Chinese Hackers Launch Targeted Campaign to Infect Windows Systems with Ghost RAT and PhantomNet Malware

Chinese Hackers Launch Targeted Campaign to Infect Windows Systems with Ghost RAT and PhantomNet Malware

Zscaler ThreatLabz, in collaboration with TibCERT, has uncovered two linked attack campaigns dubbed Operation GhostChat and Operation PhantomPrayers, attributed with high confidence to a China-nexus advanced persistent threat (APT) group.

These operations targeted the Tibetan community by capitalizing on heightened online activity surrounding the Dalai Lama’s 90th birthday on July 6, 2025.

Exploiting Cultural Events for Cyber Espionage

The attackers compromised legitimate websites, such as tibetfund.org, replacing benign links with malicious redirects to subdomains under niccenter[.]net, which impersonated trusted platforms.

Webpage crafted by threat actor

This social engineering lured victims into downloading trojanized software themed around Tibetan cultural events, initiating multi-stage infection chains that deployed either Ghost RAT or PhantomNet (also known as SManager) backdoors.

These malware variants, commonly associated with Chinese state-sponsored actors, enabled persistent access, data exfiltration, and command execution on compromised Windows systems.

The campaigns employed advanced evasion techniques, including DLL sideloading, shellcode injection, and encrypted payloads to bypass endpoint detection and response (EDR) solutions.

In Operation GhostChat, victims were redirected to a fake site mimicking the Element chat application, downloading a ZIP archive containing a legitimate but vulnerable Element.exe that sideloaded a malicious ffmpeg.dll.

PhantomNet Malware
 Multi-stage attack chain for Operation GhostChat.

This stage-1 loader resolved APIs dynamically using low-level Nt* and Rtl* functions, mapped a fresh ntdll.dll from disk to overwrite user-mode hooks, and injected 32-bit shellcode into ImagingDevices.exe via shared memory sections.

The stage-2 reflective loader decompressed and executed a Ghost RAT variant, which communicated with its C2 server at 104.234.15[.]90:19999 using a custom TCP binary protocol encrypted with an RC4-like algorithm.

Ghost RAT’s modular plugin, config.dll, supported commands for file manipulation, screen capture, keylogging, audio/video recording, and system shutdown, all derived from analysis of similar variants.

Advanced Malware Tactics

Operation PhantomPrayers mirrored this approach but distributed a PyQT5-based executable, DalaiLamaCheckin.exe, posing as a “special prayer check-in” tool.

This binary created a GUI with Folium-generated maps to feign legitimacy, while covertly copying a vulnerable VLC.exe and malicious libvlc.dll to %appdata%Birthday for sideloading.

Persistence was established via a Startup shortcut, and the stage-1 loader decrypted dual-layer encrypted shellcode (RC4 followed by AES-128 CBC) from a .tmp file, leading to a stage-2 reflective loader and the PhantomNet backdoor.

PhantomNet connected to 45.154.12[.]93:2233 over TCP with AES-encrypted traffic, utilizing plugin DLLs for modular functionality, including system information gathering and timed operations, as seen in prior campaigns like Operation SignSight.

Attribution to Chinese APT groups stems from victimology focused on the Tibetan diaspora, the exclusive use of Ghost RAT and PhantomNet tools linked to actors like TA428 and tailored tactics, techniques, and procedures (TTPs) such as code injection (T1055.002), native API abuse (T1106), and obfuscated payloads (T1027 variants).

According to the Report, Zscaler’s platform detects these threats as Win64.Trojan.PhantomNet and Win32.Backdoor.GhostRAT, aligning with MITRE ATT&CK IDs like T1574.001 for DLL hijacking and T1573.001 for encrypted channels.

This collaboration highlights the APT’s exploitation of cultural sensitivities for supply-chain compromises, underscoring the need for robust web security and malware analysis to counter such state-sponsored intrusions.

Indicators of Compromise (IOCs)

Type Indicator
MD5 Hash 42d83a46250f788eef80ff090d9d6c87 (TBElement.zip)
SHA256 Hash 0ad4835662b485f3a1d0702f945f1a3cf17e0a5d75579bea165c19afd1f8ea00 (TBElement.zip)
Malicious Domain thedalailama90.niccenter[.]net
Malicious Domain tbelement.niccenter[.]net
Malicious Domain beijingspring.niccenter[.]net
Malicious Domain penmuseum.niccenter[.]net
Ghost RAT C2 104.234.15[.]90:19999
PhantomNet C2 45.154.12[.]93:2233
File Path %appdata%BirthdayVLC.exe
File Path %appdata%Birthdaylibvlc.dll
Injected Process ImagingDevices.exe

Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now


Source link