Donot Team

Description

(ASERT) In late January 2018, ASERT discovered a new modular malware framework we call “yty”. The framework shares a striking resemblance to the EHDevel framework. We believe with medium confidence that a team we call internally as “Donot Team” is responsible for the new malware and will resume targeting of South Asia.

In a likely effort to disguise the malware and its operations, the authors coded several references into the malware for football—it is unclear whether they mean American football or soccer. The theme may allow the network traffic to fly under the radar.

The actors use false personas to register their domains instead of opting for privacy protection services. Depending on the registrar service chosen, this could be seen as another cost control measure. The actors often used typo-squatting to slightly alter a legitimate domain name. In contrast, the registration information used accurate spelling, possibly indicating the domain naming was intentional, typos included. Each unique registrant usually registered only a few domains, but mistakenly reused phone numbers or the registration data portrayed a similar pattern across domains.

Names

NameName-Giver
Donot TeamASERT
APT-C-35Qihoo 360
SectorE02ThreatRecon

Country

Motivation

  • Information theft and espionage

First Seen

2016

Observed Sectors

Observed Countries

Tools

Operations

Information

Other Information

Uuid

15dd32b1-f4c1-4a96-bf89-02ff532b1540

Last Card Change

2025-02-22