GBHackers

Operation CargoTalon Targets Russian Aerospace & Defense to Deploy EAGLET Implant


SEQRITE Labs’ APT-Team has uncovered a sophisticated spear-phishing campaign dubbed Operation CargoTalon, targeting employees at Russia’s Voronezh Aircraft Production Association (VASO), a key aerospace entity.

The operation leverages malicious attachments disguised as товарно-транспортная накладная (TTN) logistics documents, critical for Russian supply chains.

Discovered on June 27 via VirusTotal hunting, the campaign employs a malicious EML file named backup-message-10.2.2.20_9045-800282.eml, sent from a spoofed Transport and Logistics Centre address.

This email urges recipients to prepare for cargo delivery, attaching a DLL file masquerading as a ZIP archive titled Транспортная_накладная_ТТН_№391-44_от_26.06.2025.zip.

Malicious Email File.

Accompanying it is a malicious LNK shortcut file with the same name, which orchestrates the infection by invoking PowerShell to locate and execute the DLL via rundll32.exe, while spawning a decoy XLS file to evade suspicion.

Infection Chain Unveiled

The LNK script recursively searches %USERPROFILE% and %TEMP% directories for the implant, extracts an embedded XLS overlay of 59,904 bytes starting at offset 296,960, and saves it as ранспортная_накладная_ТТН_№391-44_от_26.06.2025.xls in %TEMP%.

This decoy mimics an Equipment Interchange Report (EIR) from sanctioned entity Obltransterminal LLC, featuring container inspection details, damage codes (e.g., Трещина for cracks, Сквозная коррозия for corrosion), and schematic diagrams, aligning with Russian military-logistics standards under U.S. OFAC sanctions via Executive Order 14024.

The core payload, dubbed EAGLET, is a C++-based DLL implant with espionage-focused features.

Operation CargoTalon
Infection Chain

Upon execution, it generates a unique GUID for victim identification, enumerates computer name, hostname, and DNS domain, and creates a C:ProgramDataMicrosoftAppStore directory for persistence.

EAGLET Implant Capabilities

It spawns threads using CreateThread to establish C2 communication via WinHttpOpen and WinHttpConnect APIs, masquerading under user-agent “MicrosoftAppStore/2001.0” to connect to hardcoded server 185.225.17.104 on port 80.

GET requests poll for commands with paths like /poll?id=&hostname=&domain=, while responses trigger functionalities such as remote shell execution (via “cmd:” keyword), file downloads to the staging directory, and exfiltration via POST to /result with base64-encoded results (e.g., id=&result=).

Infrastructure analysis reveals the C2 in Romania under ASN 39798 (MivoCloud SRL), with passive DNS ties to recycled domains linked to TA505, though no direct correlation exists beyond infrastructure reuse.

Hunting uncovered similar campaigns targeting Russian military recruitment via decoys like Договор_РН83_изменения.zip, connecting to C2 188.127.254.44 under ASN 56694.

Overlaps with Head Mare (tracked by Kaspersky) include tooling similarities EAGLET mirrors PhantomDL’s shell, download, and upload features file-naming patterns (e.g., Contract_RN83_Changes akin to Contract_kh02_523), and motivation targeting Russian entities.

Thus, SEQRITE attributes Operation CargoTalon to UNG0901, a cluster sharing resources with Head Mare for espionage against aerospace and defense sectors. SEQRITE’s AgentCiR detects it as trojan.49644.SL.

This campaign exemplifies advanced persistence through LOLBins, decoy embedding, and modular C2 interactions, highlighting escalating threats to Russian critical infrastructure.

Indicators of Compromise (IOCs)

File-TypeFileNameSHA-256
LNKДоговор_РН83_изменения.pdf.lnka9324a1fa529e5c115232cbbc60330d37cef5c20860bafc63b11e14d1e75697c
LNKТранспортная_накладная_ТТН_№391-44_от_26.06.2025.xls.lnk4d4304d7ad1a8d0dacb300739d4dcaade299b28f8be3f171628a7358720ca6c5
DLLДоговор_РН83_изменения.zip204544fc8a8cac64bb07825a7bd58c54cb3e605707e2d72206ac23a1657bfe1e
DLLТранспортная_накладная_ТТН_№391-44_от_26.06.2025.zip01f12bb3f4359fae1138a194237914f4fcdbf9e472804e428a765ad820f399be
N/AN/Ab683235791e3106971269259026e05fdc2a4008f703ff2a4d32642877e57429a
DLLДоговор_РН83_изменения.zip413c9e2963b8cca256d3960285854614e2f2e78dba023713b3dd67af369d5d08
Decoy[XLS/ PDF]temp.pdf02098f872d00cffabb21bd2a9aa3888d994a0003d3aa1c80adcfb43023809786
Decoy[XLS/ PDF]sample_extracted.xlsf6baa2b5e77e940fe54628f086926d08cc83c550cd2b4b34b4aab38fd79d2a0d
Decoy[XLS/ PDF]806500003e93c6cd9d31e0428085e620fdba017400e534f9b549d4041a5b0baaee4f7aff

Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now



Source link