Post

Operation CargoTalon UNG0901 Targets Russian Aerospace & Defense Sector using EAGLET implant.

Introduction

SEQRITE Labs APT-Team has recently found a campaign targeting the Russian Aerospace Industry. The campaign aims at employees of Voronezh Aircraft Production Association (VASO), a significant aircraft production entity in Russia, using товарно-транспортная накладная (TTN) documents, which are critical to Russian logistics operations. The entire malware ecosystem involved in this campaign is based on the usage of a malicious LNK file EAGLET DLL implant, further executing malicious commands and exfiltrating data.

In this blog, we will explore the campaign’s technical details, examining the various stages from a deep dive into the initial infection chain to the implant used, concluding with a final overview covering the campaign.

To read the complete article see: Operation CargoTalon

This post is licensed under CC BY 4.0 by the author.