Skip to main content

Mar 04, 2025Ravie LakshmananCyber Espionage / Malware

Security researchers have uncovered a sophisticated phishing campaign targeting a small number of entities in the United Arab Emirates, specifically in the aviation and satellite communications sectors, with the goal of delivering a previously unknown Golang-based backdoor known as Sosano.

The campaign, detected by Proofpoint in late October 2024, is attributed to a threat actor tracked under the name UNK_CraftyCamel. This actor leveraged a compromised email account belonging to the Indian electronics company INDIC Electronics to send tailored phishing emails to fewer than five organizations in the UAE.

A notable aspect of this campaign is the use of a trusted third-party compromise to gain credibility with the targets. The emails contained URLs pointing to a fake domain mim! ck-ing the Indian company, hosting a ZIP archive with an XLS file and two PDF files.

Proofpoint’s analysis reveals that the attack involves multiple polyglot files, including a Windows shortcut (LNK) file disguised as a Microsoft Excel document, and two PDF files that are actually polyglots containing an HTML Application (HTA) file and a ZIP archive, respectively.

The LNK file launches cmd.exe, which then runs the PDF/HTA polyglot file using mshta.exe, leading to the execution of the HTA script that unpacks the contents of the ZIP archive present within the second PDF.

The final payload is a Golang-based backdoor called Sosano, which is XORed with a specific string to decode and run. Sosano has limited functionality, allowing it to establish contact with a command-and-control (C2) server and await further commands.

The backdoor’s capabilities include:

  • sosano, to get the current directory or change the working directory
  • yangom, to enumerate the contents of the current directory
  • monday, to download and launch an unknown next-stage payload
  • raian, to delete or remove a directory
  • lunna, to execute a shell command

According to Proofpoint, the tactics, techniques, and procedures (TTPs) employed by UNK_CraftyCamel do not overlap with any known threat actor or group.

Joshua Miller, APT Staff Threat Researcher at Proofpoint, believes that this campaign is likely the work of an Iranian-aligned adversary, possibly affiliated with the Islamic Revolutionary Guard Corps (IRGC). The targeted sectors are crucial for both economic stability and national security, making them valuable intelligence targets.

“This low-volume, highly targeted phishing campaign demonstrates the lengths to which state-aligned actors will go to evade detection and fulfill their intelligence collection mandates successfully,” Miller added.

Found this article interesting? Follow us on Twitter Source Link