APT & Targeted Attacks
Earth Lamia Develops Custom Arsenal to Target Multiple Industries
Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to targeted organisations.
Summary
- Trend Research has identified Earth Lamia as an APT threat actor that exploits vulnerabilities in web applications to gain access to organisations, using various techniques for data exfiltration.
- Earth Lamia develops and customises hacking tools to evade detection, such as PULSEPACK and BypassBoss.
- Earth Lamia has primarily targeted organisations in Brazil, India, and Southeast Asia since 2023. Initially focused on financial services, the group shifted to logistics and online retail, most recently focusing on IT companies, universities, and government organisations.
- Trend Vision One™ detects and blocks the IOCs discussed in this blog. Trend Vision One also provides hunting queries, threat insights, and threat intelligence reports to gain rich context and the latest updates on Earth Lamia.
Introduction
We have been tracking an active intrusion set that primarily targets organisations located in countries including Brazil, India, and Southeast Asia since 2023. The threat actor mainly targets the SQL injection vulnerabilities discovered on web applications to access the SQL servers of targeted organisations. The actor also takes advantage of various known vulnerabilities to exploit public-facing servers. Research reports have also mentioned their aggressive operations, including REF0657, STAC6451, and CL-STA-0048. Evidence we collected during our research indicates this group is a China-nexus intrusion set, which we now track as Earth Lamia.
Earth Lamia is highly active, but our observation found that its targets have shifted over different time periods. They targeted many organisations but focused only on a few specific industries during each time period. In early 2024 and prior, we observed that most of their targets were organisations within the financial industry, specifically related to securities and brokerage. In the second half of 2024, they shifted their targets to organisations mainly in the logistics and online retail industries. Recently, we noticed that their targets have shifted again to IT companies, universities, and government organisations.

Earth Lamia continuously develops customised hacking tools and backdoors to improve their operations. While the actor highly leverages open-source hacking tools to conduct their attacks, they also customised these hacking tools to reduce the risk of being detected by security software. We also discovered they have developed a previously unseen backdoor, which we named PULSEPACK. The first version of PULSEPACK was identified in Earth Lamia's attacks during August 2024. In 2025, we found an upgraded version of PULSEPACK, which uses a different protocol for C&C communication, showing they are actively developing this backdoor. In this report, we will reveal the details of Earth Lamia’s operations and share the analysis of their customised hacking tools and backdoors.
Initial access and post-exploitation TTPs
We found that Earth Lamia frequently conducted vulnerability scans to identify possible SQL injection vulnerabilities on the targets' websites. With an identified vulnerability, the actor tried to open a system shell through it to gain remote access to the victims' SQL servers. We suspect they are likely using tools like "sqlmap" to carry out these attacks against their targets. Besides the SQL injection attempts, our telemetry shows the actor also exploited the following vulnerabilities on different public-facing servers:
- CVE-2017-9805: Apache Struts2 remote code execution vulnerability
- CVE-2021-22205: GitLab remote code execution vulnerability
- CVE-2024-9047: WordPress File Upload plugin arbitrary file access vulnerability
- CVE-2024-27198: JetBrains TeamCity authentication bypass vulnerability
- CVE-2024-27199: JetBrains TeamCity path traversal vulnerability
- CVE-2024-51378: CyberPanel remote code execution vulnerability
- CVE-2024-51567: CyberPanel remote code execution vulnerability
- CVE-2024-56145: Craft CMS remote code execution vulnerability
More recently, Earth Lamia also exploited CVE-2025-31324 (SAP NetWeaver Visual Composer unauthenticated file upload vulnerability). The report mentioned two of attackers’ IP addresses, 43[.]247[.]135[.]53 and 103[.]30[.]76[.]206, which we clustered as Earth Lamia’s infrastructure. (We discuss these details in the Attribution section.)
After a successful exploitation of vulnerabilities to gain access to a server, we observed the following general lateral movement activities within the victims' network:
- Using "certutil.exe" or “powershell.exe” to download additional tools from the attacker’s machine
- Deploying webshells to website applications
- Performing privilege escalation using tools such as "GodPotato" and "JuicyPotato"
- Scanning the network using tools like "Fscan" and "Kscan"
- Creating a user account named "helpdesk" and adding it to the administrators' local group
- Obtaining credentials by dumping the LSASS memory or extracting the SAM hive and the SYSTEM hive from the Windows Registry
- Cleaning Windows Application, System and Security event logs with “wevtutil.exe”
- Collecting domain controller information with “nltest.exe” and “net.exe”
- Establishing proxy tunnels to the Victims' network with tools such as "rakshasa" and "Stowaway"
- Executing backdoors generated from the command-and-control frameworks, including "Vshell", "Cobalt Strike", and "Brute Ratel"
- Using “schtasks.exe” to persist the backdoor execution
We also noticed the threat actor used SQL injection vulnerabilities to execute the following commands. The commands create a new account "sysadmin123" with administrator permissions on the targeted SQL servers. It allows the actor to directly access and exfiltrate victim databases.
CREATE LOGIN sysadmin123 WITH PASSWORD = 'qwe123QWE';
ALTER SERVER ROLE sysadmin ADD MEMBER sysadmin123;
Customised hacking tools
Earth Lamia often modifies open-source hacking tools for its own use. They remove unnecessary static strings from the hacking tools, such as help or debug messages. Some essential static strings are also obfuscated. These customisations are aimed at reducing the chances of detection by security software. For example, we identified a privilege escalation tool that was named "BypassBoss" in the PDB string. This tool was used multiple times in different incidents by Earth Lamia. After our analysis, we found that this tool is a modified version of "Sharp4PrinterNotifyPotato", whose original source code was shared on a Chinese forum.

In addition, we found that Earth Lamia packages its hacking tools into DLL files to launch them via DLL sideloading. Our telemetry data showed multiple times that the actor executed a legitimate executable “AppLaunch.exe” (Microsoft.NET ClickOnce Launch Utility) with suspicious arguments. In one case, we observed that the arguments are similar to those used by “Mimikatz”.
C:\Users\Public\Downloads\AppLaunch.exe "log C:\Users\Public\Downloads\res.txt"
"privilege::debug" "sekurlsa::logonpasswords" "exit"
Later, we were able to collect one of their DLL samples. The DLL file (SHA256: 1d0b246f8d43442ea0eaecde5cfa7fcd8139a9ba93496cd82a8ac056f7393bcf) was named "mscoree.dll," which is one of the libraries loaded by "AppLaunch.exe". We found the actor packaged an entire binary of "JuicyPotato" into the DLL file with "VOIDMAW”, an open-source tool to package malicious code to bypass memory scanners. This allows the actor to execute their hacking tools in memory inside the process of a legitimate executable. We believe the actor employs these or similar approaches to launch their hacking tools with DLL sideloading.
Besides that, Earth Lamia also created their backdoor loaders by adopting DLL sideloading. Interestingly, the actor prefers to use the legitimate binaries provided by security vendors to sideload their malicious DLL files.

Other researchers had found that one of the earlier versions of their loaders was a modification of the open-source project “MemoryEvasion” to load malicious Base64-encoded shellcode. We discovered an extended version of their Cobalt Strike loaders, which use the RC4 encryption to protect the malicious shellcode.
From an example we found in their sideloading samples, the payload file “readme.txt” has the first 128 bytes used to produce the RC4 key, and the rest of the data is the RC4-encrypted shellcode. After launching with a legitimate binary, the DLL sideloading loader reads data from the payload file. It duplicates the 128-byte key twice to restore the 256-byte RC4 key. It then uses the restored key to decrypt the rest of the data and has the original Cobalt Strike shellcode execute in memory.

We also found another DLL sideloading loader used by Earth Lamia to execute Brute Ratel shellcode. This loader uses AES instead. The loader has the pre-configured AES 256-byte key and initial vectors embedded in the binary. Although the loader does not directly use the embedded key for decryption, it computes the hash of the 256-byte key using SHA256, resulting in a hash that is also 256 bytes in size. The hash value is the key to decrypt the encrypted shellcode stored in the payload file “VCRUNTIME140C.dll”.

Analysis of the PULSEPACK backdoor
In August 2024, we noticed Earth Lamia started using a previously unseen backdoor, which we named PULSEPACK. PULSEPACK is a modular.NET backdoor designed with a simple primary executable that only includes necessary capabilities for command-and-control (C&C) communication. Each malicious function is developed as a separate plugin. The plugins will only be loaded from the C&C server when needed. In the first version of PULSEPACK that we discovered, it contained the following configuration information embedded within the executable:
- The IP address and the port number of the default C&C server
- The URL to get an updated C&C IP address and port number pair
- The AES key and the AES IV value to encrypt the communication
At the beginning, PULSEPACK cheques the configured URL to get the address of the C&C server. If the value of the URL is empty or it fails to retrieve the C&C address from the URL, the backdoor will connect to the default C&C server with a TCP socket. Once the TCP socket is connected, the backdoor decodes an embedded data to restore a core DLL file and execute it in memory with the “Assembly.Load” approach. The core DLL handles the C&C commands and launches plugins delivered from the C&C server. Initially, it sends the victim’s information to the C&C server, including:
- System version and username
- The backdoor process name and process privilege
- Installed antivirus software
- A hash value calculated with the system and the hardware information

It then waits for the C&C server to deliver the plugins, which are then executed. The delivered plugins are Base64-encoded and compressed into the ZIP format. The core DLL restores the plugins from the delivered data and launches them with the “Assembly.Load” approach. The core DLL launches the plugins from a function named "Run" as the entry point. PULSEPACK encrypts the execution result with the AES algorithm before sending it to the C&C server.
Since March 2025, we found Earth Lamia deployed a new version of PULSEPACK. It changes the protocol of C&C communication from a TCP socket to a WebSocket. In addition, the new PULSEPACK also becomes smaller as they separated the core DLL from the backdoor and made it a plugin that will be loaded from the C&C server. Once the backdoor connects to the C&C server, the server sends a message appended with a random UUID as the victim ID. The values are concatenated with a number sign “#”.
IsWindows#{UUID}
The backdoor responds with a message composed of the given UUID and a tag string embedded in the backdoor.
IsWindowsReturnMessageParam#{UUID}#{Tag}
Then, it delivers the first plugin called "InitStart.dll," which collects the same information about the infected machine as the original core DLL. After these initialisation steps, the backdoor waits for the plugins issued from the C&C server to execute.
GetWinDowsMessage#{UUID}#{C&C URL}#{Plugin (Base64 encoded)}#{Function name}

We also noticed a PULSEPACK sample which loaded a plugin DLL called "TKRun.dll”, which is used for persisting the execution of the backdoor by creating a scheduled task to launch the executable after a system reboot. Unfortunately, we couldn’t discover additional plugins used by PULSEPACK. Our telemetry data shows that the backdoor process can drop files and create a subprocess called "cmd.exe" to execute commands on the victims' machines. This suggests that more plugins could exist for the file drop or remote shell access purposes.

Attribution
In January 2024, an intrusion set identified as REF0657 targeted the financial services sector in South Asia. We believe these are also activities of Earth Lamia. Our telemetry data also shows Earth Lamia targeted Indian financial organisations during 2023 and early 2024. Many of the mentioned attack tactics and hacking tools in this report and those used by Earth Lamia are identical. In addition, we found a Cobalt Strike sample used by Earth Lamia connects to a C&C domain "chrome-online[.]site". The domain certificate of "chrome-online[.]site" was found to be adopted on "149[.]104[.]23[.]176," which has been reported as the IP address used by REF0657.
In August 2024, a report on a Mimic ransomware campaign tracked as STAC6451 was published. The report noted that some attack tactics are linked to REF0657. This report mentioned the following activities, which were likely from Earth Lamia:
- The username “helpdesk” and password “P@ssw0rd” pair created during the attack
- The use of the hacking tool "Sophosx64.exe," which is the "GodPotato" tool. We also found the same tool with the same filename used in Earth Lamia's attack.
- The Cobalt Strike loader "USERENV.dll" developed with the open-source project "MemoryEvasion", which is the same as we mentioned above, is used by Earth Lamia.
Some of the attack tactics mentioned in the STAC6451 report are very different from those of Earth Lamia. We believe the report of STAC6451 may include the activities from two different intrusion sets. During our research, we didn't see Earth Lamia use any ransomware. It could be that Earth Lamia collaborated with the Mimic ransomware campaign before, or they just happened to infect the same victims, as both targeted SQL servers in India.
In January 2025, a research team reported an espionage operation they tracked as CL-STA-0048. They found connections between this campaign, the Chinese threat actor “DragonRank”, and REF0657, which is Earth Lamia. We found the following activities mentioned in the report were likely from Earth Lamia:
- The behaviour to download files from 206[.]237[.]0[.]49 which was used by Earth Lamia
- The use of the legitimate binary “AppLaunch.exe” to sideload Cobalt Strike and hacking tools
Our research currently tracks "DragonRank" and Earth Lamia as two different intrusion sets. We haven't seen evidence that these two intrusion sets are linked or collaborated. However, we cannot rule out this possibility.
In May 2025, researchers shared their observations on multiple China-nexus APT campaigns targeting CVE-2025-31324. One of the mentioned campaigns used the IP address 43[.]247[.]135[.]53, which is associated with a Cobalt Strike C&C domain “sentinelones[.]com”. The C&C domain has been attributed to CL-STA-0048. We believe part of CL-STA-0048’s activities are from Earth Lamia’s operation. However, we have only a medium confidence to attribute the IP address 43[.]247[.]135[.]53 and the exploitation behaviour to Earth Lamia as there’s already a time gap between the periods when the IP address was in use during 2024 and 2025.
The same report attributes another IP address 103[.]30[.]76[.]206 to an intrusion set UNC5174 as the VShell C&C server. Our research shows this IP address is currently used by Earth Lamia instead of UNC5174 with high confidence. We also found a VShell sample (SHA256: bb6ab67ddbb74e7afb82bb063744a91f3fecf5fd0f453a179c0776727f6870c7), which communicates with this IP address. This sample is similar to the other samples used by Earth Lamia:
- First, the identified VShell sample is packaged as a DLL loader with the same packaging approach using VOIDMAW we mentioned
- Second, the identified VShell sample has a same PDB string “C:\Users\qweqw\Downloads\Voidmaw-master\Voidmaw-master\x64\Debug\Dll1.pdb” that we also found in the other samples used by Earth Lamia
The original attribution to UNC5174 is based on the fact that the attacks delivered a VShell stager called SNOWLIGHT. The stager has been reported to be used by UNC5174. However, this may not be reliable because SNOWLIGHT is also one of default stagers in the VShell framework. Anyone using the framework could generate the stager to load their VShell backdoor.

Conclusion
Earth Lamia is conducting its operations across multiple countries and industries with aggressive intentions. At the same time, the threat actor continuously refines their attack tactics by developing custom hacking tools and new backdoors. They primarily target their victims via vulnerable websites, SQL servers, and systems publicly facing the Internet. To go against these threats, organisations must regularly update and patch their systems to prevent attackers from gaining initial access. Monitoring is essential to detect unusual activities. Adopting proactive security solutions that integrate robust prevention, detection, and response capabilities will help organisations significantly strengthen their defences.
Proactive security with Trend Vision One™
Trend Vision One™ is the only AI-powered enterprise cybersecurity platform that centralises cyber risk exposure management, security operations, and robust layered protection. This comprehensive approach helps you predict and prevent threats, accelerating proactive security outcomes across your entire digital estate. Backed by decades of cybersecurity leadership and Trend Cybertron, the industry's first proactive cybersecurity AI, it delivers proven results: a 92% reduction in ransomware risk and a 99% reduction in detection time. Security leaders can benchmark their posture and showcase continuous improvement to stakeholders. With Trend Vision One, you’re enabled to eliminate security blind spots, focus on what matters most, and elevate security into a strategic partner for innovation.
Trend Micro™ Threat Intelligence
To stay ahead of evolving threats, Trend customers can access Trend Vision One™ Threat Insights, which provides the latest insights from Trend Research on emerging threats and threat actors.
Trend Vision One Threat Insights
- Emerging Threats: Earth Lamia Develops Custom Arsenal to Target Multiple Industries
- Threat Actor: Earth Lamia
Trend Vision One Intelligence Reports (IOC Sweeping)
- Earth Lamia Develops Custom Arsenal to Target Multiple Industries
Hunting Queries
Trend Vision One Search App
Trend Vision One customers can use the Search App to match or hunt the malicious indicators mentioned in this blog post with data in their environment.
Backdoor C&C servers of Earth Lamia
eventSubId: 204 AND (dst: 154.211.89.5 OR dst: 185.238.251.38 OR dst: 206.237.2.40 OR dst: 206.237.5.19 OR dst: 206.238.179.172 OR dst: 206.238.199.21)
More hunting queries are available for Trend Vision One customers withThreat Insights Entitlement enabled.
MITRE ATT&CK techniques
Tactic | Technique | ID |
Reconnaissance | Active Scanning: Scanning IP Blocks | T1595.001 |
Active Scanning: Vulnerability Scanning | T1595.002 | |
Gather Victim Host Information | T1592 | |
Gather Victim Network Information | T1590 | |
Resource Development | Acquire Infrastructure: Domains | T1583.001 |
Acquire Infrastructure: Virtual Private Server | T1583.003 | |
Develop Capabilities: Malware | T1587.001 | |
Stage Capabilities: Upload Malware | T1608.001 | |
Stage Capabilities: Upload Tool | T1608.002 | |
Initial Access | Exploit Public-Facing Application | T1190 |
Valid Accounts | T1078 | |
Execution | Command and Scripting Interpreter: PowerShell | T1059.001 |
Command and Scripting Interpreter: Windows Command Shell | T1059.003 | |
Persistence | Account Manipulation: Additional Local or Domain Groups | T1098.007 |
Create Account: Local Account | T1136.001 | |
Scheduled Task/Job: Scheduled Task | T1053.005 | |
Server Software Component: Web Shell | T1505.003 | |
Defence Evasion | Exploitation for Privilege Escalation | T1068 |
Valid Accounts: Local Accounts | T1078.003 | |
Deobfuscate/Decode Files or Information | T1140 | |
Hijack Execution Flow: DLL | T1574.001 | |
Impair Defences: Disable or Modify Tools | T1562.001 | |
Indicator Removal: Clear Windows Event Logs | T1070.001 | |
Masquerading: Match Legitimate Resource Name or Location | T1036.005 | |
Reflective Code Loading | T1620 | |
Credential Access | OS Credential Dumping: LSASS Memory | T1003.001 |
OS Credential Dumping: Security Account Manager | T1003.002 | |
Discovery | Account Discovery: Local Account | T1087.001 |
Account Discovery: Domain Account | T1087.002 | |
Domain Trust Discovery | T1482 | |
Lateral Movement | Lateral Tool Transfer | T1570 |
Collection | Data from Local System | T1005 |
Command and Control | Data Encoding: Standard Encoding | T1132.001 |
Encrypted Channel: Symmetric Cryptography | T1573.001 | |
Fallback Channels | T1008 | |
Ingress Tool Transfer | T1105 | |
Multi-Stage Channels | T1104 | |
Non-Application Layer Protocol | T1095 | |
Non-Standard Port | T1571 | |
Exfiltration | Exfiltration Over C2 Channel | T1041 |
Indicators of Compromise (IOCs)
Indicators of compromise related to this campaign may be found here.