{"id":21038,"date":"2022-09-20T03:27:00","date_gmt":"2022-09-20T03:27:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=21038"},"modified":"2026-04-17T18:07:43","modified_gmt":"2026-04-17T18:07:43","slug":"operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/","title":{"rendered":"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><\/p>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 1)<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Components<\/h2>\n\n\n\n<p>Evilnum mainly used a new customized trojan in this operation. NSFOCUS Security Labs named it DarkMe based on the particular string in the trojan program.<\/p>\n\n\n\n<p>NSFOCUS Security Labs also discovered another new trojan program that had a close connection to this operation and named it PikoloRAT, also based on the particular string in the program.<\/p>\n\n\n\n<p><strong>1.  DarkMe<\/strong><\/p>\n\n\n\n<p>DarkMe is a VisualBasic spy trojan developed by Evilnum attackers and is used in various attack flows. The initial version of DarkMe appeared on September 25, 2021, and five iteration versions have been released so far.<\/p>\n\n\n\n<p>The communication ability of DarkMe is implemented through the public module WinSock32 (http:\/\/leandroascierto.com\/blog\/winsock32\/). This module creates a window named SOCKET_WINDOW to implement socket communication with the server.<\/p>\n\n\n\n<p>On the basis of this module, a significant number of functional codes are gradually added to DarkMe, allowing it to evolve from a downloader trojan into a stub spy trojan.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Functions<\/li><\/ul>\n\n\n\n<p>Different versions of DarkMe have different functional codes. Here, we will describe the trojan program version 5, ShellRunDllVb.dll, that appeared in this operation.<\/p>\n\n\n\n<p>After ShellRunDllVb.dll is executed, it will collect host information and send it to the C&amp;C server. DarkMe collects the following host information, including the geolocation abbreviation, country name, computer name, user name, antivirus software list, trojan mark, and the title of the foreground window. These items are separated by a fixed separator 0x3F, and prepended with a fixed string &#8220;92&acirc;&euro;. The resulting register information is then sent to the C&amp;C server.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Register-traffic-of-DarkMe.png\"><img decoding=\"async\" width=\"300\" height=\"55\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Register-traffic-of-DarkMe-300x55.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21039\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Register-traffic-of-DarkMe-300x55.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Register-traffic-of-DarkMe-600x111.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Register-traffic-of-DarkMe-200x37.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Register-traffic-of-DarkMe.png 639w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>     Register traffic of DarkMe<\/figcaption><\/figure>\n<\/div>\n\n\n<p>DarkMe has multiple modules to support different espionage functions. clsfile is a major module used to implement file operations under C&amp;C control. The C&amp;C instruction is contained in the first six bytes of the communication content. The function of each instruction is described as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-DarkMe-instructions.png\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-DarkMe-instructions.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21041\" width=\"481\" height=\"474\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-DarkMe-instructions.png 808w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-DarkMe-instructions-300x296.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-DarkMe-instructions-768x758.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-DarkMe-instructions-600x592.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-DarkMe-instructions-200x197.png 200w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/a><figcaption>Description of DarkMe instructions<\/figcaption><\/figure>\n<\/div>\n\n\n<p>In addition, DarkMe has been integrated with a set of <a href=\"https:\/\/forums.codeguru.com\/showthread.php?15579-Save-Screen-Capture-output-to-a-file\" target=\"_blank\" rel=\"noreferrer noopener\">public codes<\/a> to achieve the screenshot function.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Screenshot-function-implemented-by-DarkMe-right-and-public-code-left.png\"><img decoding=\"async\" width=\"300\" height=\"145\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Screenshot-function-implemented-by-DarkMe-right-and-public-code-left-300x145.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21043\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Screenshot-function-implemented-by-DarkMe-right-and-public-code-left-300x145.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Screenshot-function-implemented-by-DarkMe-right-and-public-code-left-1024x495.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Screenshot-function-implemented-by-DarkMe-right-and-public-code-left-768x371.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Screenshot-function-implemented-by-DarkMe-right-and-public-code-left-600x290.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Screenshot-function-implemented-by-DarkMe-right-and-public-code-left-200x97.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Screenshot-function-implemented-by-DarkMe-right-and-public-code-left.png 1082w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>Screenshot function implemented by DarkMe (right) and public code (left)<\/figcaption><\/figure>\n<\/div>\n\n\n<p>DarkMe also provides persistence and self-updating functions as well as the keylogging function in some versions.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Versions<\/li><\/ul>\n\n\n\n<p>With a deeper look at samples in the wild, NSFOCUS Security Labs found DarkMe had a history of more than half a year, and was already available in multiple versions. The version iteration timeline of DarkMe is as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Version-iteration-of-DarkMe.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"129\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Version-iteration-of-DarkMe-300x129.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21045\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Version-iteration-of-DarkMe-300x129.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Version-iteration-of-DarkMe-768x331.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Version-iteration-of-DarkMe-600x258.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Version-iteration-of-DarkMe-200x86.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Version-iteration-of-DarkMe.png 834w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>     Version iteration of DarkMe<\/figcaption><\/figure>\n<\/div>\n\n\n<p>It can be seen that during its lifecycle, DarkMe has evolved from a loader trojan to a spy trojan, and then to a stub payload integrated into complex attack flows. DarkMe version 4 and DarkMe version 5 both have complete code functions and can be used as a primary stealing tool or as a loader for other tools, so they were widely adopted by Evilnum attackers in recent attacks.<\/p>\n\n\n\n<p><strong>2.  PikoloRAT<\/strong><\/p>\n\n\n\n<p>NSFOCUS discovered another new remote control trojan, PikoloRAT, during the in-depth analysis of the relevant information of this operation. PikoloRAT comes with typical remote control functions and can use built-in components to implement more complex control operations.<\/p>\n\n\n\n<p>Since the built-in C&amp;C addresses of PikoloRAT were found to coincide with the addresses used in this operation and PikoloRAT could complement the above-mentioned DarkMe, NSFOCUS Security Labs believed that PikoloRAT was used as an extension component by Evilnum attackers in the later stage of this operation.<\/p>\n\n\n\n<p>The discovered cases demonstrated that PikoloRAT was delivered via a downloader trojan or packaged as a compressed file.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Functions<\/li><\/ul>\n\n\n\n<p>PikoloRAT is a typical RAT trojan program written in C#.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Main-frame-of-PikoloRAT.png\"><img loading=\"lazy\" decoding=\"async\" width=\"291\" height=\"293\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Main-frame-of-PikoloRAT.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21047\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Main-frame-of-PikoloRAT.png 291w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Main-frame-of-PikoloRAT-150x150.png 150w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Main-frame-of-PikoloRAT-200x201.png 200w\" sizes=\"(max-width: 291px) 100vw, 291px\" \/><\/a><figcaption>      Main frame of PikoloRAT<\/figcaption><\/figure>\n<\/div>\n\n\n<p>After PikoloRAT runs, it first collects and uploads the host information. The collected contents include the trojan mark, user name, computer name, geolocation, operating system version, trojan running time, trojan version, and antivirus software information. PikoloRAT uses a &#8220;|&#8221; to separate the preceding items, prepends them with a fixed string &#8220;654321&#8221;, and then sends it to the C&amp;C server.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Online-traffic-of-PikoloRAT.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"68\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Online-traffic-of-PikoloRAT-300x68.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21049\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Online-traffic-of-PikoloRAT-300x68.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Online-traffic-of-PikoloRAT-600x135.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Online-traffic-of-PikoloRAT-200x45.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Online-traffic-of-PikoloRAT.png 639w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>      Online traffic of PikoloRAT<\/figcaption><\/figure>\n<\/div>\n\n\n<p>It can be seen that the content and format of the online traffic of PikoloRAT are similar to those of the above-mentioned DarkMe.<\/p>\n\n\n\n<p>Then PikoloRAT enters the controlled state to control host behaviors by obtaining instructions from C&amp;C servers. The supported remote control instructions are as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-PikoloRAT-instructions.png\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"698\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-PikoloRAT-instructions.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21051\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-PikoloRAT-instructions.png 512w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-PikoloRAT-instructions-220x300.png 220w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Description-of-PikoloRAT-instructions-200x273.png 200w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><figcaption>                Description of PikoloRAT instructions<\/figcaption><\/figure>\n<\/div>\n\n\n<p>In addition to basic remote control functions, PikoloRAT can perform more sophisticated remote control by dropping the built-in PEGASUS HVNC module, a recently leaked hVNC tool.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Techniques and Tactics<\/h2>\n\n\n\n<p><strong>Overwriting Files While Sideloading<\/strong><\/p>\n\n\n\n<p>In attack flow A, Evilnum attackers delivered a malicious file <strong>python39.dll<\/strong> and sideloaded it through a legitimate file <strong>python.exe<\/strong>. Different from common sideloading build logics, <strong>python39.dll<\/strong> was obtained by directly overwriting the original <strong>python39.dll<\/strong>. Evilnum attackers directly wrote a piece of shellcode to the location of the function PyImport_AddModuleObject of the original <strong>python39.dll<\/strong> so that the shellcode was started when <strong>python39.dll<\/strong> was loaded.<\/p>\n\n\n\n<p>The benefits of this design are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Easy to operate. It is not required to compile a separate DLL program to implement the export.<\/li><li>Wide applicability. In theory, any legitimate DLL file can be overwritten in a similar way to build a sideloading shellcode attack chain.<\/li><li>Strong concealment. The new DLL file is so similar to the original DLL file that it is not easy to locate.<\/li><\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Overwritten-PyImport_AddModuleObject-function-in-python39.dll_.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"133\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Overwritten-PyImport_AddModuleObject-function-in-python39.dll_-300x133.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21053\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Overwritten-PyImport_AddModuleObject-function-in-python39.dll_-300x133.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Overwritten-PyImport_AddModuleObject-function-in-python39.dll_-600x266.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Overwritten-PyImport_AddModuleObject-function-in-python39.dll_-200x89.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Overwritten-PyImport_AddModuleObject-function-in-python39.dll_.png 723w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>      Overwritten PyImport_AddModuleObject function in python39.dll<\/figcaption><\/figure>\n<\/div>\n\n\n<p><strong>Shellcode Framework<\/strong><\/p>\n\n\n\n<p>In attack flow A, Evilnum attackers used different shellcodes at different stages. Since these shellcodes had similar code implementation logic, NSFOCUS Security Labs believed that they originated from the same shellcode programming framework. The overall composition and code complexity in this operation were improved compared to previous Evilnum activities.<\/p>\n\n\n\n<p><strong>ntdll Mapping<\/strong><\/p>\n\n\n\n<p>In the shellcode used in this operation, Evilnum attackers still adopted two modules, kernel32 and ntdll, to build the main attack flow. To avoid API detection for such behaviors, the attackers used the following method to map the ntdll file and use the API of the mapped file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Mapping-logic-of-the-ntdll-module-in-the-shellcode.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"101\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Mapping-logic-of-the-ntdll-module-in-the-shellcode-300x101.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21055\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Mapping-logic-of-the-ntdll-module-in-the-shellcode-300x101.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Mapping-logic-of-the-ntdll-module-in-the-shellcode-768x259.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Mapping-logic-of-the-ntdll-module-in-the-shellcode-600x203.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Mapping-logic-of-the-ntdll-module-in-the-shellcode-200x68.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Mapping-logic-of-the-ntdll-module-in-the-shellcode.png 912w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>           Mapping logic of the ntdll module in the shellcode<\/figcaption><\/figure>\n<\/div>\n\n\n<p>In the implementation, the attacker reloaded the ntdll module through file mapping, and obtained the API base address of the mapped API by calculating the offset of the base address of the API in the original ntdll file. Then the shellcode used the mapped API to implement corresponding behaviors, thus avoiding original API call behaviors and preventing key parameters from being monitored and recorded.<\/p>\n\n\n\n<p><strong>X64call<\/strong><\/p>\n\n\n\n<p>In attack flow A, Evilnum attackers used X64call to call key APIs while injecting cmd.exe.<\/p>\n\n\n\n<p>The injected shellcode firstly detected the process environment and the host CPU model. If the requirements were satisfied, it would call their 64-bit implementations while using key injection APIs such as NtAllocateVirtualMemory and NtWriteVirtualMemory.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-logic-in-the-shellcode-injection-code.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-logic-in-the-shellcode-injection-code-300x150.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21057\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-logic-in-the-shellcode-injection-code-300x150.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-logic-in-the-shellcode-injection-code-600x300.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-logic-in-the-shellcode-injection-code-200x100.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-logic-in-the-shellcode-injection-code.png 707w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>            X64call calling logic in the shellcode injection code<\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-code.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"86\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-code-300x86.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21059\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-code-300x86.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-code-200x58.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/X64call-calling-code.png 503w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>            X64call calling code<\/figcaption><\/figure>\n<\/div>\n\n\n<p>This technique can also bypass API detection.<\/p>\n\n\n\n<p><strong>Image Steganography<\/strong><\/p>\n\n\n\n<p>Evilnum attackers used two types of steganographic images in this operation.<\/p>\n\n\n\n<p>In attack flow B, the image IMG.jpg used redundant steganography that deposited the malicious code at the end of the file and used a fixed string ($HEH$E) as the separator.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Steganographic-information-in-IMG.jpg..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Steganographic-information-in-IMG.jpg.-300x159.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21061\"><\/a><figcaption>Steganographic information in IMG.jpg.<\/figcaption><\/figure>\n<\/div>\n\n\n<p>In attack flow A, the image carrying the payload used the RGB color image steganography scheme that deposited the malicious code in the R color pixel.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/RGB-values-in-the-steganographic-image-sKr93I.png-right-and-extracted-compressed-data-content-left.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"52\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/RGB-values-in-the-steganographic-image-sKr93I.png-right-and-extracted-compressed-data-content-left-300x52.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21063\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/RGB-values-in-the-steganographic-image-sKr93I.png-right-and-extracted-compressed-data-content-left-300x52.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/RGB-values-in-the-steganographic-image-sKr93I.png-right-and-extracted-compressed-data-content-left-1024x178.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/RGB-values-in-the-steganographic-image-sKr93I.png-right-and-extracted-compressed-data-content-left-768x133.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/RGB-values-in-the-steganographic-image-sKr93I.png-right-and-extracted-compressed-data-content-left-600x104.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/RGB-values-in-the-steganographic-image-sKr93I.png-right-and-extracted-compressed-data-content-left-200x35.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/RGB-values-in-the-steganographic-image-sKr93I.png-right-and-extracted-compressed-data-content-left.png 1122w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>RGB values in the steganographic image sKr93I.png (right) and extracted compressed data content (left)<\/figcaption><\/figure>\n<\/div>\n\n\n<p>This construction could make blue-green dots show in white areas and red dots show in black areas in the steganographic image.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-sKr93I.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-sKr93I-300x300.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21065\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-sKr93I-300x300.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-sKr93I-150x150.png 150w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-sKr93I-230x230.png 230w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-sKr93I-400x400.png 400w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-sKr93I-200x200.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-sKr93I.png 592w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>Appearance of the steganographic image sKr93I.png<\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-Fruit.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"201\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-Fruit-300x201.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21067\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-Fruit-300x201.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-Fruit-768x516.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-Fruit-600x403.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-Fruit-200x134.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Appearance-of-the-steganographic-image-Fruit.png 901w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>Appearance of the steganographic image Fruit.png<\/figcaption><\/figure>\n<\/div>\n\n\n<p><strong>Socket Window<\/strong><\/p>\n\n\n\n<p>In this operation, the trojan DarkMe used SOCKET_WINDOW communication, an old VisualBasic socket programming technique that hooks winsock messages through a SOCKET_WINDOW window and handles event messages passed by WSAAsyncSelect in the window callback function. For the original framework, refer to <a href=\"https:\/\/github.com\/dzzie\/RE_Plugins\/blob\/master\/IdaVbScript\/vb%20src\/MSocketSupport.bas\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p><strong>COM Component Execution<\/strong><\/p>\n\n\n\n<p>Some DarkMe trojans were delivered as COM components in this operation. Evilnum attackers wrote the registry operation logic to the preloaded trojan payload, allowing it to generate and execute the file Register.reg that contained the following contents.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Contents-of-Register.reg_.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"103\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Contents-of-Register.reg_-300x103.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21069\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Contents-of-Register.reg_-300x103.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Contents-of-Register.reg_-768x265.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Contents-of-Register.reg_-600x207.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Contents-of-Register.reg_-200x69.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Contents-of-Register.reg_.png 839w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption>             Contents of Register.reg<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Then the preloaded trojan payload started DarkMe via a <strong>cmd<\/strong> command in the form like rundll \/sta [CLSID] &#8216;Hello&#8217;. This could avoid direct calls to DarkMe, reducing exposure risks to a certain extent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Operation DarkCasino is a series of ongoing APT attacks targeting cash flows in online trading. The Evilnum group adopted a variety of ever-improving attack techniques and tools, demonstrating its keen sense of confrontation.<\/p>\n\n\n\n<p>The analysis showed that the attack scope of Operation DarkCasino was not limited to Europe. Under the operation of the Evilnum attackers, this attack was extended to some Asian countries, which may cause unexpected damage.<\/p>\n\n\n\n<p>To effectively prevent this operation, online financial platform users should pay special attention to files of LNK, PIF, SCR, and COM types transmitted through various channels and be more vigilant of files with keywords such as offer, visa, and casino to avoid Evilnum attacks, which may cause direct economic losses.<\/p>\n\n\n\n<p><strong>Indicators of Compromise (IoCs)<\/strong><\/p>\n\n\n\n<p>Decoy files of attack flow A<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><code>43eda4ff53eef4513716a5b773e6798653ee29544b44a9ae16aa7af160a996f2<\/code><\/td><td><code>offer deal visa 2022.lnk<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Decoy files of attack flow B<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><code>5fb252474237a4ca96cc0433451c7d7a847732305d95ceeaeb10693ecef2eeee<\/code><\/td><td><code>Scatters Casino offers Daily Promotions.pif<\/code><\/td><\/tr><tr><td><code>8e4a4c5e04ff7ebacb5fe8ff6b27129c13e91a1acc829dbb3001110c84dc8633<\/code><\/td><td><code>new casino crypto.com<\/code><\/td><\/tr><tr><td><code>d0899cb4b94e66cb8623e823887d87aa7561db0e9cf4028ae3f46a7b599692b9<\/code><\/td><td><code>Promo CPL CPA Traffic.com<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Decoy files of attack flow C<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><code>4ffa29dead7f6f7752f2f3b0a83f936f270826d2711a599233dc97e442dee85f<\/code><\/td><td><code>333TER.exe<\/code><\/td><\/tr><tr><td><code>9cf7f8a93c409dd61d019ca92d8bc43cc9949e244c9080feba5bfc7aac673ac3<\/code><\/td><td><code>d33v3TER.exe<\/code><\/td><\/tr><tr><td><code>259cebed2cd89da395df2a3588fadde82cd6542bc9ff456890f7ee2087dc43c9<\/code><\/td><td><code>d333TER.exe<\/code><\/td><\/tr><tr><td><code>0cdf27bb8c0c90fc1d60fb07bd30b7e97b16d15e3f58fb985350091ecad51ba6<\/code><\/td><td><code>ed333TER.exe<\/code><\/td><\/tr><tr><td><code>5ba84191a873d823ccf336adfa219cc191a004e22b56b99c6d0e1642144129b8<\/code><\/td><td><code>wed333TER.exe<\/code><\/td><\/tr><tr><td><code>15a076c7bb6a38425d96aa08b8a15e9a838c9697d57c835aaca92fd01607b07a<\/code><\/td><td><code>PayRedeemUpdateIntegration19052022.scr<\/code><\/td><\/tr><tr><td><code>3329f5e3a67d13bd602dca5bbe8e2d0b5d3b5cb7cb308965fb2599a66668c207<\/code><\/td><td><code>offer crypto casino.scr<\/code><\/td><\/tr><tr><td><code>8a49a7f6c95fade72ef86455794cdedfca9129aa0f5281e09929dfebfb3417c4<\/code><\/td><td><code>DOCUMENTATION AGREEMENTS S CONSULTING INTEGRATION.pif<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Downloader Trojan<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><code>864dccbeda7d88cad91336b5ae9efd50972508d1d8044226e798d039a0bc1da2<\/code><\/td><td><code>AONNRJP.exe<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>PikoloRAT Trojan<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><code>eb5e42c726c7b125564455d56a02b9d42672ca061575ff911672b9165e8e309d<\/code><\/td><td><code>stub1.exe<\/code><\/td><\/tr><tr><td><code>be544a1f9f642bb35a9bd0942ae16a7a6e58a323d298a408a00fa4c948e8ea17<\/code><\/td><td><code>Stub1.exe<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>DarkMe Trojan<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><code>a826570f878def28b027f6e6b2fcd8be1727e82666f8b65175d917144f5d0569<\/code><\/td><td><code>Project1.exe<\/code><\/td><\/tr><tr><td><code>7b478cd8b854c9046f45f32616e1b0cbdc9436fa078ceddb13ce9891b24b30a5<\/code><\/td><td><code>Project1.exe<\/code><\/td><\/tr><tr><td><code>e72337c08d6b884b64fd9945c5a01557ccf40db93af866c00c48d36b6605f3a0<\/code><\/td><td><code>Project1.exe<\/code><\/td><\/tr><tr><td><code>414a11e8eabb64add97a866502edcd7e54108bd247f4ae12fe07feeae4e549f6<\/code><\/td><td><code>Projec3.exe<\/code><\/td><\/tr><tr><td><code>7913cdf40cc17a28487a71ab0d7724b8bf3646a2a53e3905798ce23a657061b8<\/code><\/td><td><code>Project1.exe<\/code><\/td><\/tr><tr><td><code>3a6694567e9d722357b8e92153d9c878bbcab55a2f65cd0f9a2e6579fbeb935a<\/code><\/td><td><code>Projec3.exe<\/code><\/td><\/tr><tr><td><code>a6a70c85b8c40932678c413fde202a55fcfc9d9cae23822708be5f28f9d5b6d2<\/code><\/td><td><code>Projec3.exe<\/code><\/td><\/tr><tr><td><code>c50ebe13972e6e378248d80d53478d8e01e754c5d87113d9b6f93bf3b84380b4<\/code><\/td><td><code>Project1.exe<\/code><\/td><\/tr><tr><td><code>1ac7715b1762788b5dc1f5f2fc35243a072fe77053df46101ce05413cca62666<\/code><\/td><td><code>Projec3.exe<\/code><\/td><\/tr><tr><td><code>4ecc2925cfb073323314611a3892d476a58ff2f6b510b434996686e2f0ac3af7<\/code><\/td><td><code>Projec3.exe<\/code><\/td><\/tr><tr><td><code>541b3011953a3ce1a3a4a22c8c4f58c6a01df786a7cc10858649f8f70ee0a2f3<\/code><\/td><td><code>Projec3.exe<\/code><\/td><\/tr><tr><td><code>f25cbc53d0cc14b715ee83e51946d5793e4e86e71e96f68e9b6c839b514e8cb8<\/code><\/td><td><code>Projec3.exe<\/code><\/td><\/tr><tr><td><code>4244f274a12f4672f2dda1190559d96c5a9631c9ee573b853c89e30701819b63<\/code><\/td><td><code>Projec24.pif<\/code><\/td><\/tr><tr><td><code>1f0d908c677fb3ec5b9422eb5f7d2a2b3ffa01659521afc07cc4dfaea27aa532<\/code><\/td><td><code>Nuovo.pif<\/code><\/td><\/tr><tr><td><code>028057e54a2e813787a14b7d33e6a2caa91485ed879ef1bbcb94df0e1cf91356<\/code><\/td><td><code>bvo.exe<\/code><\/td><\/tr><tr><td><code>0a9c183f0b5a225228da5e8589fac8b3affe2e51c790a08148ef72481de610c4<\/code><\/td><td><code>bvo.exe<\/code><\/td><\/tr><tr><td><code>3eb84676249cb26dd3d1962cfca2a9fde442d0feaa1b0351f6331313f3ac1138<\/code><\/td><td><code>bvo.exe<\/code><\/td><\/tr><tr><td><code>46fbfc263959084d03bd72c5b6ee643711f79f7d76b391d4a81f95b2d111b44e<\/code><\/td><td><code>bvofinal.pif<\/code><\/td><\/tr><tr><td><code>5e04dd49b82320eca63b483e87453d2a68a9f4873f47d37e5080d537bc811d0e<\/code><\/td><td><code>pppppesst.exe<\/code><\/td><\/tr><tr><td><code>dc8190279dcea4f9a36208ba48b14e6c8313ef061252027ef8110b2d0bd84640<\/code><\/td><td><code>pppppesst.exe<\/code><\/td><\/tr><tr><td><code>4959cdba7edee68b5116cc1b8ef5016978d3dff2016f027a4f76b080b7c3849a<\/code><\/td><td><code>faster.exe<\/code><\/td><\/tr><tr><td><code>24ace8fd73b2a5a13f3e5b459f0764dd4b5bda2cea2b0e13bbf88a88afe0cdac<\/code><\/td><td><code>fastest.exe<\/code><\/td><\/tr><tr><td><code>c66e6ee55e9799a8a32b7a2c836c26bb7ebea98d09c1535ad9ae59e9628835fb<\/code><\/td><td><code>fastest.exe<\/code><\/td><\/tr><tr><td><code>32ce8d0dcbfcc2517480d0e08f8896ab4f6ea13ccb0eefe7205cd352c7b359c3<\/code><\/td><td><code>h5a.exe<\/code><\/td><\/tr><tr><td><code>c192684d296ea587e93457d060cbef900143cf1a11301e6c2e34e264e3e55ef6<\/code><\/td><td><code>h5a.exe<\/code><\/td><\/tr><tr><td><code>1d01b143a56eba431387b9b973790d174deb48c2e3445d96b131a7d8e0a9d4ef<\/code><\/td><td><code>vvt1.exe<\/code><\/td><\/tr><tr><td><code>b8ba2c0478649dc099d0a869755a7e205173a9b0d15fad920317a89d07eaa930<\/code><\/td><td><code>vvt1.exe<\/code><\/td><\/tr><tr><td><code>d95853e6e16d90c00fd72aaeaca9885b953dae14d7d6aa7fedcc6150fb788667<\/code><\/td><td><code>656.exe<\/code><\/td><\/tr><tr><td><code>7add6700c6e1aa1ac8782fdd26a11283d513302c672e3d62f787572d8ad97a21<\/code><\/td><td><code>ShellRunDllVb.dll<\/code><\/td><\/tr><tr><td><code>17fe047b9a3695d4fd8ad9d2f7f37486c0bc85db0f9770471442d31410ff26a1<\/code><\/td><td><code>ShellRunDllVb.dll<\/code><\/td><\/tr><tr><td><code>2665a09ec5b4ca913f9f3185df62495f13611831dba9073779a36df088db143b<\/code><\/td><td><code>ShellRunDllVb.dll<\/code><\/td><\/tr><tr><td><code>7c06a03d712be8c0df410bea5d1c2004c6247bcde5a46ce51746f18de9621ac1<\/code><\/td><td><code>ShellRunDllVb.dll<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>URL<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td>https[:]\/\/puccino.altervista.org\/wp-content\/uploads\/2022\/05\/6h.txt<\/td><\/tr><tr><td>https[:]\/\/storangefilecloud.vip\/IMG.jpg<\/td><\/tr><tr><td>https[:]\/\/storangefilecloud.vip\/PI.txt<\/td><\/tr><tr><td>https[:]\/\/storangefilecloud.vip\/PRGx.jpg<\/td><\/tr><tr><td>https[:]\/\/bukjut11.com\/FRIGO.JPG<\/td><\/tr><tr><td>https[:]\/\/bukjut11.com:443\/AEVC.JPG<\/td><\/tr><tr><td>https[:]\/\/imagizer.imageshack.com\/img922\/1527\/sKr93I.png<\/td><\/tr><tr><td>https[:]\/\/imagizer.imageshack.com\/img923\/7651\/jMwIGI.png<\/td><\/tr><tr><td>https[:]\/\/i.imgur.com\/fkNiY9Z.png<\/td><\/tr><tr><td>https[:]\/\/laurentprotector.com\/LRGBPFV.bin<\/td><\/tr><tr><td>https[:]\/\/laurentprotector.com\/NnQFqsOEUtkezvIEcLpfa.bin<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Darkme C&amp;C<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td>aka7newmalp23.com<\/td><\/tr><tr><td>csmmmsp099q.com<\/td><\/tr><tr><td>muasaashishaj.com<\/td><\/tr><tr><td>cspapop110.com<\/td><\/tr><tr><td>938jss.com<\/td><\/tr><tr><td>8as1s2.com<\/td><\/tr><tr><td>kalpoipolpmi.net<\/td><\/tr><tr><td>pallomnareraebrazo.com<\/td><\/tr><tr><td>185.236.231.74<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>PikoloRAT C&amp;C<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td>51.195.57.232<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 1) Components Evilnum mainly used a new customized trojan in this operation. NSFOCUS Security Labs named it DarkMe based on the particular string in the trojan program. NSFOCUS Security Labs also discovered another new trojan program that had a close connection to this operation [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21034,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[94],"class_list":["post-21038","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-apt-group"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2) - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 1) Components Evilnum mainly used a new customized trojan in this operation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-20T03:27:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Freature-Image-APT-Evilnum-e1663550763255.png\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 1) Components Evilnum mainly used a new customized trojan in this operation.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Freature-Image-APT-Evilnum-e1663550763255.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2)\",\"datePublished\":\"2022-09-20T03:27:00+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/\"},\"wordCount\":1639,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Freature-Image-APT-Evilnum-e1663550763255.png\",\"keywords\":[\"APT Group;\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/\",\"name\":\"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Freature-Image-APT-Evilnum-e1663550763255.png\",\"datePublished\":\"2022-09-20T03:27:00+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Freature-Image-APT-Evilnum-e1663550763255.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Freature-Image-APT-Evilnum-e1663550763255.png\",\"width\":200,\"height\":156,\"caption\":\"Hacker in dark room, APT Group Evilnum.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2) - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/","og_locale":"pt_BR","og_type":"article","og_title":"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2) - NSFOCUS","og_description":"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 1) Components Evilnum mainly used a new customized trojan in this operation.","og_url":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/","og_site_name":"NSFOCUS","article_published_time":"2022-09-20T03:27:00+00:00","article_modified_time":"2026-04-17T18:07:43+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Freature-Image-APT-Evilnum-e1663550763255.png","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2) - NSFOCUS","twitter_description":"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 1) Components Evilnum mainly used a new customized trojan in this operation.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Freature-Image-APT-Evilnum-e1663550763255.png","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"11 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2)","datePublished":"2022-09-20T03:27:00+00:00","dateModified":"2026-04-17T18:07:43+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/"},"wordCount":1639,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Freature-Image-APT-Evilnum-e1663550763255.png","keywords":["APT Group;"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/","url":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/","name":"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Freature-Image-APT-Evilnum-e1663550763255.png","datePublished":"2022-09-20T03:27:00+00:00","dateModified":"2026-04-17T18:07:43+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Freature-Image-APT-Evilnum-e1663550763255.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Freature-Image-APT-Evilnum-e1663550763255.png","width":200,"height":156,"caption":"Hacker in dark room, APT Group Evilnum."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/operation-darkcasino-in-depth-analysis-of-attacks-by-apt-group-evilnum-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Operation DarkCasino: In-Depth Analysis of Attacks by APT Group Evilnum (Part 2)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=21038"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21038\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/21034"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=21038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=21038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=21038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}