Conclusion
Over the past year, we have seen Yellow Garuda continue to add tools to its arsenal. In its use of macro-enabled template files, we can see that the threat actor has made efforts to stage various parts of the infection chain remotely, disrupting analysis efforts where these are not accessible. The threat actor has also continued to make OPSEC mistakes exposing its tools and targeting through open servers. The Telegram ‘grabber’ tool we observed appears to be a tool that the threat actor has had access to since at least January 2021, and used against domestic targets to obtain specific access to Telegram messages and contacts alongside mobile malware.
The threat actor’s operational report has given us further insight into its analysis process, indicating that there is an internal structure to its operations denoted by numerical call signs. It also highlights the alias of an individual which has previously been linked to Iran-based activity over several years.
MITRE ATT&CK
More detailed information on each of the techniques used in this blog, along with mitigations, can be found on the following MITRE pages:
Valid Accounts - https://attack.mitre.org/techniques/T1078/
Two-Factor Authentication Interception - https://attack.mitre.org/techniques/T1111/
Obfuscated Files or Information - https://attack.mitre.org/techniques/T1027/
System Information Discovery - https://attack.mitre.org/techniques/T1082/
System Network Configuration Discovery - https://attack.mitre.org/techniques/T1016/
Data Staged - https://attack.mitre.org/techniques/T1074/
Exfiltration Over Web Service - https://attack.mitre.org/techniques/T1567/
Acquire Infrastructure: Web Services - https://attack.mitre.org/techniques/T1583/006/
Acquire Infrastructure: Domains - https://attack.mitre.org/techniques/T1583/001/
Phishing: Spearphishing Link - https://attack.mitre.org/techniques/T1566/002/
Indicators of Compromise
Telegram ‘grabber’ tool: