Skip to main content
Back to Blog
Threat Intelligence15 min readApril 29, 2026
ChinaAPT31APT-Q-27DragonCoreBYOVD

Dragon in the Kernel — Part II

Independent validation, certificate history, and an expanded driver arsenal: a prior 2024 Zhengzhou 403 GlobalSign EV certificate, a hide_process rootkit, and YDArkDrv.sys signed under the same shell company.

Alex Necula & Ellis Stannard

Contributors: Michael Haag, Squiblydoo

TLP:WHITE — Unrestricted Distribution within the Security Community

Dragon in the Kernel — Part II cover banner

Independent Validation, Certificate History & Expanded Driver Arsenal

dragoncore_k.sys | Zhengzhou 403 Network Technology | Cert Graveyard Collaboration


FieldValue
Report DateApril 29, 2026
AuthorsAlex Necula (Ransom-ISAC)
Independent Researcher CreditMichael Haag — Principal Threat Research Engineer, Splunk / @M_haggis
Certificate Reporting PlatformCert Graveyard — Community certificate abuse reporting project by Squiblydoo
Part IDragonBreath: Dragon in the Kernel — Ransom-ISAC, April 22, 2026
TLP ClassificationTLP:WHITE — Unrestricted Distribution

Overview

Following the publication of Part I, Michael Haag (Principal Threat Research Engineer, Splunk) contacted the authors to share that he had independently reported the same Zhengzhou 403 certificate to GlobalSign on May 1, 2025 — nearly a year before Part I was published, and through an entirely separate investigation path.

His report, submitted via the Cert Graveyard community reporting platform, directly triggered the explicit revocation by GlobalSign documented in Part I. Three independent investigators — the Part I authors, Michael Haag, and the MalwareBazaar community tagging — all converged on the same certificate, the same C2 infrastructure, and the same abuse pattern without coordination. This constitutes robust multi-source confirmation.

Beyond validating the Part I findings, Michael's report introduced evidence that had not yet been documented: a prior Zhengzhou 403 EV certificate active from January 2024, and two additional malicious drivers signed under it — including a process-hiding driver compiled directly from a public GitHub rootkit repository, and YDArkDrv.sys, a well-known Chinese offensive kernel toolkit. Together, these findings expand the Zhengzhou 403 operational picture from a single driver to a complete layered kernel-level offensive stack active for over 15 months.


1. Michael Haag's Independent Report to GlobalSign (May 1, 2025)

Michael Haag submitted the following abuse report to GlobalSign on May 1, 2025, using the Cert Graveyard reporting toolchain (certReport):


Greetings,

We identified a malware signed with a GlobalSign GCC R45 EV CodeSigning CA 2020 certificate.

The malware sample is available on VirusTotal: https://www.virustotal.com/gui/file/ce38c96a69a8a1c6828e11742355c41b878198e08d7efbe73eefa1b5cbe623c5/detection

Certificate details:

  • Name: Zhengzhou 403 Network Technology Co., Ltd.
  • Issuer: GlobalSign GCC R45 EV CodeSigning CA 2020
  • Serial Number: 46 68 ED FA 62 35 54 CF 0B 48 F4 01
  • Thumbprint: B3BD6E706137ED999BFD6E51FE05FCA30C553C30
  • Status: Valid (at time of report)
  • Valid From: 08:44 AM 03/28/2025
  • Valid Until: 08:44 AM 03/29/2026

VirusTotal extracted a malware config for CobaltStrike. It was configured to communicate with the C2 domain oss-aws[.]1nb[.]xyz. This is a trojanized Telegram installer. In sandbox analysis, it uses PowerShell to exclude directories from Windows Defender analysis: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\System\*'"

Sandbox: https://app.any.run/tasks/d59af4e9-9591-4eaa-9f79-404b411041f3

In reviewing the subscriber, I also observed they had a previous GlobalSign certificate:

  • Name: Zhengzhou 403 Network Technology Co., Ltd.
  • Issuer: GlobalSign GCC R45 EV CodeSigning CA 2020
  • Serial Number: 7A 06 2E 41 04 BF 96 33 E5 CD AC 31
  • Thumbprint: D2BA5AE97458151B42E0C08B248F28EB918A93CF
  • Status: Valid (at time of report)
  • Valid From: 02:24 AM 01/29/2024
  • Valid Until: 02:24 AM 01/29/2025

That certificate was used to sign files that are also malicious.


Cert Graveyard report submission to GlobalSign

1.1 Analytical Significance

FindingImplication
Same certificate (4668EDFA...) as dragoncore_k.sysMulti-source confirmation — identical abuse pattern found independently
Same C2 (oss-aws.1nb.xyz)C2 infrastructure cross-validated by independent researcher
Trojanized Telegram installer as the reported sampleConfirms certificate was used across multiple simultaneous campaigns (LetsVPN + Telegram) — consistent with certificate-as-a-service model
PowerShell Defender exclusion (Add-MpPreference)Standard Chinese APT pre-EDR-kill evasion — complements the kernel-level kill capability of dragoncore_k.sys
Prior 2024 certificate identifiedExtends the Zhengzhou 403 operational timeline back to January 2024 — 15+ months of active malicious signing
Report triggered GlobalSign revocationMichael's May 1, 2025 report is the direct cause of the explicit revocation documented in Part I

About Cert Graveyard:

Cert Graveyard is a community-driven platform created by Squiblydoo for documenting and reporting code-signing certificate abuse. The platform has processed over 2,000 certificate revocations across major malware families. Michael used the certReport tool to generate and submit this report — the same toolchain that has driven revocations across hundreds of campaigns including SolarMarker, DarkGate, Qakbot, and now Zhengzhou 403. If you encounter a signed malicious file, Cert Graveyard is where to report it: certgraveyard.org.


2. Prior Certificate — January 2024 to January 2025

Michael's report revealed that Zhengzhou 403 held a prior GlobalSign EV certificate active more than a year before the one analyzed in Part I:

FieldValue
Serial Number7A062E4104BF9633E5CDAC31
ThumbprintD2BA5AE97458151B42E0C08B248F28EB918A93CF
Valid FromJanuary 29, 2024
Valid ToJanuary 29, 2025
StatusExpired (not explicitly revoked — predates the Cert Graveyard report)

Critical implication:

Zhengzhou 403 obtained its first EV code-signing certificate from GlobalSign in January 2024 — the operation did not begin in early 2025. Malicious signing activity under this entity spans at least 15 months across two consecutive certificates. The 2024 certificate expired naturally, and a new one was obtained in March 2025 within weeks, demonstrating deliberate operational continuity planning: allow the first certificate to expire without triggering a revocation investigation, then immediately acquire a replacement.


3. Drivers Signed Under the 2024 Certificate

3.1 hide_process Driver — GitHub Rootkit with PDB Path Evidence

FieldValue
SHA-2568b5af508dcee04dbb7dabdffeff03726ef821182ffdb8a930af57e9e71740440
Certificate7A062E4104BF9633E5CDAC31 (2024 cert)
VirusTotalhttps://www.virustotal.com/gui/file/8b5af508dcee04dbb7dabdffeff03726ef821182ffdb8a930af57e9e71740440/details
PDB PathC:\Users\Administrator\Desktop\hide_process-master\x64\Release\hide_process.pdb

What the PDB path reveals:

hide_process-master is a publicly available GitHub repository implementing process hiding via EPROCESS doubly-linked list unlinking — a well-documented kernel rootkit technique. The driver modifies ActiveProcessLinks.Flink and ActiveProcessLinks.Blink in the kernel EPROCESS structure, removing the target process from the list iterated by PsGetNextProcess, ZwQuerySystemInformation, and CreateToolhelp32Snapshot.

A process hidden this way:

  • Does not appear in Task Manager, Process Explorer, or any user-mode process enumeration tool
  • Does not appear in tasklist, Get-Process, or WMI queries
  • Remains detectable only via kernel-level cross-view analysis (EPROCESS vs. handle table comparison)
  • Is invisible to PsSetCreateProcessNotifyRoutineEx callbacks after the unlinking occurs

Operational security observation: The PDB path shows the operator compiled this directly from a cloned GitHub repository on an Administrator desktop (C:\Users\Administrator\Desktop\). This is minimal OpSec on the development machine — consistent with the i-SOON leaked tooling methodology where operators adapt publicly available offensive security research rather than writing tooling from scratch.

Combined capability with dragoncore_k.sys:

When deployed alongside dragoncore_k.sys, these two drivers form a complementary offensive stack:

DriverPrimary Capability
dragoncore_k.sysKills EDR processes via IOCTL 0x22201C + Spoofs command-line telemetry via PEB write-back
hide_process driverHides the attacker's process entirely from kernel enumeration via EPROCESS unlinking

Together: blind the security tool, spoof its telemetry, then make the attacker's process disappear from any remaining visibility.

hide_process driver — VirusTotal / PDB analysis

3.2 YDArkDrv.sys — Professional Chinese Rootkit Toolkit

FieldValue
SHA-256256eebb34389854fb0befdbfb75cefb7354c75ab02239695899bdd2f37e1bd73
Certificate7A062E4104BF9633E5CDAC31 (2024 cert)
VirusTotalhttps://www.virustotal.com/gui/file/256eebb34389854fb0befdbfb75cefb7354c75ab02239695899bdd2f37e1bd73/details
ClassificationYDArkDrv.sys — kernel driver component of YDArk rootkit toolkit
YDArkDrv.sys — VirusTotal classification

YDArk background:

YDArk is a well-documented Chinese offensive security / rootkit toolkit, widely known in Chinese security research communities since 2019. Its kernel driver component YDArkDrv.sys provides a comprehensive suite of system manipulation capabilities:

CapabilityMechanism
Process hidingEPROCESS.ActiveProcessLinks doubly-linked list unlinking; UniqueProcessId zeroing
Process protectionEPROCESS token and protection flags modification
Module hidingPEB InLoadOrderLinks / InMemoryOrderLinks list unlinking
File hidingIRP filter hook on NTFS filesystem
Registry hidingRegistry hive direct manipulation
SSDT hookingSystem Service Descriptor Table function pointer replacement
Driver hidingDriver object list manipulation
Arbitrary memory R/WDirect kernel memory read/write primitives
Privilege escalationToken stealing from System process (SYSTEM token copy)

Significance:

YDArkDrv.sys is not a proof-of-concept or a simple utility — it is a comprehensive, production-grade offensive kernel toolkit with a high degree of completion. Its presence in the Zhengzhou 403 signing portfolio, alongside a hide_process driver and dragoncore_k.sys, confirms that this certificate was used to build and deploy a deliberate, layered kernel-level offensive capability stack, not isolated accidental samples.

YDArk capability marker
YDArk capability detail view

4. The Complete Kernel Offensive Stack

Across both certificates, Zhengzhou 403 signed the following coherent offensive toolkit:

LayerDriverCapabilityCertificate
Layer 1 — Killdragoncore_k.sysTerminate EDR/AV via IOCTL 0x22201C (ZwTerminateProcess from Ring 0)2025 cert
Layer 2 — Blinddragoncore_k.sysIn-memory PEB CommandLine modification — spoof command-line telemetry across all EDRs2025 cert
Layer 3 — Hidehide_process driverEPROCESS unlinking — remove attacker process from all kernel enumeration2024 cert
Layer 4 — Full StealthYDArkDrv.sysFiles, registry, modules, SSDT, drivers — complete system-wide concealment2024 cert
Layer 5 — PersistCobaltStrike BeaconC2 via oss-aws.1nb.xyz, PowerShell Defender exclusion2025 cert (Telegram dropper)

No legitimate driver development company produces all five layers of this stack under the same EV certificate across 15 months. This is a coordinated offensive toolkit. Zhengzhou 403 Network Technology Co., Ltd. was its signing vehicle.


5. Revised Operational Timeline

DateCertificateEvent
Jan 29, 20247A062E41... issuedFirst GlobalSign EV cert obtained by Zhengzhou 403
Jan–Dec 20247A062E41... activehide_process driver signed; YDArkDrv.sys signed; additional malicious samples
Nov 20247A062E41... (still active)dragoncore_k.sys compiled
Jan 29, 20257A062E41... expiresCertificate allowed to expire naturally — no revocation triggered
Mar 28, 20254668EDFA... issuedNew EV cert immediately obtained from GlobalSign — seamless operational continuity
Mar–Apr 20254668EDFA... activedragoncore_k.sys signed; letsvpn-3.12.3.exe signed; trojanized Telegram installer signed
May 1, 2025Michael Haag reports certificate abuse to GlobalSign via Cert Graveyard
~May 2025GlobalSign explicitly revokes 4668EDFA... — operational window cut to ~5 weeks
Apr 22, 2026Part I published on Ransom-ISAC
Apr 29, 2026Part II published — expanded timeline and driver arsenal documented

Key pattern:

The natural expiry of the 2024 certificate (rather than revocation) indicates the operator was aware of revocation risk and managed it deliberately. The rapid re-acquisition of a new certificate within 58 days of expiry confirms this was a planned rotation, not a reactive response. Michael Haag's report disrupted the second certificate's operational life — reducing it from a planned 12-month window to approximately 5 operational weeks.


6. Updated Indicators of Compromise

Additional File Hashes

Filename / TypeSHA-256CertificateNotes
Trojanized Telegram installerce38c96a69a8a1c6828e11742355c41b878198e08d7efbe73eefa1b5cbe623c54668EDFA... (2025)CobaltStrike C2: oss-aws.1nb.xyz; PowerShell Defender exclusion
hide_process driver8b5af508dcee04dbb7dabdffeff03726ef821182ffdb8a930af57e9e717404407A062E41... (2024)PDB: hide_process-master; EPROCESS unlinking
YDArkDrv.sys256eebb34389854fb0befdbfb75cefb7354c75ab02239695899bdd2f37e1bd737A062E41... (2024)Full rootkit toolkit

Additional Certificate (2024)

FieldValueAction
Serial7A062E4104BF9633E5CDAC31Retroactive hunt across endpoint telemetry — active Jan 2024–Jan 2025
ThumbprintD2BA5AE97458151B42E0C08B248F28EB918A93CFBlock by thumbprint; files signed remain malicious post-expiry
StatusExpired Jan 2025Expired ≠ safe — signed files carry the signature permanently

Additional Behavioral Indicators

  • PowerShell Add-MpPreference -ExclusionPath commands targeting Common Files\System\* prior to driver load
  • CreateService events for unsigned or novel kernel drivers immediately following PowerShell Defender exclusion commands
  • Any process-enumeration anomalies where EPROCESS walking returns different results from ZwQuerySystemInformation (indicator of EPROCESS unlinking by hide_process or YDArkDrv.sys)
  • SSDT hook detection via integrity verification of KeServiceDescriptorTable entries (YDArkDrv.sys indicator)

7. Conclusions

Michael Haag's independent disclosure transforms the Zhengzhou 403 investigation from a single-discovery finding into a multi-investigator, multi-campaign, multi-certificate confirmed operation spanning at least 15 months of active malicious signing activity (January 2024 – May 2025).

The expanded driver arsenal reveals the full picture of what Zhengzhou 403 was actually signing:

  1. dragoncore_k.sys — Kill the EDR, spoof command-line telemetry (Part I)
  2. hide_process driver — Hide the attacker's process from kernel enumeration
  3. YDArkDrv.sys — Full system-wide stealth across files, registry, drivers, SSDT
  4. CobaltStrike Beacon — Persistent C2 with Defender exclusion pre-staging

This is not a collection of opportunistic malware samples. It is a coherent, purpose-built offensive toolkit systematically signed under two consecutive EV certificates by a shell company with no legitimate products, registered address confirmed as an uninhabited hotel-floor address, and a founder whose name possibly matches one in APT31 payroll records..

The natural certificate rotation from the 2024 to the 2025 certificate — timed to avoid revocation scrutiny — demonstrates deliberate operational security planning at the certificate infrastructure level. The Cert Graveyard report by Michael Haag disrupted this rotation by triggering an explicit revocation, cutting the second certificate's operational life from a planned 12 months to approximately 5 weeks.

This case demonstrates a model that the community should track systematically:

Chinese APT shell companies acquiring consecutive EV code-signing certificates, rotating on natural expiry to avoid scrutiny, and maintaining continuous malicious signing capability across certificate boundaries. The Cert Graveyard platform exists precisely to close this gap — if you find signed malware, report it at certgraveyard.org.


8. Acknowledgements

Special thanks to Michael Haag (@M_haggis, Principal Threat Research Engineer at Splunk) for independently identifying the Zhengzhou 403 certificate abuse in May 2025, submitting the GlobalSign revocation report that directly triggered the certificate revocation documented in Part I, and sharing his findings with the authors to enable this Part II publication.

Thanks also to Squiblydoo for creating and maintaining Cert Graveyard — the community infrastructure that made it possible to report, track, and revoke this certificate. Without platforms like Cert Graveyard, certificate abuse of this kind would continue undetected for far longer.


9. References

  1. Part I — Alex Necula, Ellis Stannard — DragonBreath: Dragon in the Kernel — Ransom-ISAC, April 22, 2026 — https://ransom-isac.org/blog/dragonbreath-dragon-in-the-kernel/
  2. Michael Haag — Independent GlobalSign abuse report, May 1, 2025 — via Cert Graveyard / certReport
  3. Cert Graveyard — Squiblydoo — Community code-signing certificate abuse reporting platform — https://certgraveyard.org
  4. Squiblydoo BlogThe CertGraveyardhttps://squiblydoo.blog/2026/04/01/the-certgraveyard/
  5. Michael Haag / Splunk — Threat Research — https://www.splunk.com/en_us/blog/author/mhaag.html
  6. VirusTotal — Trojanized Telegram sample — ce38c96a...https://www.virustotal.com/gui/file/ce38c96a69a8a1c6828e11742355c41b878198e08d7efbe73eefa1b5cbe623c5/detection
  7. VirusTotalhide_process driver — 8b5af508...https://www.virustotal.com/gui/file/8b5af508dcee04dbb7dabdffeff03726ef821182ffdb8a930af57e9e71740440/details
  8. VirusTotalYDArkDrv.sys256eebb3...https://www.virustotal.com/gui/file/256eebb34389854fb0befdbfb75cefb7354c75ab02239695899bdd2f37e1bd73/details
  9. any.run sandbox — Trojanized Telegram installer analysis — https://app.any.run/tasks/d59af4e9-9591-4eaa-9f79-404b411041f3
  10. MalwareBazaar — Zhengzhou 403 certificate tag — https://bazaar.abuse.ch/browse/tag/Zhengzhou-403-Network-Technology-Co-Ltd/
  11. SangYun Shin / MediumHow to Find Processes Hidden by YDArk.exehttps://medium.com/@iamshinsangyun/how-to-find-processes-hidden-by-ydark-exe-18525318164a
  12. Elastic Security LabsRONINGLOADER: DragonBreath's New Path to PPL Abuse — November 15, 2025 — https://www.elastic.co/security-labs/roningloader

— END OF PART II —

TLP:WHITE — Approved for unrestricted distribution within the security community.

Disclaimer: For educational and defensive research purposes only. Unauthorized exploitation of described techniques is illegal and unethical.

Found this article helpful?

Share it with your network

Continue Reading

Explore more expert insights and threat intelligence from the Ransom-ISAC community