APT36 Deploys Python-Based ELF Malware in Targeted Attacks on Indian Government Agencies

APT36 Deploys Python-Based ELF Malware in Targeted Attacks on Indian Government Agencies

Pakistan-linked cyberespionage group APT36 (Transparent Tribe) has escalated its campaign against Indian government institutions with the deployment of sophisticated Python-based ELF malware specifically designed to compromise Linux-based BOSS operating environments, according to research published by CYFIRMA.

The threat actor, historically focused on Windows systems, has demonstrated expanded technical maturity through multi-platform tooling that bypasses conventional security controls across heterogeneous government infrastructure.

The campaign leverages spear-phishing emails containing weaponized Linux shortcut files that masquerade as legitimate documents while executing malicious payloads in the background.

The attack initiates through Analysis_Proc_Report_Gem_2025.zip, an archive containing a malicious .desktop shortcut file that appears as a standard document.

Unlike directly distributing easily detectable ELF binaries, APT36 conceals malicious logic within Base64-encoded strings inside the shortcut’s Exec field.

Functionality of .desktop Shortcut Files.

When executed, the file displays a password-protected decoy PDF while silently retrieving additional payloads from attacker-controlled infrastructure.

The .desktop entry downloads components from two primary locations: a decoy document from lionsdenim[.]xyz and malicious payloads from 185.235.137.90:32587.

Installation Directory Management.
Installation Directory Management.

The retrieved files include swcbc, a 64-bit ELF executable, and swcbc.sh, a persistence-enabling shell script, both saved to /tmp/ with execution permissions before launching in the background.

Static analysis reveals the ELF binary is a Python-based Remote Administration Tool (RAT) compiled with PyInstaller, designed for seamless operation across Linux and Windows environments.

However, because the PDF is password protected, LibreOffice displays a password prompt, which may draw the user’s attention.

 libreoffice /tmp/Analysis_Proc_Report_Gem.pdf to open a decoy PDF.
 Libreoffice /tmp/Analysis_Proc_Report_Gem.pdf to open a decoy PDF.

The malware establishes persistence through systemd user services on Linux and registry modifications on Windows, ensuring survival across reboots without requiring elevated privileges.

Upon execution, the implant performs comprehensive system reconnaissance, collecting OS details, hostname, username, and network information, before generating a unique identifier from MAC addresses and usernames.

This tracking mechanism enables attackers to maintain persistent identification of compromised hosts across multiple operational sessions.

The RAT supports a complete command set including directory traversal, file transfer capabilities, arbitrary command execution, Python code injection, screenshot capture, and automated data archiving for bulk exfiltration.

Attackers can remotely deploy additional payloads, harvest sensitive documents, or execute shell commands with full system access.

The binary metadata indicates that it was built on a Debian Linux environment using GCC 4.9.2 and is linked against GLIBC 2.3.4 for the AMD64 architecture.

Analysis of malicious ELF.
Analysis of malicious ELF.

The campaign infrastructure exhibits classic short-lived operational security patterns. Domain lionsdenim[.]xyz, registered through Namecheap on November 3, 2025, is 22 days old and resolves to 67.223.118.206, a Los Angeles-based server hosting over 275 domains.

The payload delivery server at 185.235.137.90 operates from Frankfurt, Germany, and has been confirmed as malicious by multiple threat intelligence sources.

The .xyz top-level domain choice reflects APT36’s preference for low-cost, minimally verified registration options that provide operational flexibility and rapid infrastructure turnover, complicating takedown efforts and attribution.

Strategic Implications

This campaign marks a significant evolution in APT36’s operational doctrine, moving beyond traditional Windows malware to embrace Linux-targeted tooling tailored for India’s indigenous BOSS operating system.

The group’s ability to customize delivery techniques based on victim ecosystems demonstrates a deep understanding of regional technology deployments and enhances prospects for long-term persistence within critical government networks.

Linux Persistence.
Linux Persistence.

The incorporation of systemd-based persistence mechanisms, cross-platform compatibility, and adaptive phishing techniques underscores a maturing threat actor committed to overcoming platform diversity.

This development poses elevated risks for interconnected government agencies and third-party partners operating hybrid Windows-Linux environments.

Security teams should monitor for .desktop file executions containing embedded commands, track systemd user service creations, and flag network connections to the identified IOCs.

Organizations using BOSS Linux should implement application allowlisting, restrict LibreOffice macro execution, and deploy endpoint detection capabilities capable of identifying PyInstaller-packaged binaries.

The campaign highlights the urgent need for Linux-specific threat detection in government sectors traditionally focused on Windows security, as APT36 continues refining its capabilities for sustained intelligence collection across India’s critical infrastructure.

INDICATORS OF COMPROMISE

S. No Indicator Remarks
1 defa2e29e45168471ce451196e1617b9659b3553b125e5464b1db032d7eac90a Block
2 5ff9777aac434cae5995bf26979b892197e3f0e521c73f127c2e2628e84ef509 Block
3 40a59422fa486c7ae214d6e816c2fd00bf4d75c081993a49c4bc22bb0165b7fe Block
4 4f4e795555740038904bc6365c58536a660d7f3206ac1a4e89612a9fdf97f6dd Monitor
5 lionsdenim[.]xyz Block
6 185[.]235[.]137[.]90 Monitor

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link