Regions Targeted: US
Related Families: TetraLoader, Cobalt Strike, VShell, AntSword, chinatso/Chopper, Behinder
Key Takeaways
The Activity
The attack chain begins with exploitation of CVE-2025-0994, allowing unauthenticated RCE. UAT-6382 conducts rapid reconnaissance using commands like `ipconfig`, `dir`, and `tasklist` to fingerprint compromised servers. Within minutes, the actors deploy web shells, including AntSword, chinatso/Chopper, and Behinder, many featuring Chinese-language messaging, reinforcing attribution to Chinese-speaking operators. These web shells enable persistent access, file enumeration, and staging in directories like `c:\inetpub\wwwroot\CityworksServer\Uploads\` for exfiltration.
A key component of the campaign is TetraLoader, a Rust-based loader built using the MaLoader framework, which emerged on GitHub in December 2024. Written in Simplified Chinese, MaLoader allows operators to wrap shellcode into Rust binaries. TetraLoader injects payloads, such as Cobalt Strike beacons and VShell stagers, into benign processes like `notepad.exe`. VShell, a GoLang-based implant, communicates with hardcoded command-and-control (C2) servers, using rudimentary socket APIs. It supports file management, command execution, screenshot capture, and proxy capabilities, ensuring robust remote access.
UAT-6382 also leverages PowerShell to deploy backdoors, enhancing persistence. The actors’ focus on utilities management systems suggests a strategic intent to compromise critical infrastructure. Talos observed intrusions in U.S. municipal networks, with Trimble and CISA issuing advisories aligning with these findings. Trimble’s patch in Cityworks 15.8.9 addresses the vulnerability, and organizations are urged to update immediately.
The campaign’s sophistication lies in its rapid execution and layered malware deployment. TetraLoader’s use of Rust, combined with MaLoader’s accessibility, highlights the evolving threat landscape, where open-source tools empower advanced attacks. VShell’s memory-resident execution and Cobalt Strike’s versatility further complicate detection.
IOCs
PolySwarm has a sample associated with this activity.
4ffc33bdc8527a2e8cb87e49cdc16c3b1480dfc135e507d552f581a67d1850a9
You can use the following CLI command to search for all related samples in our portal:
$ polyswarm link list -f TetraLoader
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.