179AA586B286509883B565BFF113F5CA65C5FE92247531AFB7D3AB000D6A3EB38317969390CAFB348C96C10C612995D08D135D5F59ADB53D554AA542A92BD1149684547219C0DED1C31FE12DC68A3FA303B51E1C8B4FD29331D2C2E75A80834C5BC87410AB522CA786BF7F9810D70A12BA3B8CA3FAF55657533A201F6435781A36781F634B1AF3D2DC13E7C150D8093E5AC0EE90D35AB699D5EF1C94D4DB02F745462F105B7F6C7AFEDB349122C2B82D7E21F06462F8579E2A232AAD829386749454FBB2475E5B5F233A18039D2A2D708A0D4FBADE86FFE9ACBC3650FC09170D3E3C9D55EE0978003415F8F46D6CB0AB48523A828316B2EF4699628BE6B2C83FD9EE0FA9E4F8D7C73BA3CDBAED561DCD92D747374D9D3A84E7D3618DF420B9D72291C70120B9BD80E5A1E78839B70758D8006BEC1354068ED4F31F15A307996AD61A34A36040BE430E8B62BBE434563A564EDCB345E7698C1946557186FA4688B8549556263666EDA2BCCB7C93DCC54D23440EE5811DB18FADC00A149CD118A10BB9E90A70002E718B7EA9C0973E488919090F7BC2C099A891626EBA45F81FDC79262DF4E4396035C23D88FAC4E0A236A6CAF96482667CF2AFB84F89B803491A406ED5D2B03DFD97024161EFD4993181DAD0FB4DC9F85BE91D12E887E3F51073FBC44F8D11769B0295FC57B2683EC194A79BF0FB210F3A8BE199C8CCD02520FE3C5C2B96C64902F1C2F66559C676755C0AC6A58AC63D861A17CC3512ECB3E93DB9CADBD1EB39CF4126B58D5D8BEE840DFDE2C39C1A370B0112CFBE821A5AF358B8620B43425D9FB6FB254F2F76BF9DA8C7D2FF46C7593AD60F52DB012841676B8FB61BEBC1827DD247ED4ED60AB665855D23000B4C2BDBA39631C4944821C952E1FF599DDA28741D81A2AB19F005BEFD3F067480412A6E711AE832DDD446ABBA68A6BE20176EC389125B3DA744482D2B9D8A716924A3BF71A265E61F2B9DF6AFA1868C88A8A1E2DF1E63008D86EEF8AF8E8DE957C260DFE9E570A69D192D9F834C5024A22FD6E73B4B34A06112C0E5C302176E6D2E1F09A976BA37BF2A6F229E983BEF4DF93F081E76DE336032484A254FD856E991B4DAAF9D46C3236D0F1FBB2089A92063F784A19E310ECB5622F6E04954733BEC725BF13A22C19021FEF39876AE89CA098F08CA55314C3799079C0D9BDE54BDE382D78F50735D2026F1B1ED7AD9EBC0482D0406F3AC98A252C89FE0A4FB51DC4CC7D85E926498C887FC21AA4BFBA2DF63C75100129E47FA738F2ADF0DA10284A2404AE31D8CAC500193C884DB4C922C8A29E3CF8724800ECDCB9A5C91C808703CF01BBC2F5AA0DF76255374DDF9995371953F4F60736F54C122E5FA559389555F5F4D911551C799DC5CAE265ADB753C33E72197DFDF9111207A192ADC8109D705DCD41BFF99C97FD1CBEDB6C16DB1E34D3A3ACEF42A07596356B7313DAB6FDB0300E9D283D6A85DB8D6BAF526C161F67671323402B41F8F0F60D94A798554E53DA19555E691AC2A03304AFA98E2B0DD3C32CDC84B61D3F0EE02DCE16CD1A2C8D1E3D456D1729E79AC55C3C15F7C791948C188E83FE784B7FBB25F1BA3F9A2952BDE8B46ED04ACD2C1D6BD720D3EB4482BD8ECA3FF650B15707CF885B7DD7F3A350E6364324903D3681AD34283C859B117D514A8C10F9AA3D85BE0448120C8F11105D41A45227C28150926427DA64FF6BB515DED68BC00CEC99770C493AD20003DF14ECECE2CFB0AD738364D212C460E678E7D0EA6A8D9C5A3B40093CD1065A122FBD8B6B1EBD0300B4CEFB8F49D12E0CDBC803AC797E0268F44E9CB2FBBB5D29FB4CB6FE44768D01A730CE6D97E61B5DD933AAE7C834519849D7F4BAB28544257531352A03468452C3F082729E39A6175F4145C9EF661A6718FB3F342AD0AD8767C51A77926C486E2947488C673DD0B0C11EE1BA21D78163C77F30E10E64DA182E20622AAA8FCF910AB971AAD6A4E71037E3233D311688B3F398691633ADB50F128C3417F49542DDC10CDDB98499BC3CFE5D6F8A24B40F7266B99F4D7A31346430F55911F42CC91D983B344ADAF31765330'},'Standard',false)
LZNT1_Decompress()
The data that results from the XOR decryption is not the final executable, but rather a compressed data blob that is decompressed using the RtlDecompressBuffer API, where the CompressionFormat parameter is specified as COMPRESSION_FORMAT_LZNT1. In other words, the payload is XOR decrypted and decompressed from LZNT1.
The second stage is a 64-bit executable with sha256, "a416892cd439e289f188f9a85c21943b316b3489f70757d0d7df54e4edd9f14b". Static analysis reveals it was compiled Sun Nov 30 12:37:32 2025 | UTC and notably contains a debug PDB path at "C:\Users\sakur\Desktop\k7\bypassuac1-main\x64\Release\bypassuac.pdb".
The binary downloads the next stage "180.exe" from hxxps://eaxwwyr[.]cn domain to the %TEMP% directory (C:\Users\<username>\AppData\Local\Temp), masquerades itself as explorer.exe via PEB manipulation, and attempts UAC bypass to execute the next stage with elevated privileges. This behaviour occurs by a main function that orchestras two key techniques in sequence.
This function, "sub_1400015E0" takes a "C:\Users\Compu\AppData\Local\Temp\180.exe" command to elevate as an argument and performs the following steps:
Technique 1: Process Impersonation via PEB Masquerading `sub_1400010C0`)
This function's purpose is to make the malware process appear as if it were the legitimate Windows binary, "explorer.exe". This is a defense evasion technique used to fool security products and system monitoring tools (like Task Manager or Process Explorer) that inspect the PEB to identify a process's associated file name.
After this function runs, any tool that relies on the PEB for process information will be misled into identifying the malware as explorer.exe.
Technique 2: UAC Bypass via COM Elevation Moniker `sub_140001370`)
This function's goal is to execute the command provided to the main function with administrator privileges, bypassing the standard User Account Control (UAC) prompt. It uses a well-known "file-less" technique to bypass UAC on unpatched systems.
For those unfamiliar with this technique, it abuses a known COM auto‑elevation mechanism to execute code in a high‑integrity context through the following steps:
Resolves the ICMLuaUtil interface
Initializes COM
Uses the UAC elevation moniker
The malware invokes CoGetObject with the moniker string:
Elevation:Administrator!new:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
This requests instantiation of the CMSTPLUA COM object with administrator privileges.
Obtains an elevated ICMLuaUtil interface
Executes a command with elevated privileges
The downloaded Stage 3 payload (180.exe) is a 32-bit Inno Setup installer disguised as "unffafa Setup" (product name: unffafa, version 1.5). Inno Setup is a legitimate Windows installer framework commonly abused by malware operators to pack malicious payloads.
This ~42 MB file with sha256, "659ff4b41b26b8ea91f7ccf968dc0305ff380571cfe7f70e80d79142142aa1a7", serves as a dropper, designed to extract and deploy additional malicious components.
Upon execution, the Inno Setup installer extracts multiple files to the C:\unffafa directory, as can be seen in the figure below.
Among the dropped files, the batch script myxmapp.bat contains obfuscated code, as shown in the next figure.
The batch script myxmapp.bat performs conditional file operations based on the presence of Avast antivirus software. The script checks for the AvastUI.exe process using the TaskList command:
The clientconf.ini file contains "MZ" characters only (PE header magic bytes) and is concatenated with various .dat files to reconstruct executable payloads.
If Avast is running (label :02):
Concatenates clientconf.ini, av1.dat, and av2.dat into game-float-core.dll
Exits
If Avast IS NOT running (label :03):
Creates c:\install\ directory
Concatenates clientconf.ini, y1.dat, and y2.dat into c:\install\mysetup.exe
Copies myxmapp.ini to c:\install\MySysConfig.ini
Concatenates clientconf.ini and wr.dat into myxmapp.exe
Executes c:\install\mysetup.exe
Exits
game-float-core.dll Analysis
The game-float-core.dll is a malicious DLL file with the following characteristics:
SHA256: 92b48284905fda41a72697ee69aa4557781f1c252d544f675f6033f6389f8e1f
Compiler Timestamp: Mon Oct 27 02:50:23 2025 UTC
Packer: UPX packed
Digital Signature: Invalid (signature "SAND STUDIO CORPORATION LIMITED" on Wednesday, October 30, 2024 12:36:23 AM) as can be seen in Figure 24.
Avast Antivirus Evasion via Automated Exception Creation
Analysis of the unpacked game-float-core.dll (SHA256: 962F7DA30F3D4F876FAE91E20522C805A237FC54043792505F11DD4EA673DC80) identifies it as a variant of the Blackmoon malware family.
Blackmoon is a well-documented banking trojan and information stealer that has been active in targeted campaigns, primarily affecting users in South Korea and other Asian regions.
The binary contains hardcoded error-handling strings including "BlackMoon RunTime Error:" and "Blackmoon". These identifiers match known BlackMoon runtime signatures documented in sandbox analysis. Broadcom's research team has also observed Blackmoon masquerading as legitimate Chinese security software, a behavior consistent with the findings in our investigation.
Upon analysis, the unpacked DLL reveals a sophisticated evasion technique targeting Avast Free Antivirus through automated GUI interaction. The malware's objective is to add the detected file (C:\Windows\SysWOW64\msres\Setup.exe) to Avast's IDP (Intrusion Detection Prevention) exclusion list without directly disabling the antivirus engine.
Execution Flow:
Note: Figure 28 shows the Window Spy tool from AutoHotKey capturing the client coordinates of the Avast detection dialog. While the hardcoded coordinates in the malware (370, 270) and (366, 326) align with the intended UI elements in the analyzed Avast version, testing revealed these coordinates may be slightly off the correct position. However, the code's intent is clear: automate the "More Options" → "Create Exception" workflow to whitelist the malicious Setup.exe file.
Setup.exe is a utility from SyncFutureTec Company Limited, digitally signed on December 21, 2023, at 10:36:49 PM. The file is signed with a valid code-signing certificate issued by GlobalSign GCC R45 CodeSigning CA 2020, with the certificate validity period spanning from March 28, 2023, to March 28, 2025 (Figure 29).
It also writes mysetup.exe (SyncFutureTec Company Limited Signed) and YTSysConfig.ini to the C:\Install folder. The YTSysConfig.ini file contains command and control (C2) server configurations including:
It also implements multiple anti-analysis techniques including attempting to connect to timecha[.]com domain on port 443. If the connection fails, the process exits. This technique effectively bypasses sandbox or environment's where the domain cannot be resolved.
Interestingly it also creates a registry key under HKEY_CURRENT_USER\SOFTWARE\Microsoft\GcServices with the following values:
mysetup.exe is a 32-bit executable (950ad7a33457a1a37a0797316cdd2fbaf9850f7165425274351d08b3c01ed2d8), approximately 40MB in size, and is digitally signed by "SyncFutureTec Company Limited."
Based on code-signing artifacts, configuration file naming conventions (YTSysConfig.ini - likely "Yangtu System Config"), observed functionality, and extensive logging behavior, we assess with high confidence that this represents an abuse of the Syncfuture Terminal Security Management System (TSM), a commercial software product developed by Nanjing Zhongke Huasai Technology Co., Ltd., a technology company based in China.
Nanjing Zhongke Huasai is a specialized information security provider that delivers "lightweight and practical" data security solutions. According to their public information, the company serves over 10,000 clients across government and corporate sectors, with a significant footprint in the healthcare industry. This established presence and legitimate business front lend its software a veneer of legitimacy, making it an effective Trojan for deployment in espionage campaigns.
The TSM system is a Terminal Security Management platform with Remote Monitoring and Management (RMM) capabilities designed to give administrators complete control over endpoint machines. The TSM includes 远程协助 (Remote Assistance) features that enable administrators to remotely control multiple computers simultaneously, support dual-screen remote sessions, and provide high-speed remote desktop access.
Its key features include:
The deployment of this commercial-grade TSM system as the final payload represents the ultimate goal of the intrusion. By repurposing a legitimate enterprise security product, the threat actor gains a powerful, all-in-one framework for long-term espionage.
It provides them with the tools to not only steal data but to maintain granular control over the compromised environment, monitor user activity in real-time, and ensure their own persistence.
We have observed multiple files being dropped as the execution of this product and we will not be covering them but briefly cover the script files observed.
Code-Signing Certificate Analysis
Analysis of the dropped executables reveals a pattern of valid code-signing certificates across multiple files, signed on different dates spanning 2019-2024. This multi-year certificate usage pattern suggests abuse of legitimate software.
Additionally, multiple kernel-mode drivers are signed by "NANJING YANGTU INFORMATION TECHNOLOGY CO., LTD.":
The configuration file YTSysConfig.ini (likely "Yangtu System Config") further corroborates the connection to Yangtu/SyncFuture technology infrastructure.
Additionally, vendor artifacts such as clientlogo.png (终端助手 - Terminal Assistant) were present in the deployment package.
32.bat AND 64.bat
The malware deploys two batch scripts that create custom directories and modify their Access Control Lists (ACLs) to grant Full Control permissions to EVERYONE.
32.bat creates directories under System32 (native 64-bit path):
64.bat performs identical operations but targets SysWOW64 (32-bit subsystem path):
Both scripts use the cacls command with /G system:f everyone:f to grant Full Control to both SYSTEM and EVERYONE groups. This weakens system security by allowing any process or user to drop, modify, or execute files in these system paths, ensuring the malware can operate in both 32-bit and 64-bit execution contexts.
SetPermissions.bat AND CleanPermissions.bat
The SetPermissions.bat and CleanPermissions.bat scripts are designed to manipulate user permissions on Desktop folders.
SetPermissions.bat denies specific permissions to user Desktop folders:
Uses icacls with /deny to block the following permissions:
WEA (Write Extended Attributes), WA (Write Attributes), DE (Delete), DC (Delete Child), WD (Write DAC), AD (Append Data)
CleanPermissions.bat removes the deny permissions previously set, using /remove:d
The hardcoded username "mzys" does not exist on the victim machine. This could either be related to Threat Actor testing machine or comes embedded with this enterprise tool.
Exit.bat
This batch script performs cleanup and restoration operations:
Registry Modification:
Process Termination and Restart:
The dual taskkill commands ensure the explorer.exe process is terminated, and the delay before restart likely ensures all processes have fully terminated before restarting. This script appears to be part of a cleanup routine, potentially reversing changes made during malware execution or ensuring Explorer is restarted to reflect system modifications.
Help.bat
It runs bcdedit /set testsigning on, which enables Windows Test Mode, allowing the system to load test-signed drivers that would normally be blocked.
Turning on test-signing lowers kernel-level trust protections and can be abused to load malicious or unauthorized drivers with elevated privileges. Do note Windows only reads these settings during system startup, so the change won't apply until next boot.
Helpformat.bat
It executes format P: /FS:NTFS /V:label /Q /Y, which quick-formats the P: drive to NTFS and assigns the specified volume label.
MANC.exe
The Stage 3 payload (180.exe) drops numerous executable files and supporting components to the infected system. This analysis focuses on MANC.exe as a representative sample due to its central role in the malware's operation.
MANC.exe establishes service-based persistence with SafeBoot registry modifications, orchestrates multiple child processes (svchost.exe, SMSS.exe, sysaid.exe, svcdsk.exe), and demonstrates extensive logging capabilities.
MANC.exe is a 32-bit executable, with sha256, "8E8156C5A8BE682DAC3B5D867031E8D5CBAE031FFEB4C0DDD5E5A6B41CA76555" and is digitally signed by "SyncFutureTec Company Limited."
MANC.exe spawns a secondary executable c:\windows\system32\msres\svchost.exe using CreateProcessA. This malicious svchost.exe subsequently loads mframe.dll, which contains additional malicious functionality.
MANC.exe writes execution logs to c:\log\ServiceEx.log with the format: "----PID:%d--2023.12.26--->".
The log entries reveal service startup events and driver loading operations, including:
Analysis reveals the malware creates numerous log files in the C:\log\ directory, indicating extensive debugging or telemetry capabilities across multiple components:
The log entries reveal service startup events, driver loading operations, and detailed execution traces, etc. This extensive logging infrastructure is expected from enterprise software and supports our assessment that legitimate endpoint management tools are being repurposed in this campaign.
This campaign represents a complex, multi‑stage intrusion engineered for long‑term surveillance rather than opportunistic infection targeting India. By blending anti‑analysis, privilege escalation, DLL sideloading, commercial‑tool repurposing, and security‑software evasion, the threat actor demonstrates both capability and intent.
You can access the full list of Indicators of Compromise here.
To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.
GET STARTEDThe eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.