The Acronis Menace Analysis Unit (TRU) has revealed a complicated marketing campaign believed to be orchestrated by the SideWinder superior persistent risk (APT) group.
This operation, operating by way of early 2025, has primarily focused high-value authorities and navy establishments throughout Sri Lanka, Bangladesh, and Pakistan, exploiting unpatched legacy Microsoft Workplace vulnerabilities to deploy credential-stealing malware whereas evading modern detection mechanisms.
On the coronary heart of SideWinder’s technique is a mix of outdated and new: attackers craft spear-phishing emails that impersonate native governmental our bodies or high-level organizations, embedding malicious Phrase or RTF attachments.
These paperwork exploit CVE-2017-0199 and CVE-2017-11882, vulnerabilities which have endured in lots of organizations on account of insufficient patch administration.

CVE-2017-0199 permits distant code execution by leveraging malicious exterior object references in Workplace recordsdata, whereas CVE-2017-11882 abuses a reminiscence corruption bug within the legacy Equation Editor element, permitting attackers to execute arbitrary code upon doc opening.
Uniquely, SideWinder integrates geofenced payload distribution the attackers’ servers ship the following an infection stage provided that the sufferer’s IP and Consumer-Agent headers match the meant targets in Bangladesh, Sri Lanka, or Pakistan.

Non-targeted customers obtain benign decoy paperwork or error messages, thwarting evaluation and minimizing detection.
As soon as the exploitation chain begins, a shellcode-based loader, embedded throughout the RTF payload, triggers.
This shellcode is closely obfuscated, using reminiscence inspection and sandbox evasion methods, solely advancing if the surroundings seems reliable.
It downloads a second-stage binary, individually encoded for every sufferer by server-side polymorphism, and injects it right into a trusted course of (usually explorer.exe) utilizing basic Home windows API strategies like VirtualAllocEx and CreateRemoteThread.
Credential Harvesting
The third-stage payload is a DLL recognized internally as “StealerBot.CppInstallerDocx.dll.”
This module, executed through rundll32.exe or DLL sideloading by way of a reliable signed executable (TapiUnattend.exe), collects a big selection of delicate knowledge: usernames, system specs, drive particulars, MAC tackle, community configuration, and put in AV merchandise.
This data is base64-encoded, obfuscated, and despatched again to the command-and-control (C2) server, which is regularly rotated to evade IP/area blocklists.
The attackers make use of persistence through Home windows Startup folder LNK (shortcut) recordsdata that set off the malicious chain on reboot.
Additional, the ultimate malware parts are protected with XOR encoding and loaded in-memory, avoiding disk writes and complicating forensics.
StealerBot is proficient at each exfiltrating credentials and sustaining entry, utilizing stealthy communications and layering encrypted C2 channels with dynamic area infrastructure.
Infrastructure and Concentrating on
TRU analysts noticed a major uptick in associated malicious domains by way of early 2025, reflecting SideWinder’s useful resource dedication and operational tempo.
The C2 domains registered in bursts and rotated regularly are crafted to impersonate authorities, monetary, or protection organizations, enhancing social engineering credibility.
The group’s lures are extremely personalized; notable examples embrace invites to navy occasions or official financial briefings, tailor-made for Sri Lanka’s Military 55 Division and the Central Financial institution of Sri Lanka’s IT directorate.
Whereas the marketing campaign references a broad vary of high-value establishments, confirmed victimology is presently restricted to the Sri Lankan and Bangladeshi navy and monetary sectors, indicating a mixture of direct focusing on and credibility-boosting impersonation in SideWinder’s phishing emails.
The attackers preserve operational safety by producing distinctive payloads per goal, utilizing server-side polymorphism to frustrate signature-based detection and automated pattern correlation.
Organizations in South Asia notably these in authorities, navy, or important infrastructure are urged to implement quick patching of legacy Workplace vulnerabilities, particularly CVE-2017-0199 and CVE-2017-11882.
Disabling macros and exterior template loading, limiting the usage of mshta.exe, wscript.exe, and powershell.exe, and deploying behavioral detection instruments that flag anomalous little one processes or reminiscence injection are important steps.
Community-level filtering in opposition to recognized malicious domains and consumer schooling to acknowledge spear-phishing hallmarks are additionally important to scale back threat.
This marketing campaign reinforces how resilience in opposition to well-known exploits calls for not simply superior detection, but additionally relentless consideration to fundamental safety hygiene.
SideWinder’s evolving techniques combining geofenced distribution, shellcode loaders, DLL sideloading, and fast infrastructure churn exhibit the persistent risk posed by APTs leveraging “forgotten” vulnerabilities.
Indicators of Compromise (IOCs)
Sort | Indicator | Description |
---|---|---|
SHA256 Doc | 57b9744b30903c7741e9966882815e1467be1115cbd6798ad4bfb3d334d3523d | Malicious DOC, “Warning In opposition to Propaganda…” |
SHA256 RTF | e4afb43a13e043d99ff0fb0a0ac49e96a04932ba37365527914d6be779597edf | Exploit RTF, CVE-2017-11882 |
SHA256 Payload | 61132f15775224f8aae02499b90b6bc19d4b3b44d987e0323276dceb260cc407 | Stage 3, StealerBot DLL |
SHA256 DLL | c62e365a6a60e0db4c2afd497464accdb783c336b116a5bc7806a4c47b539cc5 | Ultimate unencrypted StealerBot pattern |
Area | advisory[.]army-govbd[.]data | C2 Infrastructure |
Area | updates-installer[.]retailer | C2 Infrastructure |
Area | dwnlld[.]com | C2 Infrastructure |
Area | bismi[.]professional | C2 Infrastructure |
C2 Panel URL | hxxps://ecility[.]xyz | StealerBot management panel |
File | TapiUnattend.exe (MD5: b574abf43dcc57a359129d1adb4cdda0) | Legit used for DLL sideloading |
File | wdscore.dll (MD5: b37522b69406b3f6229b7f3bbef0a293) | Malicious DLL loader |
Discover this Information Fascinating! Observe us on Google Information, LinkedIn, & X to Get Immediate Updates!