hunt.io Open in urlscan Pro
52.223.52.2  Public Scan

URL: https://hunt.io/blog/darkpeony-certificate-patterns
Submission: On December 21 via api from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Hunt.io 2024 Year in Review Key Product & Research Highlights

Read Now


Threat Hunting Platform - Hunt.io

Home

Product



Features



Resources



About

Login

Book Your Free Demo



Home



Blog



DarkPeony’s Trail: Certificate Patterns Point to Sustained Campaign
Infrastructure


DARKPEONY’S TRAIL: CERTIFICATE PATTERNS POINT TO SUSTAINED CAMPAIGN
INFRASTRUCTURE

Published on

Nov 21, 2024


TABLE OF CONTENTS
DarkPeony?Digital Footprints: Certificate AnalysisAdditional LinksTime For
Something Different?ConclusionNetwork Observables

In a recent blog post, we discussed SSL/TLS certificates tied to suspected PlugX
command and control (C2) nodes, which featured recurring use of 'AES' in the
organizational unit field. Building on this, we've also identified two
additional suspicious certificates on the same infrastructure linked to domains
likely used to download or communicate with malware.

These findings, alongside domain registration patterns, align closely with the
infrastructure previously reported by NTT as being associated with DarkPeony.
The group's repeated use of similar certificates and servers indicates a
sustained operational tempo, enabling us to track this cluster of activity
consistently over time.

This post will explore these network observables and provide context to assist
defenders in proactively identifying future infrastructure before it becomes
operationalized.


DARKPEONY?

DarkPeony is a suspected Chinese cyber-espionage group known for targeting
government and military organizations. As highlighted in NTT's report, the group
was observed deploying PlugX malware in its campaigns, targeting entities across
Myanmar, the Philippines, Mongolia, and Serbia.

The group primarily leverages infrastructure providers in Hong Kong, with CTG
Server Ltd. and ChangLian Network Technology Co. being the most frequently
observed networks. NameCheap and NameSilo are used to register domains, while
CloudFlare nameservers are employed, likely in an attempt to conceal activity
from researchers.

The domain buyinginfo[.]org was listed as one of the PlugX C2 servers in the
report and became our starting point for looking for similar DarkPeony
infrastructure. We identified the IP address linked to the above domain as
103.107.105[.]81. As shown in Figure 1, the server uses three certificates of
importance to our research:  (2) CloudFlare and (1) TrustAsia Technologies, Inc.

Figure 1: SSL History overview of 103.107.105.81 (Hunt).

Checking out the details for the certificate first seen on 2024-05-24, we see a
DNS name of buyinginfo[.]org and the wildcard subdomain, *.buyinginfo[.]org.

Figure 2: Certificate details showing the domain name from the NTT report
(Hunt).


DIGITAL FOOTPRINTS: CERTIFICATE ANALYSIS

Our blog post about PlugX from last month identified a cluster of five servers
suspected to be linked with PlugX activity. Each of these servers utilized a
certificate featuring the letters "AES" in the Organizational Unit field,
suggesting a potential marker for the infrastructure used by this actor.

Please revisit the prior post for a more detailed examination and the Advanced
Search query used. Figure 3 below shows the results of running the query at that
time. 

Figure 3: Advanced Search query results for the certificates containing "AES." 

Focusing on the certificates of 96.43.101[.]248, we noticed a CloudFlare (CF)
certificate we hadn't dug into previously. Using well-known services can greatly
hinder analysis, allowing the infrastructure to blend in with benign servers.
Techniques like these have been seen in other operations, such as those
targeting government mail servers. We'll touch on a probable query that will
allow us to get around this temporary roadblock later.

Figure 4: SSL History for the subject IP illustrates the AES and CloudFlare
certs (Hunt).

Interestingly, the most recent certificate (SHA-256:
130c463eefbfbdc2b33eefbfbd18efbfbd030819e3abbc08efbfbd5342efbfbd77efbfbd01efbfbd) 
from the above screenshot contains the domain name vabercoach[.]com.

Figure 5: Certificate details for 96.43.101[.]248 (Hunt).

Clicking on the "Certificate IPs' button, we find our first pivot, a single IP
address sharing this same certificate: 223.26.52[.]245.

Figure 6: Screenshot of the shared certificate IPs (Hunt).

Our investigation into vabercoach[.]com led us to various sandboxes, including
VirusTotal and Hatching Triage, and sources like X/Twitter, which revealed a
malicious file named 'Meeting Invitation.msc' (SHA-256:
397afb74746b2fe01abc63789412b38f44ceb234a278a04b85b2bb5b4e64cc8c) communicating
with the domain.

Notably, the same file name was observed in the Operation ControlPlug campaign,
as documented by NTT.

The screenshot below (Figure 7) illustrates network traffic from Hatching
Triage. It shows calls to the domain's endpoint/unit and activity involving an
additional domain, loginge[.]com.

Figure 7: The network portion of the analysis of 'Meeting Invitation.msc'
(Triage).

Note: The domains in the above figure resolve to CloudFlare allocated network
space, thus hiding the true IP address.

Before diving into the remainder of the servers linked to DarkPeony, below is a
pseudo-query that may assist in identifying additional CloudFlare certificates
with minimal false positives. The following criteria should serve as a starting
point for analysts seeking to expand their investigation and include ASNs as
they are found:

JARM Fingerprint:
"2ad2ad0002ad2ad22c2ad2ad2ad2ad703dc1bf20eb9604decefea997eabff7" AND Subject
Common Name:"CloudFlare Origin Certificate" AND ASN:"152194, 137443"

The above could be enhanced to include port 443, which the certificate uses
almost exclusively. Keep in mind that if the actor(s) changes the port in the
future, we will need to adjust accordingly.


ADDITIONAL LINKS

We'll continue our findings by featuring the 'AES' and CloudFlare certificates
and identify any domains associated with the IPs. Unfortunately, we have not
found any additional malware samples communicating with or referenced by the
below.

Our first server, 146.66.215[.]19 stands out as an anomaly compared to the rest
of the infrastructure. This IP address is provided by Datacamp Limited, located
in Great Britain. Figure 8 shows the hosted certificates.

Figure 8: SSL History overview for 146.66.215[.]19 (Hunt).

councilofwizards[.]com is the single domain linked to this server using
CloudFlare services.


45.32.105[.]184

Another server, 45.32.105[.]184, is provided by Vultr Holdings, LLC, located in
Singapore. The domain associated with this CloudFlare certificate,
thelocaltribe[.]com follows the same patterns noted earlier in this analysis.

Figure 9: Screenshot of the certificate overview for 45.32.105[.]184 (Hunt).


TIME FOR SOMETHING DIFFERENT?


149.104.2[.]160

Hosted by XNNET LLC in Hong Kong, 149.104.2[.]160 presents a different
characteristic. Unlike the previously mentioned servers, this IP does not use
the 'AES' certificate but instead uses CloudFlare and another cert commonly
reported as used by other threat actors to deploy malware like PlugX.

The certificate fields contain the following:

 * Subject Common Name: Root CA
 * Subject Country: US
 * Subject Organization: TrustAsia Technologies, Inc.
 * Subject Organizational Unit: Domain Validated SSL
 * Subject City: Seattle
 * Subject State: Washington.

Domain for CF cert on 149.104.2[.]160: smldatacenter[.]com

Figure 10: SSL History for 149.104.2[.]160 (Hunt).


202.91.36[.]213

Our final IP we'll cover also uses the CF and TrustAsia certificates at
202.91.36[.]213, hosted on ChangLian Network Technology Co., Limited.

kentscaffolders[.]com is the domain linked to the CloudFlare cert on this
server.

Figure 11: Certificate fields showing the kentscaffolders[.]com domain name
(Hunt).

Honorable mention: Rounding out the above IPs using the CF & TrustAsia
certificates is 223.26.52[.]208 on the CTG Server Limited network. The second
domain seen earlier communicating with the malicious .msc file, loginge[.]com,
is listed as a DNS name for the CloudFlare certificate.


CONCLUSION

In this post, we expanded on previously observed IPs/domains linked to
DarkPeony, highlighting their continued use of certificate and domain
registration practices to obfuscate malicious activity using legitimate
services. The threat actor uses wildcard certificates with domains protected by
CloudFlare to conceal the actual IP addresses and facilitate malware
communication, effectively complicating tracking efforts.

Our focus was on the most recent IP addresses linked to this infrastructure.
These elements provide valuable insights into the actor's constant operations.
Security teams are encouraged to leverage these indicators to proactively hunt
for emerging infrastructure as it appears, allowing for earlier detection and
disruption of DarkPeony's activities.


NETWORK OBSERVABLES

IP AddressCountryASNCerts/Hash103.107.105[.]81HKADCDATA.COMCloudFlare:
708D60B51595D2CDB313E40E9215E3857D931AC9368F308B4FC3244C75BB2F7E
TrustAsia:
D64C9AAA5447427AA5DEB13FF80FF1D73B8C074F1666AB452A80E0BD45825CED96.43.101.248USEthr.Net
LLCAES: 994260498E6BDAD93AF7052C99CC7A894A0B9D509BCF28391399F0BBF41FB6E6
CloudFlare:
130C463ED1C2B33E88F618DC030819E3ABBC0898E953428888DA77EDDF01C18D223.26.52.245HKCTG
Server LimitedCloudFlare:
130C463ED1C2B33E88F618DC030819E3ABBC0898E953428888DA77EDDF01C18D146.66.215.19GBDatacamp
LimitedAES: B9949EF3D7FED686ECAF04CC9EBEBC55FB7594C94F51E9794AB7BC4BB3237CF0
CloudFlare:
3BCBED98FAF9C8ADDAEDF04DBBB04D0BF457190DBC98E5548183EEEACC9D9A6D45.32.105.184SGThe
Constant CompanyAES:
A0097944D47F7174231CE7A38A3C25CC51D9E9A70D5574CE04AA427EE6A3A78F
CloudFlare:
05D9D2785E08FED0BD3BE97BD267CD56752381A5F032FE8D140A9A0AE54FF5D4149.104.2.160HKXNNET
LLCCloudFlare: EEB4AE9ACC598DE874257A70941EDDA377C9EF45E7F3059C8C5D28778F87DD5B
TrustAsia:
2F35B0A119A7CA8204F4D158ABCDC90163B0F19F968367C685ED3A86258C45F4202.91.36.213HKChangLian
Network Technology Co., LimitedCloudFlare:
6D14946DB325352CF82161B5AA1BB3442F6B980269A0CDBFEDB1311DC795AEF9
TrustAsia:
F888DA96249AEA874229554A433EE3E5AB2483D400EF10C20FDA4118149F45B8223.26.52[.]208HKCTG
Server LimitedCloudFlare:
366e5abec0c2495720223e0438996ebff3d3596fd516e5a06d9c908c7c2057c1
TrustAsia: 6CFB62E5FEAE0DE193B3F04B47E534A95BDE79FBE3B74E582233F341C510E1DD


RELATED POSTS:

Dec 20, 2024

HUNT.IO 2024 YEAR IN REVIEW KEY PRODUCT & RESEARCH HIGHLIGHTS

Discover Hunt.io's 2024 highlights: major product launches, innovations like
AttackCapture™, C2 Feed, and Hunt SQL, and a look ahead to 2025.

Dec 12, 2024

OYSTER’S TRAIL: RESURGENCE OF INFRASTRUCTURE LINKED TO RANSOMWARE AND CYBERCRIME
ACTORS

Our latest analysis uncovers domains linked to the Oyster backdoor, revealing
suspected Vanilla Tempest infrastructure and offering insights into server
configuration patterns.

Dec 10, 2024

“MILLION OK !!!!” AND THE NAVER FACADE: TRACKING RECENT SUSPECTED KIMSUKY
INFRASTRUCTURE

Learn how the 'Million OK!!!' HTTP response previously linked to Kimsuky has
reappeared on new IPs and domains. This update provides the latest insights into
evolving infrastructure, helping defenders stay informed on potential North
Korean threat activity.

Dec 5, 2024

MOQHAO LEVERAGES ICLOUD AND VK IN CAMPAIGN TARGETING APPLE IDS AND ANDROID
DEVICES

Discover how the MoqHao campaign leveraging iCloud and VK employs cross-platform
tactics to steal credentials and distribute malicious APKs.

Ready to get started?

We can help you unravel networks of threat actor infrastructure blending into
hosting providers.

Get a Free Demo Today


Threat Hunting Platform - Hunt.io

Threat Hunting Platform - Hunt.io



Products

Web Interface

Feeds

Enrichment API

Features

AttackCapture™

HuntSQL™

New

C2 Detection

IOC Hunter

Phishing Infrastructure

Resources

Change Log

Terms & Conditions

Privacy Policy

Support Docs

Malware Families

Latest News

Hunt.io 2024 Year in Review Key Product & Research Highlights

Dec 20, 2024

Oyster’s Trail: Resurgence of Infrastructure Linked to Ransomware and Cybercrime
Actors

Dec 12, 2024

“Million OK !!!!” and the Naver Facade: Tracking Recent Suspected Kimsuky
Infrastructure

Dec 10, 2024

©2024

Hunt Intelligence, Inc.