ChChes
Description
(Palo Alto) In addition to using PlugX and Poison Ivy (PIVY), both known to be used by the group, they also used a new Trojan called “ChChes” by the Japan Computer Emergency Response Team Coordination Center (JPCERT). In contrast to PlugX and PIVY, which are used by multiple campaigns, ChChes appears to be unique to this group. An analysis of the malware family can be found later in this blog.
Interestingly, the ChChes samples we observed were digitally signed using a certificate originally used by HackingTeam and later part of the data leaked when they were themselves hacked. Wapack labs also observed a similar sample targeting Japan in November. It’s not clear why the attackers chose to use this certificate, as it was old, had been leaked online, and had already been revoked by the time they used it. Digital certificates are typically used because they afford an air of legitimacy, which this one definitely does not.
Names
Name |
---|
ChChes |
HAYMAKER |
Ham Backdoor |
Scorpion |
Category
Malware
Type
- Backdoor
Information
- https://unit42.paloaltonetworks.com/unit42-menupass-returns-new-malware-new-attacks-japanese-academics-organizations/
- https://www.cylance.com/en_us/blog/the-deception-project-a-new-japanese-centric-threat.html
- https://www.jpcert.or.jp/magazine/acreport-ChChes_ps1.html
- https://www.jpcert.or.jp/magazine/acreport-ChChes.html
- https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Mitre Attack
Malpedia
Alienvault Otx
Other Information
Uuid
641359e0-3415-45b2-a304-860ecb58ac7d
Last Card Change
2020-05-13