SideWinder Uses Server-side Polymorphism to Attack Pakistan Government Officials — and Is Now Targeting Turkey

Arctic Wolf has been monitoring the SideWinder APT group, whose latest campaign targets Pakistan government organizations by using server-based polymorphism to deliver the payload.
6 min read

Summary

The Arctic Wolf® Labs team has been actively tracking and monitoring the SideWinder advanced persistent threat (APT) group, which has led to the discovery of their latest campaign targeting Pakistan government organizations.

In this campaign, the SideWinder APT group used a server-based polymorphism technique to deliver the next stage payload.

Brief MITRE ATT&CK® Information

Tactic Technique
Execution T1204.002, T1059.007, T1203, T1047
Defense Evasion T1480, T1221, T1027, T1140
Command and Control T1105, T1071.001
Discovery T1518.001


Weaponization and Technical Overview

Weapons Obfuscated JavaScript, PE executable
Attack Vector Weaponized document used for targeted attack
Network Infrastructure DDNS
Targets Pakistan Government organizations


Technical Analysis

Context

The SideWinder APT group, also known as Razor Tiger, Rattlesnake, and T-APT-04, has been actively targeting Pakistan government organizations since at least 2012.

One of the oldest nation-state threat actors, SideWinder is believed to originate from India. Active since at least 2012, the group has been observed targeting military, government, and business entities, with a particular focus on Pakistan, Afghanistan, China, and Nepal. SideWinder primarily makes use of email spear-phishing, document exploitation, and DLL side-loading techniques in an attempt to avoid detection and deliver targeted implants.

Through our threat hunting efforts, the Arctic Wolf Labs team discovered a new malware campaign by the SideWinder group. This campaign utilized a server-side polymorphism technique. The use of this technique allows the threat actor to potentially bypass traditional signature-based antivirus (AV) detection to deliver the next stage payload.

Attack Vector

MD5

SHA256

666b2b178ce52e30be9e69de93cc60a9

cd09bf437f46210521ad5c21891414f236e29aa6869906820c7c9dc2b565d8be

File Name GUIDELINES FOR JOURNAL – 2023 PAKISTAN NAVY WAR COLLEGE (PNWC).docx
File Size 12.81 KB (13115 bytes)
Created 2022-11-30 04:52:00 UTC
Author Windows User
Last Modified 2022-11-30T05:44:00Z
Last Modified By Windows User


What is Server-Side Polymorphism?

Server-side polymorphism is a technique used by threat actors and other distributors of malware to attempt to evade detection by antivirus scanners. Polymorphic (literally “many shapes”) malware is malicious code that alters its appearance through encryption and obfuscation, making sure that no two samples look the same. Although futuristic-sounding, it’s actually an older technique that has been used by threat actors since the early 1990s.

It is hard for traditional or legacy AV software based on signatures to catch this type of malware, because the transformation code is not visible for security analysis.

Campaign Analysis

The SideWinder APT group’s new campaign leveraging server-side polymorphism to deliver the next stage payload began in late November 2022. The malicious documents used in this campaign were created to target Pakistan government officials. The documents were designed to trick Pakistan officials by displaying convincing content relevant to their interests.

During the investigation, the Arctic Wolf Labs team analyzed the documents used by the threat group to identify various artefacts used in this campaign to potentially locate other files of interest. The first malicious lure we examined was a document titled GUIDELINES FOR BEACON JOURNAL – 2023 PAKISTAN NAVY WAR COLLEGE (PNWC).

Figure 1: Malicious (fake) lure document targeting Pakistan officials.

MD5

SHA-256

3b853ae547346befe5f3d06290635cf6

bc9d4eb09711f92e4e260efcf7e48906dca6bf239841e976972fd74dac412e2f

File Name PK_P_GAA_A1_Offerred.docx
File Size 36.35 KB (37220 bytes)
Created 2022-12-06 05:24:37 UTC
Author Windows User
Last Modified 2022-12-06T05:24:37Z
Last Modified By Windows User

 

Another malicious document used a while back in early December 2022 was titled PK_P_GAA_A1_Offerred.docx. In this instance, the document was eight pages in length and pretended to be a letter of offer and acceptance “for the purchase of defense articles, defense services, or both.”

Figure 2: First malicious lure sent by the SideWinder APT group.

Notably, none of the documents used an embedded malicious macro code to deliver the next stage payload; instead, the threat group exploited the CVE-2017-0199 vulnerability (remote template injection).

The GUIDELINES FOR JOURNAL – 2023 PAKISTAN NAVY WAR COLLEGE (PNWC).doc malicious lure template was instructed to reach out to the remote address of hxxps[:]//pnwc[.]bol-north[.]com/5808/1/3686/2/0/0/0/m/files-a2e589d2/file[.]rtf. The pnwc[.]bol-north[.]com domain in this instance resolves to the IP address 5.230.73[.]106.

Figure 3: The URL for the next stage download.

The PK_P_GAA_A1_Offerred.docx malicious lure template was instructed to reach out to the remote address of hxxps[:]//paknavy-gov-pkp[.]downld[.]net/14578/1/6277/2/0/0/0/m/files-75dc2b1e/file[.]rtf to download the next stage. The paknavy-gov-pk[.]downld[.]net domain resolves to the IP address 185.205.187[.]234.

Figure 4: URL for next stage download.

During the time when the malicious server was active, this threat group had set their servers in a way that if the user/victim enters part of the malicious URL into their browser, they will be redirected to the legitimate Pakistan Navy home page, which is hxxps[:]//www[.]paknavy[.]gov[.]pk. It is important to note that the malicious server is no longer active.

Figure 5: Legitimate Pakistan Navy website. The victim is redirected to this site from a malicious page.

In early March, we discovered a new document that was also spread through phishing emails. The peculiarity of this OLE document was that it contained the address of the connection to the malicious server, which was also configured to connect to victims from Turkey.

MD5

SHA-256

b7e63b7247be18cdfb36c1f3200c1dba

8af93bed967925b3e5a70d0ad90eae1f13bc6e362ae3dac705e984f8697aaaad

File Name Product.docx
File Size 579.69 KB (593604 bytes)
Created 2023-03-07 13:54:00 UTC
Author user
Last Modified 2023-03-07T13:56:00Z
Last Modified by user


Weaponization

The next stage payload, file.rtf – a rich text document file – can only be downloaded by users in the Pakistani IP range. In both instances, only the name of the file file.rtf and the file type are the same; however, the contents, file size and the file hash are different. This is an example of server-based polymorphism, where each time the server responds with a different version of file, so bypassing the victim’s antivirus scanner (presuming the antivirus uses signature-based detection).

If the user is not in the Pakistani IP range, the server returns an 8-byte RTF file (file.rtf) that contains a single string: {\\rtf1 }. However, if the user is within the Pakistani IP range, the server then returns the malicious RTF payload, which varies between 406KB – 414KB in size.

Figure 6: file.rtf payload.

Loader

Having listed the existing objects in the file.rtf file that was obtained from the paknavy-gov-pk[.]downld[.]net domain, the 1.a object was extracted for further analysis.

Figure 7: 1.a object overview.

During the malware execution chain, this object is saved under the C:\\Users\\user\\AppData\\Local\\Temp\\1.a location on the victim’s machine. The 1.a file is an obfuscated JavaScript.

Figure 8: De-obfuscated strings (Click to enlarge).

There are two things that stand out from our analysis: the base64 encoded data blob, and two URLs. The base64 data blob decodes to Win32 DLL (App.dll), and the two URLs are used for further communications with the threat actor.

Figure 9: URLs used for further communications with SideWinder.

Agent

The previously mentioned base64 encoded data blob is a .NET compiled Win32 DLL called App.dll.

MD5

SHA-256

8934f22ed2d4390f2e6170e4cfdbd483

8b718a15f76768ba29849a5f4a6ca0ff1d9c8ba7bcdc9d89efc792fe20e9fdb5

ITW File Name App.dll
Compilation Stamp Fri Nov 16 02:26:21 2074
File Type/Signature DLL
File Size 139339 (bytes)
Compiler Name/Version Microsoft Visual C# / Basic .NET

 

To further avoid static signature-based detection, the App.dll file is obfuscated in the same way as the majority of other files and scripts uncovered in this campaign.

Figure 10: App.dll file.

The App.dll file is launched by earlier stage JavaScript code. The JavaScript deserializes the .NET binary and passes a URL to the executable’s “Work()” function. This function makes a request to the URL and attempts to decrypt and then execute the response. In other words, the .NET executable can retrieve the next stage code and execute it.

Network Infrastructure

SideWinder’s campaign command-and-control (C2) infrastructure is only live for short periods of time. Non-Pakistani IP responses from the systems hosting RTF files have been identical since at least January 2021, with an 8-byte file with {\\rtf1 } as the content. Following the relationships in VirusTotal shows the distribution infrastructure and the longevity of similar campaigns. 28 domains have been seen in the wild hosting this empty RTF file, all with similar URLs used for hosting.

For these campaigns, SideWinder also uses predictable URL structures when hosting their malicious files:

  • First stage – */2/0/0/*/files-*/ (hta|file.rtf)
  • Second stage – */3/1/1/*/files-*/

The longevity of these tactics, techniques, and procedures (TTPs) – nearly two years – gives us confidence that they can be utilized for the detection of future campaigns.

In mid-March 2023, we discovered a new configured server delivering the payload. This server was different in that it was configured so that a victim in Turkey could receive a second-stage payload. This shows that this threat actor is also now targeting organizations in Turkey.

Targets

The SideWinder APT group’s primary targets are in Southeast Asia regions such as Pakistan and Sri Lanka; however, government institutions in Pakistan still remain their main target of interest. The campaign investigated by Arctic Wolf in early March 2023 identified Turkey as a new target.

Conclusions

This report discussed the SideWinder group’s targeted attack carried out in early December 2022. The latest SideWinder campaign targeting Turkey overlaps with the most recent developments in geopolitics; specifically, in Turkey’s support of Pakistan and the ensuing reaction from India.

The Arctic Wolf Labs team is actively monitoring this threat group’s tooling and malicious files. All the files and network artifacts we identified in this campaign have been listed in the Appendix below for the benefit of defenders and cybersecurity professionals. We hope this data will help provide protection and prevention measures going forward.

APPENDIX

Indicators of Compromise (IOCs)

Indicator Type Indicator
MD5 b7e63b7247be18cdfb36c1f3200c1dba
SHA-256 8af93bed967925b3e5a70d0ad90eae1f13bc6e362ae3dac705e984f8697aaaad
MD5 5efddbdcf40ba01f1571140bad72dccb
SHA-256 a45258389a3c0d4615f3414472c390a0aabe77315663398ebdea270b59b82a5c
MD5 3b853ae547346befe5f3d06290635cf6
SHA-256 bc9d4eb09711f92e4e260efcf7e48906dca6bf239841e976972fd74dac412e2f
MD5 666b2b178ce52e30be9e69de93cc60a9
SHA-256 cd09bf437f46210521ad5c21891414f236e29aa6869906820c7c9dc2b565d8be
MD5 ef00004a1ebc262ffe0fb89aa5524d42
SHA-256 a3283520e04d7343ce9884948c5d23423499fa61cee332a006db73e2b98d08c3
MD5 6c7d24b90f3c6b4383bd7d08374a0c6f
SHA-256 4db0a2d4d011f43952615ece8734ca4fc889e7ec958acd803a6c68b3e0f94eea
MD5 73750f08265bbe80c3f235318bcef6fe
SHA-256 bc3c6f9d51e2bdb37e03b01e2949f72836ecee4230e2320c5dc33a83b55b062f
MD5 16341fcff1bc7388387fd17b4b3a7a50
SHA-256 cf1f4ec1d7db6cf1fe8e15687b348a279889689fa9c387de4a2c310c34336f9f
MD5 1c62441de076eb5a5b2e1f8146767777
SHA-256 75079e408ca9517825ffac396680a2d2169d691be3f1adbbd797e05e665c6fde
MD5 dacdb33b6e9de4c1fe8591bb5a65c55c
SHA-256 cde768a4cf95e58f0e98e2bcca0663fd2c1a36510f6010065b4f54169a92e207
MD5 709e6a64735432c25cafb89951cc149c
SHA-256 a2a9fd1db7f1dc196fa8af0669ea72d1f8ae48bf4775108ee746e0f83c5a7498
URL hxxps[:]//paknavy-gov-pkp[.]downld[.]net/14578/1/6277/2/0/0/0/m/files-75dc2b1e/file[.]rtf
URL hxxps[:]//pnwc[.]bol-north[.]com/5808/1/3686/2/0/0/0/m/files-a2e589d2/file[.]rtf
IP 185.205.187[.]234
IP 5.230.73[.]106
URL hxxps[:]//cstc-spares-vip-163.dowmload[.]net/14668/1/1228/2/0/0/0/m/files-403a1120/file[.]rtf
URL hxxps[:]//mtss.bol-south[.]org/5974/1/8682/2/0/0/0/m/files-b2dff0ca/file[.]rtf
URL hxxps[:]//paknavy-gov-pk[.]downld[.]net/14578/1/6277/2/0/0/0/m/files-75dc2b1e/file[.]rtf
URL hxxts[:]//paknavy-gov-pk[.]downld[.]net/14578/1/6277/2/0/0/0/m/files-75dc2b1e/file[.]rtf
URL hxxts[:]//pnwc[.]bol-north[.]com/5808/1/3686/2/0/0/0/m/files-a2e589d2/file[.]rtf
URL hxxts[:]//sl-navy[.]office-drive[.]live/45/1/334/2/0/0/0/m/files-fe9dade2/file[.]rtf
URL hxxts[:]//forecast[.]comsats-net[.]com/5760/1/5041/2/0/0/0/m/files-dd96433f/file[.]rtf
URL https[:]//forecast[.]comsats-net[.]com/5760/1/5039/2/0/0/0/m/files-d7c7dda1/file[.]rtf
URL hxxts[:]//forecast[.]comsats-net[.]com/5760/1/5035/2/0/0/0/m/files-4a0480ae/file[.]rtf
URL hxxts[:]//moma[.]comsats-net[.]com/5753/1/4375/2/0/0/0/m/files-8062311a/file[.]rtf
URL hxxts[:]//forecast[.]comsats-net[.]com/5760/1/5040/2/0/0/0/m/files-f3b20b30/file[.]rtf
URL hxxts[:]//forecast[.]comsats-net[.]com/5760/1/5036/2/0/0/0/m/files-2ad09cbd/file[.]rtf
URL hxxts[:]//moma[.]comsats-net[.]com/5753/1/4371/2/0/0/0/m/files-b62d382f/file[.]rtf
URL hxxts[:]//srilanka-navy[.]lforvk[.]com/135/1/334/2/0/0/0/m/files-4fdaf6c7/file[.]rtf
URL hxxts[:]//promotionlist[.]comsats-net[.]com/5756/1/8887/2/0/0/0/m/files-3d1dff0f/file[.]rtf
URL hxxts[:]//dgms[.]paknavy-gov[.]com/5733/1/5051/2/0/0/0/m/files-73bdca4d/file[.]rtf
URL hxxts[:]//mofadividion[.]ptcl-gov[.]com/5724/1/3268/2/0/0/0/m/files-11e30891/file[.]rtf
URL hxxts[:]//ksew[.]kpt-gov[.]org/5663/1/3275/2/0/0/0/m/files-937950ad/file[.]rtf
URL hxxts[:]//ministryofforeignaffairs-mofa-gov-pk[.]dytt88[.]org/14444/1/2454/2/0/0/0/m/files-9ba90b7f/file[.]rtf
URL hxxt[:]//bdmil[.]alit[.]live/3398/1/50073/2/0/0/0/m/files-ac995f17/file[.]rtf
URL hxxt[:]//navy-mil-bd[.]jmicc[.]xyz/5625/1/8145/2/0/0/0/m/files-b11074b7/file[.]rtf
URL hxxts[:]//navy-mil-bd[.]jmicc[.]xyz/5625/1/8145/2/0/0/0/m/files-b11074b7/file[.]rtf
URL hxxts[:]//paknavy[.]jmicc[.]xyz/5627/1/4367/2/0/0/0/m/files-9e0912cc/file[.]rtf
URL hxxt[:]//bdmil[.]alit[.]live/3398/1/54346/2/0/0/0/m/files-491dc489/file[.]rtf
URL hxxts[:]//paknavy[.]comsats[.]xyz/5552/1/5037/2/0/0/0/m/files-1b5c7556/file[.]rtf
URL hxxts[:]//mofa-gov[.]interior-pk[.]org/14419/1/6/2/0/0/0/m/files-07b01f9b/file[.]rtf
URL hxxt[:]//mofa-gov[.]interior-pk[.]org/14419/1/6/2/0/0/0/m/files-07b01f9b/file[.]rtf
URL hxxts[:]//paknavy[.]paknavy[.]live/5516/1/4367/2/0/0/0/m/files-db71f6b3/file[.]rtf
URL hxxts[:]//mofabn[.]ksewpk[.]com/5511/1/4993/2/0/0/0/m/files-18e5db65/file[.]rtf
URL hxxt[:]//srilankanavy[.]ksew[.]org/5471/1/1101/2/0/0/0/m/files-cd6e6dbd/file[.]rtf
URL hxxts[:]//srilankanavy[.]ksew[.]org/5471/1/1101/2/0/0/0/m/files-cd6e6dbd/file[.]rtf
URL hxxt[:]//maritimepakistan[.]kpt-pk[.]net/5434/1/3694/2/0/0/0/m/files-ce32ed85/file[.]rtf
URL hxxts[:]//maritimepakistan[.]kpt-pk[.]net/5434/1/3694/2/0/0/0/m/files-ce32ed85/file[.]rtf
URL hxxt[:]//dgmp-paknavy[.]mod-pk[.]com/14325/1/10/2/0/0/0/m/files-5291bef6/file[.]rtf
URL hxxts[:]//dgmp-paknavy[.]mod-pk[.]com/14325/1/10/2/0/0/0/m/files-5291bef6/file[.]rtf
URL hxxt[:]//dgpr[.]paknvay-pk[.]net/5330/1/1330/2/0/0/0/m/files-4d9d0395/file[.]rtf
URL hxxts[:]//cabinet-gov-pk[.]ministry-pk[.]net/14300/1/1273/2/0/0/0/m/files-68ebf815/file[.]rtf
URL hxxts[:]//dgpr[.]paknvay-pk[.]net/5330/1/1330/2/0/0/0/m/files-4d9d0395/file[.]rtf
URL hxxts[:]//careitservices[.]paknvay-pk[.]net/5359/1/4586/2/0/0/0/m/files-266ad911/file[.]rtf
URL hxxts[:]//defencelk[.]cvix[.]live/3023/1/54082/2/0/0/0/m/files-0c31ed2d/file[.]rtf
URL hxxt[:]//mohgovsg[.]bahariafoundation[.]live/5320/1/13/2/0/0/0/m/files-1ddf5195/file[.]rtf
URL hxxts[:]//mohgovsg[.]bahariafoundation[.]live/5320/1/13/2/0/0/0/m/files-1ddf5195/file[.]rtf
URL hxxts[:]//sppc[.]moma-pk[.]org/5281/1/4265/2/0/0/0/m/files-d2608a99/file[.]rtf
URL hxxps[:]//mailrta.mfagov[.]org/3818/1/53382/2/0/0/0/m/files-c78a6966/file[.]rtf
URL http[:]//mailnavybd.govpk[.]net/5845/1/12/2/0/0/0/m/files-ca78574e/file[.]rtf
URL hxxts[:]//mailaplf[.]cvix[.]live/2968/1/50390/2/0/0/0/m/files-7630e91a/file[.]rtf
URL hxxt[:]//slpa[.]mod-gov[.]org/5946/1/5775/2/0/0/0/m/files-fca3cc50/file[.]rtf
URL hxxt[:]//slpa[.]mod-gov[.]org/5946/1/5780/2/0/0/0/m/files-20bba5af/file[.]rtf
URL hxxt[:]//slpa[.]mod-gov[.]org/5946/1/5795/2/0/0/0/m/files-c9dddc54/file[.]rtf
URL hxxt[:]//slpa[.]mod-gov[.]org/5946/1/5797/2/0/0/0/m/files-875e140b/file[.]rtf
URL hxxt[:]//slpa[.]mod-gov[.]org/5946/1/5771/2/0/0/0/m/files-5995311a/file[.]rtf
URL hxxt[:]//slpa[.]mod-gov[.]org/5946/1/5784/2/0/0/0/m/files-94153639/file[.]rtf
URL hxxt[:]//slpa[.]mod-gov[.]org/5946/1/5770/2/0/0/0/m/fi
les-2d21c32e/file[.]rtf
URL hxxt[:]//slpa[.]mod-gov[.]org/5946/1/5778/2/0/0/0/m/files-27d5c7d3/file[.]rtf
URL hxxt[:]//mailnavymilbd[.]govpk[.]net/5848/1/13/2/0/0/0/m/files-57d837e4/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5792/2/0/0/0/m/files-da7756e4/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5776/2/0/0/0/m/files-175c56e7/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5783/2/0/0/0/m/files-a26663eb/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5780/2/0/0/0/m/files-20bba5af/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5785/2/0/0/0/m/files-76f11745/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5788/2/0/0/0/m/files-3acec3be/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5782/2/0/0/0/m/files-78d7e141/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5796/2/0/0/0/m/files-97e02960/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5795/2/0/0/0/m/files-c9dddc54/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5790/2/0/0/0/m/files-a3d0041a/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5773/2/0/0/0/m/files-5a31d681/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5799/2/0/0/0/m/files-03dd18bd/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5781/2/0/0/0/m/files-62caea91/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5804/2/0/0/0/m/files-c43dece3/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5794/2/0/0/0/m/files-60cb1621/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5775/2/0/0/0/m/files-fca3cc50/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5778/2/0/0/0/m/files-27d5c7d3/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5787/2/0/0/0/m/files-fb528413/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5786/2/0/0/0/m/files-5def1d52/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5798/2/0/0/0/m/files-c3178f3d/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5779/2/0/0/0/m/files-2f2e186d/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5789/2/0/0/0/m/files-8822f8ff/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5777/2/0/0/0/m/files-7f2e758b/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5791/2/0/0/0/m/files-bda6f896/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5769/2/0/0/0/m/files-2f6b9c9a/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5774/2/0/0/0/m/files-12eca223/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5772/2/0/0/0/m/files-84c4942a/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5771/2/0/0/0/m/files-5995311a/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5797/2/0/0/0/m/files-875e140b/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5784/2/0/0/0/m/files-94153639/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5770/2/0/0/0/m/files-2d21c32e/file[.]rtf
URL hxxts[:]//slpa[.]mod-gov[.]org/5946/1/5793/2/0/0/0/m/files-f2d0617e/file[.]rtf
URL hxxts[:]//mailrta[.]mfagov[.]org/3818/1/53382/2/0/0/0/m/files-c78a6966/file[.]rtf
URL hxxt[:]//promotionlist[.]comsats-net[.]com/5756/1/8887/2/0/0/0/m/files-3d1dff0f/file[.]rtf
URL hxxts[:]//mailnavymilbd[.]govpk[.]net/5848/1/13/2/0/0/0/m/files-57d837e4/file[.]rtf
URL hxxt[:]//mailnavybd[.]govpk[.]net/5845/1/12/2/0/0/0/m/files-ca78574e/file[.]rtf
Domain slpa[.]mod-gov[.]org
IP 62.113.255[.]80
Domain mailrta[.]mfagov[.]org
IP 194.61.121[.]216
Domain promotionlist[.]comsats-net[.]com
IP 5.255.104[.]32
Domain mailnavybd[.]govpk[.]net
IP 5.255.112[.]194
Domain mailnavymilbd[.]govpk[.]net

 

About Arctic Wolf Labs

Arctic Wolf Labs is a group of elite security researchers, data scientists, and security development engineers who explore security topics to deliver cutting-edge threat research on new and emerging adversaries, develop and refine advanced threat detection models with artificial intelligence and machine learning, and drive continuous improvement in the speed, scale, and detection efficacy of Arctic Wolf’s solution offerings.

Arctic Wolf Labs brings world-class security innovations to not only Arctic Wolf’s customer base, but the security community at large.

 

This article was originally posted on the BlackBerry® blog on May 8th, 2023. Arctic Wolf acquired Cylance® and its teams from BlackBerry in February 2025. The BlackBerry Research and Intelligence team is now part of the Arctic Wolf Labs team.

Share this post: