SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected

SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected

The Acronis Threat Research Unit (TRU) has revealed an advanced campaign believed to be orchestrated by the SideWinder advanced persistent threat (APT) group.

This operation, running through early 2025, has primarily targeted high-value government and military institutions across Sri Lanka, Bangladesh, and Pakistan, exploiting unpatched legacy Microsoft Office vulnerabilities to deploy credential-stealing malware while evading contemporary detection mechanisms.

At the heart of SideWinder’s strategy is a blend of old and new: attackers craft spear-phishing emails that impersonate local governmental bodies or high-level organizations, embedding malicious Word or RTF attachments.

– Advertisement –

These documents exploit CVE-2017-0199 and CVE-2017-11882, vulnerabilities that have persisted in many organizations due to inadequate patch management.

SideWinder APT Hackers
related documents

CVE-2017-0199 enables remote code execution by leveraging malicious external object references in Office files, while CVE-2017-11882 abuses a memory corruption bug in the legacy Equation Editor component, allowing attackers to execute arbitrary code upon document opening.

Uniquely, SideWinder integrates geofenced payload distribution the attackers’ servers deliver the next infection stage only if the victim’s IP and User-Agent headers match the intended targets in Bangladesh, Sri Lanka, or Pakistan.

SideWinder APT Hackers
Infection Chain

Non-targeted users receive benign decoy documents or error messages, thwarting analysis and minimizing detection.

Once the exploitation chain begins, a shellcode-based loader, embedded within the RTF payload, triggers.

This shellcode is heavily obfuscated, employing memory inspection and sandbox evasion techniques, only advancing if the environment appears legitimate.

It downloads a second-stage binary, individually encoded for each victim by server-side polymorphism, and injects it into a trusted process (typically explorer.exe) using classic Windows API methods like VirtualAllocEx and CreateRemoteThread.

Credential Harvesting

The third-stage payload is a DLL known internally as “StealerBot.CppInstallerDocx.dll.”

This module, executed via rundll32.exe or DLL sideloading through a legitimate signed executable (TapiUnattend.exe), collects a wide array of sensitive data: usernames, system specifications, drive details, MAC address, network configuration, and installed AV products.

This information is base64-encoded, obfuscated, and sent back to the command-and-control (C2) server, which is frequently rotated to evade IP/domain blocklists.

The attackers employ persistence via Windows Startup folder LNK (shortcut) files that trigger the malicious chain on reboot.

Further, the final malware components are protected with XOR encoding and loaded in-memory, avoiding disk writes and complicating forensics.

StealerBot is proficient at both exfiltrating credentials and maintaining access, using stealthy communications and layering encrypted C2 channels with dynamic domain infrastructure.

Infrastructure and Targeting

TRU analysts observed a significant uptick in related malicious domains through early 2025, reflecting SideWinder’s resource commitment and operational tempo.

The C2 domains registered in bursts and rotated frequently are crafted to impersonate government, financial, or defense organizations, enhancing social engineering credibility.

The group’s lures are highly customized; notable examples include invitations to military events or official economic briefings, tailored for Sri Lanka’s Army 55 Division and the Central Bank of Sri Lanka’s IT directorate.

While the campaign references a broad range of high-value institutions, confirmed victimology is currently limited to the Sri Lankan and Bangladeshi military and financial sectors, indicating a combination of direct targeting and credibility-boosting impersonation in SideWinder’s phishing emails.

The attackers maintain operational security by generating unique payloads per target, using server-side polymorphism to frustrate signature-based detection and automatic sample correlation.

Organizations in South Asia particularly those in government, military, or critical infrastructure are urged to enforce immediate patching of legacy Office vulnerabilities, especially CVE-2017-0199 and CVE-2017-11882.

Disabling macros and external template loading, restricting the use of mshta.exe, wscript.exe, and powershell.exe, and deploying behavioral detection tools that flag anomalous child processes or memory injection are critical steps.

Network-level filtering against known malicious domains and user education to recognize spear-phishing hallmarks are also essential to reduce risk.

This campaign reinforces how resilience against well-known exploits demands not just advanced detection, but also relentless attention to basic security hygiene.

SideWinder’s evolving tactics combining geofenced distribution, shellcode loaders, DLL sideloading, and rapid infrastructure churn demonstrate the persistent threat posed by APTs leveraging “forgotten” vulnerabilities.

Indicators of Compromise (IOCs)

Type Indicator Description
SHA256 Doc 57b9744b30903c7741e9966882815e1467be1115cbd6798ad4bfb3d334d3523d Malicious DOC, “Caution Against Propaganda…”
SHA256 RTF e4afb43a13e043d99ff0fb0a0ac49e96a04932ba37365527914d6be779597edf Exploit RTF, CVE-2017-11882
SHA256 Payload 61132f15775224f8aae02499b90b6bc19d4b3b44d987e0323276dceb260cc407 Stage 3, StealerBot DLL
SHA256 DLL c62e365a6a60e0db4c2afd497464accdb783c336b116a5bc7806a4c47b539cc5 Final unencrypted StealerBot sample
Domain advisory[.]army-govbd[.]info C2 Infrastructure
Domain updates-installer[.]store C2 Infrastructure
Domain dwnlld[.]com C2 Infrastructure
Domain bismi[.]pro C2 Infrastructure
C2 Panel URL hxxps://ecility[.]xyz StealerBot control panel
File TapiUnattend.exe (MD5: b574abf43dcc57a359129d1adb4cdda0) Legitimate used for DLL sideloading
File wdscore.dll (MD5: b37522b69406b3f6229b7f3bbef0a293) Malicious DLL loader

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!


Source link