Skip to main content
Back to Blog
Threat Intelligence35 min readApril 22, 2026
ChinaAPT31APT-Q-27DragonCoreBYOVD

DragonBreath: Dragon in the Kernel

A 0-day BYOVD vulnerability in dragoncore_k.sys signed by Zhengzhou 403 Network Technology, with shell company analysis, Dragon Breath APT-Q-27 attribution, and an APT31 / Wuhan Xiaoruizhi personnel nexus.

Alex Necula & Ellis Stannard

Contributors: Chaitanya Haritash, Reyben Cortes, Tammy Harper

TLP:WHITE — Unrestricted Distribution within the Security Community

Dragon in the Kernel: Dragoncore_k.sys, Zhengzhou 403 & the APT31/APT-Q-27 Nexus

DragonBreath: Dragon in the Kernel cover banner

Advisory Report

Dragoncore_k.sys & Zhengzhou 403 Network Technology Co., Ltd.

0-Day BYOVD Vulnerability | Shell Company Analysis | Dragon Breath APT-Q-27 | APT31 Personnel Nexus


FieldValue
Report DateApril 22, 2026
AuthorsAlex Necula, Ellis Stannard
TLP ClassificationTLP:WHITE — Unrestricted Distribution
Subject Driverdragoncore_k.sys
SHA-2561da4f7f001d239a54fab50eb7c3cbc985db392a3d4405e19c3a5d2035d591004
Signing EntityZhengzhou 403 Network Technology Co., Ltd.
Vulnerability Class0-Day / BYOVD — PPL Bypass / EDR Neutralization
Disclosure StatusCoordinated Vulnerability Disclosure (CVD) in Progress
CVD TargetMicrosoft Windows Vulnerable Driver Blocklist (Driver.stl)
Primary AttributionDragon Breath APT (APT-Q-27) — HIGH CONFIDENCE
Secondary AttributionAPT31 / Wuhan Xiaoruizhi personnel nexus — MEDIUM CONFIDENCE

Abstract

This report documents a critical 0-day vulnerability in dragoncore_k.sys, a Windows kernel-mode driver bearing a valid Microsoft WHQL signature issued to Zhengzhou 403 Network Technology Co., Ltd. The driver exposes an unauthenticated IOCTL interface that permits any process with local administrative rights to terminate arbitrary processes from Ring 0 — including those protected by Protected Process Light (PPL) — completely blinding EDR and AV solutions.

Investigation of the signing entity reveals a pattern consistent with a Chinese state-adjacent shell company operating within the Dragon Breath APT (APT-Q-27) ecosystem. Three independent evidence streams converge:

  1. The company's GlobalSign EV certificate was explicitly revoked for abuse.
  2. Its registered address resolves to a mixed-use high-rise tower with no technology company presence, co-located with hotel serviced apartments on the same floor, with no evidence of any operational business activity.
  3. The same certificate signed letsvpn-3.12.3.exe on MalwareBazaar, directly matching the LetsVPN decoy installer pattern usedd in Elastic Security Labs' documented RONINGLOADER / Dragon Breath campaign

The driver's IOCTL kill mechanism is functionally identical to ollama.sys, the kernel driver used in that same APT campaign. Additionally, a CobaltStrike C2 endpoint (oss-aws.1nb.xyz) was identified shared across all three Zhengzhou 403-signed samples, and a personnel-level connection was identified between the company founder Zhang Liye (张立业) and the OFAC-sanctioned APT31 front company Wuhan Xiaoruizhi.


1. Vulnerability Technical Analysis

1.1 Driver Overview

FieldValue
Filenamedragoncore_k.sys
SHA-2561da4f7f001d239a54fab50eb7c3cbc985db392a3d4405e19c3a5d2035d591004
CompilationNovember 2024
Signing AuthorityMicrosoft WHQL (Windows Hardware Quality Labs)
Certificate OwnerZhengzhou 403 Network Technology Co., Ltd.
Issuing CAGlobalSign GCC R45 EV CodeSigning CA 2020
Certificate TypeExtended Validation (EV) Code Signing
Certificate Serial4668EDFA623554CF0B48F401
Certificate Status🔴 EXPLICITLY REVOKED by GlobalSign issuer
Vulnerable IOCTL Code0x22201C
Exposed Device Object\\.\ 3e0ac7f (no Security Descriptor) (Change on register)
Vulnerable Dispatch Routinesub_140001818
Root CauseNo token integrity check; no ACL on device object; unvalidated input buffer size
Analysis ToolsIDA Pro, Ghidra, WinObj

1.2 IOCTL Handler Vulnerability

Static reverse engineering of the driver's IRP dispatch table reveals that the handler for IOCTL code 0x22201C accepts a user-supplied buffer containing a Process ID and passes it directly — without any validation — to ZwTerminateProcess. Three vulnerability classes are present:

Reverse engineered IOCTL handler in dragoncore_k.sys

Figure 1: Reverse-engineered IOCTL handler for 0x22201C in dragoncore_k.sys — passes user-supplied PID directly to ZwTerminateProcess.

Missing Privilege and Context Validation
The handler does not verify the calling thread's integrity level, does not require SeDebugPrivilege, and does not check whether the target is a PPL-protected process. Since the call is issued from Ring 0, the Windows kernel treats it as a trusted system request, bypassing all user-mode PPL enforcement.

Insecure Device Object ACL
The device object at \\.\ 3e0ac7f is created without a restrictive Security Descriptor. Any process with local administrative rights can obtain a handle via CreateFileA with no additional authentication.

Critical Note: The device object changes every time driver is registered.

Unvalidated Input Buffer Size
The handler does not validate buffer size before processing, potentially introducing secondary memory corruption primitives — requires further research.


1.3 Exploitation Chain

Demonstration: dragoncore_k.sys exploitation chain — driver registration through kernel-mode process termination.

  1. Driver Deployment — Dropped and registered as a Windows service via CreateServiceA. Valid WHQL signature satisfies DSE and HVCI requirements without triggering code integrity violations.
  2. Handle Acquisition — Payload calls CreateFileA against \\.\ 3e0ac7f to obtain a kernel-mode handle.
  3. IOCTL Trigger — Payload constructs buffer with target PID (e.g., MsMpEng.exe) and issues DeviceIoControl(0x22201C).
  4. Kernel-Mode Termination — Driver executes ZwTerminateProcess from Ring 0. The kernel honors this unconditionally, circumventing PPL entirely.

Privilege Requirement: Local Administrator or SeLoadDriverPrivilege — routinely available in post-exploitation phases of targeted intrusions.

1.3.1 Dropper Ecosystem — VirusTotal Execution Parent Analysis

VirusTotal relationship data for dragoncore_k.sys (SHA-256: 1da4f7f...) reveals 16 distinct execution parents — all classified as Win32 EXE with detection rates ranging from 47/70 to 57/72, confirming the driver is exclusively deployed via purpose-built malicious droppers rather than any legitimate software context. No legitimate execution parent has been identified across any submission.

The dropper submissions cluster tightly between December 21, 2024 and January 24, 2025 — immediately following the driver's November 2024 compilation date — indicating a rapid operational deployment window consistent with a coordinated campaign rollout rather than opportunistic distribution.

VirusTotal execution parents for dragoncore_k.sys

Figure 2: VirusTotal relationship view of dragoncore_k.sys execution parents — 16 purpose-built droppers, no legitimate parent.


1.4 Impact Assessment

Impact CategorySeverityDetail
EDR / AV Neutralization🔴 CRITICALComplete elimination of endpoint security telemetry; attacker operates with no behavioral visibility.
PPL Bypass🔴 CRITICALEffective kernel-level execution from Administrator context; PPL protections rendered ineffective.
HVCI Bypass🟠 HIGHValid WHQL signature satisfies HVCI; no code integrity violation triggered during driver load.
Kernel-Level Persistence🟠 HIGHValid signature enables persistent loading across reboots without security alerts.
Secondary Memory Corruption🟡 MEDIUMUnvalidated buffer size may expose additional exploitation surface — requires further research.

1.5 Driver Code Analysis: Purpose-Built Malware Confirmation

Detailed reverse engineering of the driver's primary dispatch routine (beyond the IOCTL kill interface) reveals that dragoncore_k.sys contains a fully instrumented process inspection and in-memory command-line modification engine. This functionality has no legitimate defensive or performance-monitoring purpose and confirms the driver was purpose-built for offensive malware deployment.

CapabilityDescription
Global Kill Switchbyte_14000712C — a single-byte global flag gating the entire routine. Standard anti-analysis and operational control mechanism: the driver can be deployed dormant and activated remotely. (MITRE T1622)
Process Name FilteringPsGetProcessImageFileName + sub_140003E7C — enumerates target process image names against an internal filter. Only EDR/AV targets proceed to subsequent stages. (MITRE T1057, T1518.001)
PEB Attachment & Command-Line ExtractionKeStackAttachProcess attaches kernel thread to target process address space. Reads PEB: 64-bit via _UNICODE_STRING[7]; 32-bit WoW64 via PEB32 offsets +16, +64, +66, +68. (MITRE T1055.009)
WoW64 / x64 Dual-PathSeparate code paths for 32-bit and 64-bit processes via PsGetProcessWow64Process / PsGetProcessPeb — full architecture coverage.
Allow / Deny Classification Enginesub_1400015E4, sub_140003414, sub_140001364 — multi-stage engine classifies processes by extracted command-line content. Results accumulated in output buffer v62.
Rate Limiting / Anti-Detection Controldword_140007120 (last timestamp), dword_140007124 (max count), dword_140007128 (current count), dword_140007004 (minimum interval) — evades frequency-based SIEM rules and sandbox behavioral detonation. (MITRE T1497)
In-Memory Command-Line ModificationWrites modified command-line string back into target process PEB memory via RtlInitUnicodeString + _UNICODE_STRING[7] assignment (64-bit) or WoW64 PEB32 field offsets (32-bit). No disk touch, no new process, no process-creation telemetry. (MITRE T1564.010)
PEB IOCTL command-line modification engine

Figure 3: Reverse-engineered PEB attachment and in-memory command-line modification routine inside dragoncore_k.sys.

Critical Note — Universal EDR Telemetry Attack

The in-memory command-line modification capability attacks a fundamental assumption shared by all major EDR solutions: that _RTL_USER_PROCESS_PARAMETERS.CommandLine in a running process reflects the actual arguments with which it was launched. By patching this field from kernel memory post-execution, dragoncore_k.sys renders command-line-based detections untrustworthy across every EDR vendor — including CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Carbon Black, Elastic Endpoint, and any solution relying on ETW Microsoft-Windows-Kernel-Process events, PsSetCreateProcessNotifyRoutineEx callbacks, or periodic PEB inspection for command-line telemetry collection.

This is not a vendor-specific weakness — it is an attack on a Windows kernel data structure that the entire industry trusts as ground truth. This capability is NOT present in ollama.sys (the Dragon Breath reference driver) and represents a meaningful offensive advancement in the dragoncore_k.sys codebase.


1.6 Certificate Revocation Analysis

FieldValue
Issuing CAGlobalSign GCC R45 EV CodeSigning CA 2020
Valid FromFri Mar 28 10:44:17 2025
Valid ToSun Mar 29 10:44:17 2026
Revocation Status🔴 A certificate was explicitly revoked by its issuer.
Serial Number4668EDFA623554CF0B48F401
Cert SHA256EE79212E518952916DA9643830DB120592B1156B4E943D40...

Key findings:

  • EV certificates require rigorous physical and legal identity verification. GlobalSign verifies the legal entity existence, physical address, and authorized applicant. The company either passed genuine verification or successfully deceived it at issuance time.
  • Explicit revocation requires deliberate action by GlobalSign — triggered by abuse reports, law enforcement contact, or security industry notification. Same mechanism used against Zhuhai Liancheng Technology and Ningbo Zhuo Zhi Innovation.
  • Critical timeline: dragoncore_k.sys compiled November 2024; certificate issued March 28, 2025. The driver was signed post-compilation with the company's own certificate. The stolen certificate hypothesis is definitively eliminated.
GlobalSign EV certificate explicit revocation — Mon May 19 17:41:01 2025

Figure 4: GlobalSign EV certificate explicit revocation — Mon May 19 17:41:01 2025.


2. Company Analysis & Shell Company Network

2.1 Zhengzhou 403 Network Technology — Profile

Aiqicha — Zhengzhou 403 company registration page

Figure 5: Aiqicha — Zhengzhou 403 company registration page.

Zhengzhou 403 Network Technology Co., Ltd. (郑州市肆零叁网络科技有限公司) is registered in Zhengzhou, Henan Province, China. The company held a WHQL hardware developer account with Microsoft and an EV code-signing certificate from GlobalSign — subsequently explicitly revoked for abuse (see Section 1.6 for full certificate revocation analysis). No verifiable product portfolio, public website, commercial history, or customer base has been identified. The company exists solely as a legal registration and certificate-holding vehicle.

Field — EnglishField — Chinese (字段)Value
Company Name企业名称Zhengzhou 403 Network Technology Co., Ltd.
Chinese Name中文名称郑州市肆零叁网络科技有限公司
USCC统一社会信用代码91410100MADAKY554Y
Commercial Registration No.工商注册号410101001214751
Organisation Code组织机构代码MADAKY55-4
Established成立日期2024-01-22
Operating Status经营状态Active — Listed as Operating Abnormal (July 25, 2025)
Registered Capital注册资本RMB 10,000 (1万元) — minimum threshold
Enterprise Type企业类型Limited Liability (Natural Person Sole Proprietorship)
Industry所属行业Software and Information Technology Services
Registered By登记机关Zhengzhou Zhengdong New District Market Supervision Bureau
Legal Representative法定代表人Zhang Liye (张立业)
Contact Phone联系电话173****2836

Key Personnel:

Zhengzhou 403 key personnel listing

Figure 6: Aiqicha key personnel record for Zhengzhou 403 — Zhang Liye and Li Xiaoyan.

#Name — EnglishName — ChineseRoleShareholding
1Zhang Liye张立业Legal Representative, Executive Director, General Manager, Financial Officer100%
2Li Xiaoyan李晓燕Supervisor (监事)0% — Nominee
Aiqicha — Zhengzhou 403 key personnel (Zhang Liye + Li Xiaoyan)

Figure 7: Aiqicha — Zhengzhou 403 key personnel (Zhang Liye + Li Xiaoyan).

Business Scope: Information technology consulting services; computer system services; computer hardware, software and auxiliary equipment retail; software sales; software development; communication equipment sales; network and information security software development; IoT technology services; technology services, development, consulting, exchange, transfer and promotion; electronic product sales. Note: deliberately written to justify acquisition of an EV code-signing certificate and WHQL driver submission.


2.2 Physical Address Analysis

FieldValue
Registered AddressRoom 618, Building 2, Vanke Yu, Intersection of Shangdu Road and Puhui Road, Zhengdong New District (河南省郑州市郑东新区商都路与普惠路交叉口万科誉2号楼618室)
Physical StatusHigh-rise mixed-use residential tower (30+ floors)
Business ActivityNone — no dedicated office presence, signage, or technology company infrastructure observed

Vanke Yu Building 2 — floor breakdown:

  • Ground floor — retail shops (China Mobile, convenience stores)
  • Mid floors — residential apartments
  • 6th floor — Evian Hotel (serviced apartments)
  • 26th floor — Vanke Hongsheng Business Residence + orthodontists / medical
  • Room 618 (618室) — registered address for Zhengzhou 403 Network Technology
Vanke Yu Building 2 — floor breakdown

Figure 8: Vanke Yu Building 2 — directory and floor breakdown showing mixed residential / serviced apartment occupancy.

Assessment: mixed-use high-rise, not a dedicated shell farm. The orthodontists and medical services on upper floors are typical of Chinese mixed-use towers where commercial units are scattered throughout.

Vanke Yu Building 2 — registered address

Figure 9: Vanke Yu Building 2 — Room 618 registered address for Zhengzhou 403 Network Technology.

Room 618 is located on the 6th floor of the building:

Vanke Yu Building 2 — mapping view 2

Figure 10: Vanke Yu Building 2 — mapping view 2.

Note: The number 4 (四, ) is considered unlucky in Chinese culture due to its near-homophony with "death" (死, ). It is not uncommon for buildings to skip the 4th floor entirely. Room 618 is listed on the 6th floor, but if the building skips the 4th floor, the unit may physically be located on the 5th floor.

Further searches confirm that the 6th floor of Vanke Yu Building 2 — the floor on which Room 618 is registered — is occupied primarily by hotel and short-stay accommodation, with Evian Hotel confirmed as a co-occupant on the same floor, rendering any meaningful physical verification of Zhengzhou 403's presence effectively impossible.

Note also that the office space is shared with a hotel, Evian Hotel:

Evian Hotel — serviced apartments in the same building as Zhengzhou 403

Figure 11: Evian Hotel — serviced apartments in the same building as Zhengzhou 403.


2.3 Successor Shell Company: Zhengzhou Lianliu Network Technology

Zhengzhou Lianliu Network Technology — Aiqicha registration

Figure 12: Aiqicha registration page for the successor shell company — Zhengzhou Lianliu Network Technology Co., Ltd.

Following the explicit revocation of the GlobalSign EV certificate in May 2025 and the operating abnormality listing of Zhengzhou 403 in July 2025, Zhang Liye registered a successor shell company in August 2025. This pattern — creating a new shell after the first is compromised or flagged — is consistent with MSS operational security tradecraft.

FieldValue
Company NameZhengzhou Lianliu Network Technology Co., Ltd. (郑州市联流网络科技有限公司)
USCC91410100MAEU577R15
Established2025-08-21
Operating StatusActive — Zero risk flags
Registered CapitalRMB 10,000 — identical to 403
Enterprise TypeLimited Liability (Natural Person Sole Proprietorship)
Legal RepresentativeZhang Liye (张立业)

Registered Address: Room 405, 3rd Floor, Zone C, Building 1, Baifo Community North Gate Commercial Building, Compound 4, Shangdu Jiayuan, Zhengdong New District, Zhengzhou

Zhengzhou Lianliu — mapping view of Baifo Community Building 1

Figure 13: Mapping view of Baifo Community Building 1, the registered address for Zhengzhou Lianliu Network Technology.

Physical OSINT Assessment: The registered address resolves to a small commercial building whose 3rd floor is occupied by hair salons, tobacco/alcohol shops and importantly communications departments.

Zhengzhou Lianliu — street-level view of Baifo Community

Figure 14: Street-level view of the Baifo Community Building 1 — the registered address resolves to a small commercial building.

Key Personnel: Zhang Liye holds every corporate position himself. Unlike Zhengzhou 403, Lianliu lists no supervisor. Notably, Zhengzhou 403 registered one supervisor (Li Xiaoyan), whereas Lianliu registered none at all — suggesting Zhang Liye eliminated even the nominal compliance role when setting up the successor entity.

Likely office space — Zhengzhou Lianliu

Figure 15: Likely office space at the Zhengzhou Lianliu registered address.


2.4 Neighbouring Shell Companies — Zhengzhou Lianliu

The following provides a more comprehensive overview of units identified in the immediate vicinity that may warrant further investigation:

UnitEnglish NameChinese NameCategoryOnline PresenceStatus
064Wangling Communications Department旺铃通讯部购物 (Shopping)❌ NoneNot yet open
067Shangkai Communications Department尚楷通讯部公司企业 (Corporate)✅ SomeUnder Construction
069Lianxun Communications Department联勋通讯部政府机构 (Government)❌ NoneNot yet open
118Henan Xunliyou Trading Co., Ltd.河南逊利优贸易有限公司公司企业 (Corporate)✅ SomeEstimated location

Open-source mapping of the immediate vicinity reveals several entities of note co-located on the 3rd floor of Building 1, Baifo Residential Area, Shangdu Jiayuan. Three entities sharing the "Communications Department" (通讯部) naming convention were identified in close proximity to one another:

  • 旺铃通讯部 (Wangling Communications Department) — Unit 064, 3rd Floor, Building 1, Baifo Residential Area, Shangdu Jiayuan, Shangdu Road Subdistrict, Zhengdong New District, Zhengzhou — categorised as 购物 (Shopping). Not yet open.
Wangling Communications Department mapping listing

Figure 16: Mapping listing for 旺铃通讯部 (Wangling Communications Department) — Unit 064.

  • 尚楷通讯部 (Shangkai Communications Department) — Unit 067, 3rd Floor, Building 1, Baifo Residential Area, Shangdu Jiayuan, Shangdu Road Subdistrict, Zhengdong New District, Zhengzhou — categorised as 公司企业 (Corporate). Under construction.
Shangkai Communications Department mapping listing

Figure 17: Mapping listing for 尚楷通讯部 (Shangkai Communications Department) — Unit 067.

  • 联勋通讯部 (Lianxun Communications Department) — Unit 069, 3rd Floor, Building 1, Baifo Residential Area, Shangdu Jiayuan, Shangdu Road Subdistrict, Zhengdong New District, Zhengzhou — categorised as 政府机构 (Government Institution). Not yet open.
Lianxun Communications Department mapping listing

Figure 18: Mapping listing for 联勋通讯部 (Lianxun Communications Department) — Unit 069, anomalously categorised as a Government Institution.

It is notable that three entities sharing a distinctive naming convention and operating in physical proximity are categorised inconsistently across Shopping, Corporate, and Government Institution classifications respectively. No online presence could be identified for Wangling or Lianxun Communications Departments. Lianxun's classification as a Government Institution is particularly anomalous given the complete absence of any corresponding official registration or government directory listing.

Also present on the same floor is 河南逊利优贸易有限公司 (Henan Xunliyou Trading Co., Ltd.) at Unit 118, 3rd Floor, Building 1, Baifo Residential Area, Shangdu Jiayuan — a trading company with an estimated rather than confirmed location per mapping data.

Henan Xunliyou Trading Co., Ltd. mapping listing

Figure 19: Mapping listing for 河南逊利优贸易有限公司 (Henan Xunliyou Trading Co., Ltd.) — Unit 118.

2.5 Chinese APT Front Company — Comparative Analysis

CompanyLocationAPT LinkRole
Chengdu 404 Network TechnologyChengdu, SichuanAPT41 (confirmed)DOJ-indicted front company; 100+ victims globally.
Sichuan i-SOONChengdu, SichuanAPT41 adjacentBusiness partner of Chengdu 404; 2024 leak confirmed state hacking services.
Zhuhai Liancheng TechnologyZhuhai, GuangdongRansomware supplyCert used for BURNTCIGAR driver in Cuba/Hive ransomware.
Beijing JoinHope Image Tech.BeijingRansomware supplySame driver-signing campaign as Zhuhai Liancheng.
Ningbo Zhuo Zhi InnovationNingbo, ZhejiangNetfilter rootkitWHQL-signed rootkit; Microsoft revoked post-disclosure.
Kunming Wuqi E-commerceKunming, YunnanDragon Breath / APT-Q-27Signed ollama.sys — identical IOCTL driver used by RONINGLOADER.
Zhengzhou 403 Network TechnologyZhengzhou, HenanDragon Breath / APT-Q-27Signed dragoncore_k.sys + letsvpn-3.12.3.exe. EV cert explicitly revoked. Registered address resolves to hotel-occupied residential tower with no technology company presence.
Lianxun Communications DepartmentZhengzhou, HenanCo-located / Under AssessmentShares address with Zhengzhou Lianliu. Government office with no digital footprint.

3. Dragon Breath APT-Q-27 Attribution

The most significant attribution indicator is the direct operational overlap between the Zhengzhou 403 certificate and Dragon Breath APT documented by Elastic Security Labs in November 2025 (RONINGLOADER).

StepRONINGLOADER Infection Chain — Dragon Breath APT-Q-27
1Initial vector: Windows MSI dropper (da2c58308e860e57df4c46465fd1cfc68d41e8699b4871e9a9be3c434283d50b)
2MSI extracts two NSIS installers: one benign, one malicious
3BENIGN DECOY: letsvpnlatest.exe — installs legitimate LetsVPN to avoid victim suspicion
4🔴 MALICIOUS: Snieoatwtregoable.exe — deploys multi-stage attack chain
5Drops ollama.sys (Kunming Wuqi cert) — kills AV/EDR via IOCTL 0x222000
6Custom WDAC policy blocks Qihoo 360 and Huorong; PPL abuse via ClipUp.exe disables Defender
7Final payload: modified gh0st RAT — keylogging, clipboard hijacking (crypto wallet theft), encrypted C2

The Zhengzhou 403 MalwareBazaar sample is named letsvpn-3.12.3.exe. The RONINGLOADER dropper uses letsvpnlatest.exe as its LetsVPN-themed decoy. Both are signed malicious payloads using the LetsVPN brand — an exclusive operational lure used by Chinese APT actors targeting Chinese-speaking users seeking censorship circumvention software.


3.2 Technical Comparison: dragoncore_k.sys vs. ollama.sys

Capabilitydragoncore_k.sys (Zhengzhou 403)ollama.sys (Dragon Breath / Kunming Wuqi)
PurposeEDR/AV process termination via kernelEDR/AV process termination via kernel
IOCTL Code0x22201C0x222000
MechanismZwOpenProcess + ZwTerminateProcess by PIDZwOpenProcess + ZwTerminateProcess by PID
Device Object\\.\ 3e0ac7f (no ACL)\\.\Ollama (service-loaded, deleted after use)
Cert TypeEV CodeSign — GlobalSignEV CodeSign (same class)
Cert EntityZhengzhou 403, Zhengzhou, HenanKunming Wuqi E-commerce, Kunming, Yunnan
Cert StatusExplicitly revoked by GlobalSignActive as of Nov 2025 Elastic report
LetsVPN Linkletsvpn-3.12.3.exe — same certificateletsvpnlatest.exe — embedded dropper decoy

IOCTL codes 0x22201C and 0x222000 are structurally identical: both use METHOD_BUFFERED / FILE_ANY_ACCESS in the 0x222xxx device type range. The only difference is the function code (7 vs 0) — consistent with version iteration of the same codebase rather than independent development.


3.3 LetsVPN as a Chinese APT Lure — Ecosystem

CampaignLetsVPN UsageSource
APT-Q-27 / Dragon Breath / RONINGLOADERletsvpnlatest.exe as MSI dropper decoyElastic Security Labs, Nov 2025
Silver Fox APT / Catena LoaderTrojanized NSIS installers delivering Winos 4.0Rapid7, May 2025
Void ArachneLetsVPN MSI + Winos backdoor via TelegramTrend Micro, June 2024
Cyble ResearchFake phishing sites distributing BlackMoon / Farfli RATCyble, Nov 2023
Zhengzhou 403 (this research)letsvpn-3.12.3.exe signed with Zhengzhou 403 certMalwareBazaar, April 2026
APT-Q-27 / Dragon Breath (this research)tsetup-x64.5.13.1.exe — trojanized Telegram Desktop installer, same Zhengzhou 403 certificateJoeSandbox Analysis 1679094; QiAnXin TI Blog

3.4 Attribution Assessment

Attribution: HIGH CONFIDENCE — Dragon Breath APT (APT-Q-27)

Zhengzhou 403 Network Technology Co., Ltd. is assessed with HIGH CONFIDENCE to be a shell company operating as a signing and infrastructure vehicle within the Dragon Breath APT-Q-27 ecosystem. The convergence of EV certificate abuse and revocation, confirmed uninhabited hotel-floor address, LetsVPN lure matching Dragon Breath TTPs, near-identical IOCTL architecture to ollama.sys, and a shared CobaltStrike C2 across all three certificate-tagged samples constitutes a strong circumstantial case.


4. APT31 Personnel Nexus

Supplemental Intelligence — Cross-Attribution Finding

4.1 Zhang Liye / Wuhan Xiaoruizhi Connection

Zhang Liye personnel profile

Figure 20: Zhang Liye personnel profile material connecting Zhengzhou 403 founder to the APT31 / Wuhan Xiaoruizhi ecosystem.

Cross-referencing the founding personnel of Zhengzhou 403 against published APT attribution research reveals a direct personnel-level connection to the confirmed APT31 MSS front company Wuhan Xiaoruizhi Science and Technology (武汉晓睿智科技有限公司).

FieldIntelligence Finding
SubjectZhang Liye (张立业)
Role at Zhengzhou 403Founder / founding personnel
APT31 ConnectionCorrelated via leaked Breachedforums data to Wuhan Xiaoruizhi personnel (Intrusion Truth, May 2023)
Wuhan XRZ ClassificationConfirmed MSS / Hubei State Security Department (HSSD) front company for APT31 / ZIRCONIUM / Judgment Panda
US Government ActionWuhan XRZ sanctioned by US Treasury OFAC; two operators indicted by US DoJ (March 2024)
UK Government ActionSanctioned for compromise of UK Electoral Commission systems (2021–2022)
SourceIntrusion Truth — "Trouble in Paradise" (May 2023); DoJ indictment March 2024
Confidence🟡 MEDIUM — personnel record match; infrastructure correlation pending

Caveat: Zhang Liye / 张立业 is a reasonably common Chinese name. This finding requires corroboration (matching ID number, address cross-reference) before constituting definitive individual identity confirmation. The name match in this specific context — Wuhan Xiaoruizhi leaked data correlated with the founder of a WHQL-abusing shell company whose drivers appear in APT toolchains — is assessed as highly unlikely to be coincidental.

Zhang Liye — Personal Details:

FieldValueSource
Full Name (Chinese)张立业Aiqicha; Wuhan Government Subsidy Spreadsheet
Full Name (Pinyin)Zhang LiyeIntrusion Truth (2023-07-04)
GenderMale (男)Wuhan Government Subsidy Spreadsheet
Age (as of 2026)~36 years oldWuhan Government Subsidy Spreadsheet
Year of Birth (approx.)~1989Derived from age in Oct 2020
National ID Prefix371 (Shandong Province)Wuhan Government Subsidy Spreadsheet
Contact Phone173****2836Zhengzhou 403 company registration
Aiqicha Person ID50317661642179Aiqicha

Personnel cross-reference summary:

  • Zhang Liye (张立业) — shareholder and owner of two companies:
    1. 郑州市肆零叁网络科技有限公司 (Zhengzhou 403 Network Technology) — certificate revoked, operating abnormal
    2. 郑州市联流网络科技有限公司 (Zhengzhou Lianliu Network Technology) — successor shell, active
  • Li Xiaoyan (李晓燕) — Supervisor at Zhengzhou 403 only; confirmed only linked to 403 and has no role at Lianliu or any other entity.

4.2 Breachedforums / WoyouLuma Leak Corroboration

Breachedforums WoyouLuma post advertising MSS Wuhan database

Figure 21: Breached.vc post by 'WoyouLuma' advertising a 633MB database of identified Chinese MSS operators in Wuhan.

On December 5, 2022, a user identified as 'WoyouLuma' posted on Breached.vc claiming to sell a 633MB database containing the identities of more than 100 hackers working for the Chinese government MSS in Wuhan.

WoyouLuma database description and preview

Figure 22: WoyouLuma database description — names, photos, national ID numbers, phone numbers, and home addresses of MSS operators in Wuhan.

The database was described as containing names, photos, national ID numbers, phone numbers, and home addresses of MSS operators and officials of the Wuhan National Security Bureau responsible for organising and coordinating cyberattacks, as well as names and addresses of supporting companies and lists of hacked entities.

The poster went on to claim that Wuhan Xiaoruizhi was a cover company for MSS hacking activity in Wuhan. The company had a few teams working for the MSS, but in 2020, teams started working under new companies. As Intrusion Truth noted: "These are some astonishing claims, but at team Intrusion Truth we are nothing if not diligent and wanted to get to the bottom of this ourselves. Could we also link Wuhan Xiaoruizhi to the MSS? Could we link it to an APT?"

The post was subsequently sold to an exclusive buyer for $50,000 USD and later removed from the forum following the Breachforums takedown. A preview screenshot showed folder names containing Chinese surnames and partial national ID numbers, the majority bearing the 421 prefix (Hubei Province).

Intrusion Truth independently verified 32 Xiaoruizhi employees through separate government documents — not from the WoyouLuma database. Source: Intrusion Truth — Trouble in Paradise

Ransom-ISAC has independently matched Zhang Liye against the Intrusion Truth published list. He is a confirmed match. The second company personnel member (Li Xiaoyan) does not appear in any published Xiaoruizhi employee list and remains unattributed.

4.3 Li Xiaoyan — Secondary Subject

Li Xiaoyan (李晓燕) is listed as Supervisor (监事) of Zhengzhou 403 Network Technology Co., Ltd. She was registered in this role from the company's founding date of January 22, 2024.

Li Xiaoyan Aiqicha record

Figure 23: Aiqicha record for Li Xiaoyan — Supervisor (监事) of Zhengzhou 403 Network Technology.

FieldValueSource
Full Name (Chinese)李晓燕Zhengzhou 403 registration; Aiqicha
Full Name (Pinyin)Li XiaoyanAiqicha
Role at Zhengzhou 403Supervisor (监事)Aiqicha company registration
Shareholding0% — No equity stakeAiqicha
Legal Representative rolesNone (0 companies)Aiqicha
Total company affiliations1 (Zhengzhou 403 only)Aiqicha
Ultimate Beneficiary rolesNoneAiqicha
Business partnerZhang Liye (1 collaboration)Aiqicha partner data
Aiqicha Person ID83c6efa69a81b322e5c7e986f8585cbaAiqicha

4.4 APT31 Background

APT31 (Violet Typhoon / Judgment Panda / ZIRCONIUM) conducts cyber operations on behalf of the Hubei State Security Department (HSSD), a provincial MSS branch in Wuhan (US DoJ indictment, March 2024; Rewards for Justice). Documented targets include:

  • US White House, DoJ, Commerce, Treasury, State Department
  • US Congress members (Democratic and Republican senators)
  • Defense Industrial Base, aerospace, telecom, energy, financial sectors
  • Norwegian government (PST attribution, 2018), Finnish Parliament (NBI investigation, 2020–2021), Hong Kong pro-democracy activists

In 2010, HSSD established Wuhan Xiaoruizhi Science and Technology as a front company. The US DoJ March 2024 indictment named seven defendants and formally designated Wuhan XRZ as an MSS front company. Concurrent with the indictment, the US Treasury imposed sanctions on Wuhan XRZ and two of the defendants, and the Department of State announced a Rewards for Justice bounty of up to $10 million.

4.5 Dual-Track Attribution

Attribution TrackConfidencePrimary Evidence
Dragon Breath APT (APT-Q-27)🔴 HIGHLetsVPN lure match, IOCTL architecture, shared C2, cert revocation
APT31 / Wuhan XRZ personnel nexus🟡 MEDIUMZhang Liye correlated via Breachedforums leaked data to Xiaoruizhi personnel (Intrusion Truth 2023)

The Chinese contractor ecosystem (documented in i-SOON leak) demonstrates individuals routinely work across multiple MSS-affiliated entities. APT-Q-27 and APT31 both operate under MSS tasking. Possible interpretations: (1) Zhang Liye migrated from Wuhan XRZ to establish Zhengzhou 403 as a new signing vehicle; (2) Zhengzhou 403 serves both APT-Q-27 and APT31 as shared infrastructure; (3) the connection is circumstantial. Infrastructure correlation required to resolve.

These tracks are not mutually exclusive — the Chinese contractor ecosystem routinely sees individuals serve multiple MSS-affiliated entities simultaneously, and Zhengzhou 403 may function as shared signing infrastructure spanning both APT-Q-27 operational activity and APT31 personnel networks.


5. MalwareBazaar Samples & C2 Infrastructure

5.1 Certificate-Tagged Sample Catalog

Three samples bearing the Zhengzhou 403 EV certificate (serial 4668EDFA623554CF0B48F401) are cataloged on MalwareBazaar under the tag Zhengzhou-403-Network-Technology-Co-Ltd. All three are classified as either CobaltStrike beacons or signed loaders (possibly DonutLoader or Telegram-based loading), and all three communicate with the same CobaltStrike C2 endpoint.

#FilenameSHA-256Classification
1letsvpn-3.12.3.exee515a6e0738e699df2b569fafc234c534ac4417f29c2b4684acccda275bfec79CobaltStrike / Signed Loader (LetsVPN decoy)
2tsetup-x64.5.13.1.exece38c96a69a8a1c6828e11742355c41b878198e08d7efbe73eefa1b5cbe623c5CobaltStrike / Signed Loader (Telegram Desktop decoy)
3SearchUpdate.exe00c250adb21fd14148f963a92fb5ec21d5eac2cd2f67501f03e28c5e7135422eCobaltStrike / Signed Loader

All three samples are signed with the same explicitly revoked GlobalSign EV certificate and tagged on MalwareBazaar with loader and CobaltStrike indicators. The presence of DonutLoader or Telegram-based loading mechanisms is consistent with Chinese APT multi-stage deployment chains where a signed loader serves as the initial trust-bypass stage before deploying shellcode or retrieving the final payload from a messaging platform channel.

Sample #2 — tsetup-x64.5.13.1.exe: Trojanized Telegram Desktop Confirmed

Dynamic analysis of tsetup-x64.5.13.1.exe (SHA-256: ce38c96a69a8a1c6828e11742355c41b878198e08d7efbe73eefa1b5cbe623c5) conducted via JoeSandbox (Analysis ID: 1679094) confirms this sample is a trojanized Telegram Desktop installer bearing the explicitly revoked Zhengzhou 403 EV certificate. The filename tsetup-x64.5.13.1.exe is a direct impersonation of the legitimate Telegram Desktop installer naming convention (tsetup = Telegram setup). The sample presents as a functional Telegram installer to avoid victim suspicion while executing its malicious payload chain — structurally identical to the dual-installer pattern documented in RONINGLOADER, where a benign decoy application is installed alongside the malicious component.

This finding directly corroborates QiAnXin's attribution of trojanized Telegram installers to Dragon Breath APT-Q-27, and confirms that Zhengzhou 403 Network Technology Co., Ltd. served as the certificate signing vehicle for both the LetsVPN-themed and Telegram-themed lure families within the same campaign infrastructure. The use of a single compromised EV certificate across multiple lure brands indicates centralized certificate management at the operator level rather than per-campaign certificate acquisition.


5.2 Shared C2 Endpoint: oss-aws.1nb.xyz

Investigation of the three MalwareBazaar samples bearing the Zhengzhou 403 certificate reveals a shared CobaltStrike Beacon C2 endpoint: http://oss-aws.1nb.xyz/

FieldValue
C2 Domainoss-aws.1nb.xyz
ProtocolHTTP (CobaltStrike Malleable C2)
Confirmed AcrossAll three MalwareBazaar Zhengzhou 403-tagged samples
Infrastructure ResponseHTTP 403 Forbidden — served by NgxFence WAF/CDN
WAF ProviderNgxFence — Chinese-operated WAF/CDN
Domain ConstructionDeliberate mimicry of AWS S3 + Alibaba OSS naming to blend into cloud traffic
Geo-filtering403 response confirms active geo-IP blocking against non-Chinese / researcher IPs

Domain masquerade analysis: oss-aws.1nb.xyz — "oss" references Alibaba Cloud Object Storage Service; "aws" references Amazon Web Services. Engineered to appear as a legitimate cloud storage endpoint in SIEM alerting. Consistent with Dragon Breath / APT-Q-27 documented use of cloud-mimicry domains.

NgxFence significance: Deployment of a Chinese WAF for a CobaltStrike C2 is consistent with Chinese threat actor operational patterns documented by Hunt.io and Rapid7 (2025–2026), where Chinese CDN providers are used to mask C2 origin and return 403/404 to non-beacon requests while routing valid beacon traffic to the actual team server.

Block immediately: oss-aws.1nb.xyz — Block at DNS, proxy, and firewall. Any beacon traffic to this domain from within your environment indicates active CobaltStrike compromise. Monitor for outbound HTTP beaconing patterns (periodic intervals, consistent URI, encoded body) to this domain.


5.3 jnsupx.exe — Dropper Analysis & Kill Chain Reconstruction

Dynamic analysis of jnsupx.exe (SHA-256: 8fc822b3e285030c6dcb36d7b9a52426e2b3eeaf643a28ef2cfcd1cb0709906f, 1,014.50 KB, detection: 57/72) reveals the primary dropper responsible for deploying dragoncore_k.sys into target environments. The sample is UPX-packed, contains debug environment detection, persistence mechanisms, self-deletion capability, and long-sleep anti-sandbox controls — a behavioral profile consistent with a mature, operationally deployed loader.

jnsupx.exe dropper behavioral analysis

Figure 24: Dynamic analysis of jnsupx.exe — UPX-packed dropper deploying dragoncore_k.sys.


6. MITRE ATT&CK Mapping

Technique IDTechniqueApplication
T1068Exploitation for Privilege EscalationIOCTL abuse escalates from Administrator to Ring 0 execution.
T1014RootkitDriver loaded at Ring 0 enabling invisible system state modification.
T1562.001Impair Defenses: Disable or Modify ToolsTerminates EDR/AV via ZwTerminateProcess from kernel context.
T1543.003Create System Process: Windows ServiceDriver deployed via CreateServiceA through SCM.
T1195.001Supply Chain: Compromise Software DependenciesWHQL-signed driver used to bypass code integrity enforcement.
T1588.002Obtain Capabilities: ToolAcquisition of vulnerable signed driver as BYOVD component.
T1055.009Process Injection: Process HollowingKernel PEB attachment and manipulation via KeStackAttachProcess.
T1564.010Hide Artifacts: Process Argument SpoofingIn-memory PEB CommandLine modification to deceive EDR telemetry.
T1057Process DiscoveryProcess name enumeration via PsGetProcessImageFileName.
T1518.001Security Software DiscoveryFilter targets EDR/AV process list.
T1497Virtualization/Sandbox EvasionRate-limiting anti-detection control via timestamp gating.
T1622Debugger EvasionGlobal kill switch flag for dormant deployment.

7. Indicators of Compromise

7.1 Files

FilenameSHA-256Notes
dragoncore_k.sys1da4f7f001d239a54fab50eb7c3cbc985db392a3d4405e19c3a5d2035d591004Vulnerable BYOVD kernel driver
letsvpn-3.12.3.exee515a6e0738e699df2b569fafc234c534ac4417f29c2b4684acccda275bfec79LetsVPN-branded payload, same certificate
tsetup-x64.5.13.1.exece38c96a69a8a1c6828e11742355c41b878198e08d7efbe73eefa1b5cbe623c5CobaltStrike / Signed Loader — Telegram Desktop decoy
SearchUpdate.exe00c250adb21fd14148f963a92fb5ec21d5eac2cd2f67501f03e28c5e7135422eCobaltStrike / Signed Loader — cert tag match
RONINGLOADER MSI dropperda2c58308e860e57df4c46465fd1cfc68d41e8699b4871e9a9be3c434283d50bDragon Breath APT-Q-27 (Elastic, Nov 2025)
jnsupx.exe8fc822b3e285030c6dcb36d7b9a52426e2b3eeaf643a28ef2cfcd1cb0709906fPrimary dropper for dragoncore_k.sys; UPX-packed, anti-sandbox
ollama.sys (Dragon Breath)Retrieve from Elastic / VirusTotalKunming Wuqi cert — identical IOCTL pattern

7.2 Certificate

FieldValueAction
Serial Number4668EDFA623554CF0B48F401Block ALL files bearing this serial
Subject CNZhengzhou 403 Network TechnologyFlag any file signed by this entity
Issuing CAGlobalSign GCC R45 EV CodeSigning 2020GlobalSign confirmed abuse revocation
Cert SHA256EE79212E518952916DA9643830DB120592...Block by certificate thumbprint
StatusEXPLICITLY REVOKED by issuerDo not trust even within validity window

7.3 Network

IndicatorTypeNotes
oss-aws.1nb.xyzCobaltStrike C2 domainBlock at DNS/proxy/firewall; geofiltered behind NgxFence WAF

7.4 Behavioral Indicators

  • CreateService events referencing dragoncore_k.sys or drivers signed by certificate serial 4668EDFA623554CF0B48F401
  • CreateFile calls targeting \\.\ 3e0ac7f
  • DeviceIoControl calls with code 0x22201C
  • Abrupt termination of EDR/AV processes (MsMpEng.exe, CrowdStrike Falcon, Carbon Black, SentinelOne) without a preceding uninstall event
  • Service registration for kernel-mode drivers signed by unrecognized Chinese entities not in the Microsoft Vulnerable Driver Blocklist
  • Outbound HTTP beaconing to oss-aws.1nb.xyz at periodic intervals

7.5 YARA Rule

rule BYOVD_dragoncore_k_sys {
  meta:
    description = "Detects dragoncore_k.sys BYOVD driver - Zhengzhou 403 / Dragon Breath APT"
    author      = "Alex Necula"
    date        = "2026-04-22"
    tlp         = "WHITE"

  strings:
    $device = { 5C 00 5C 00 2E 00 5C 00 66 00 33 00 65 00
                30 00 61 00 63 00 37 00 66 00 }
    $ioctl  = { 1C 20 22 00 }

  condition:
    uint16(0) == 0x5A4D and filesize < 500KB and ($device or $ioctl)
}

8. Disclosure & Defensive Recommendations

8.1 Coordinated Vulnerability Disclosure

This vulnerability is being addressed via CVD. Primary remediation target: inclusion of dragoncore_k.sys in the Microsoft Windows Vulnerable Driver Blocklist (Driver.stl). Reported to MSRC at https://msrc.microsoft.com/report/ under Windows Hardware Developer Program abuse.

8.2 Immediate Actions

  • Block by hash: Deploy WDAC or AppLocker policy blocking dragoncore_k.sys by SHA-256 1da4f7f001d239a54fab50eb7c3cbc985db392a3d4405e19c3a5d2035d591004
  • Block by cert serial: Add 4668EDFA623554CF0B48F401 to EDR block rules and SIEM alerting
  • Enable Microsoft Vulnerable Driver Blocklist: Settings → Windows Security → Device Security → Core Isolation → Microsoft Vulnerable Driver Blocklist: ON
  • Block C2: Add oss-aws.1nb.xyz to DNS blocklist and firewall rules immediately

8.3 Detection Rules

  • Alert on CreateService events for kernel-mode drivers signed by novel unrecognized Chinese entities
  • Alert on CreateFile calls to \\.\ 3e0ac7f and DeviceIoControl(0x22201C)
  • Hunt retroactively for driver hash across endpoint telemetry
  • Monitor for PEB CommandLine field modification events via kernel ETW providers (MDE Advanced Hunting)

8.4 Strategic Measures

  • Enforce HVCI on all endpoints
  • Restrict SeLoadDriverPrivilege to minimum necessary accounts
  • Subscribe to MalwareBazaar / VirusTotal feeds filtered by signing certificate CN for proactive driver threat intelligence
  • Treat the signing entity as a threat indicator — any file signed by an unrecognized Chinese technology company with no verifiable commercial history should be treated with extreme suspicion

9. Conclusion

dragoncore_k.sys represents a credible, immediately weaponizable threat to enterprise endpoint security. Its zero-input-validation IOCTL interface, combined with a valid WHQL signature from Zhengzhou 403 Network Technology Co., Ltd., makes it an effective BYOVD component for EDR neutralization in targeted intrusions.

The surrounding intelligence elevates this finding well beyond a routine driver vulnerability:

  • EV certificate explicitly revoked by GlobalSign
  • Registered address confirmed as an uninhabited hotel-floor address.
  • letsvpn-3.12.3.exe signed by the same certificate directly matches the Dragon Breath RONINGLOADER LetsVPN lure pattern
  • IOCTL architecture (0x22201C vs 0x222000) supports version iteration of the same codebase
  • Shared CobaltStrike C2 (oss-aws.1nb.xyz) across all three certificate-tagged samples confirms active operational infrastructure
  • In-memory command-line modification engine confirms purpose-built offensive tooling, not accidental vulnerability
  • Personnel-level connection between founder Zhang Liye and OFAC-sanctioned APT31 front company Wuhan Xiaoruizhi introduces a dual-track APT attribution assessment

This research demonstrates that BYOVD threat intelligence must not stop at the technical vulnerability. The signing entity is a first-class intelligence artifact. Shell company structures, EV certificate acquisition patterns, revocation histories, co-signed payload families, and personnel records are underutilized attribution signals that can bridge kernel-level vulnerability analysis with APT campaign tracking.


10. References

  1. Elastic Security Labs — RONINGLOADER: DragonBreath's New Path to PPL Abuse (Jia Yu Chan, Salim Bitam, November 15, 2025)
  2. US DOJ Indictment — APT41 / Chengdu 404 Network Technology (August 2020)
  3. Mandiant — Hunting for Attestation Signed Malware (Google Cloud Blog, 2022)
  4. Sophos — Signed Driver Malware Moves Up the Software Trust Chain (December 2022)
  5. Rapid7 — Winos 4.0 via Trojanized LetsVPN Installers / Catena Loader (May 2025)
  6. Cyble Research — New Malware Campaign Targets LetsVPN Users (November 2023)
  7. Trend Micro — Void Arachne / LetsVPN / Winos Backdoor (June 2024)
  8. Microsoft Security Advisory ADV230001 — Maliciously Signed WHQL Drivers (2023)
  9. Intrusion Truth — Trouble in Paradise: Wuhan Xiaoruizhi Science and Technology (May 2023)
  10. malware.newsTrouble in Paradise (APT31 / Zhang Liye analysis, 2023)
  11. US Treasury OFAC — Sanctions: Wuhan Xiaoruizhi Science and Technology Co., Ltd. and APT31 operators (March 2024)
  12. US DoJ — Indictment: Seven APT31 Operators / Wuhan Xiaoruizhi (March 2024)
  13. UK Government — Sanctions: APT31 / Wuhan XRZ / UK Electoral Commission intrusion (2024)
  14. Hunt.ioInside China's Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped (January 2026)
  15. MalwareBazaar — Tag: Zhengzhou-403-Network-Technology-Co-Ltd
  16. ReliaQuest — Anxun and Chinese APT Activity (2025)
  17. SecurityOnline — Dragon Breath APT Deploys RoningLoader (November 2025)
  18. JoeSandbox — Analysis ID 1679094: tsetup-x64.5.13.1.exe dynamic analysis (trojanized Telegram Desktop installer)
  19. QiAnXin Threat Intelligence Blog — Dragon Breath APT-Q-27 trojanized Telegram installer attribution
  20. US Department of State — Rewards for Justice: APT31 / Wuhan Xiaoruizhi Science & Technology Company, Ltd.
  21. Norway Police Security Service (PST) / Cyber Defense Magazine — Norway Blames China-Linked APT31 for 2018 Government Hack (June 2021)
  22. The Hacker News — Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack (March 2024)

— END OF REPORT —

TLP:WHITE — Approved for unrestricted distribution within the security community.

Disclaimer: For educational and defensive research purposes only. Unauthorized exploitation of described techniques is illegal and unethical.

If you or your organisation have been impacted by an incident of this nature or similar, please reach out to the Ransom-ISAC team at ransom-isac.org or contact us at [email protected].

Found this article helpful?

Share it with your network

Continue Reading

Explore more expert insights and threat intelligence from the Ransom-ISAC community