Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
    Cybersecurity

    Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

    adminBy adminMarch 13, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020.

    Palo Alto Networks Unit 42 is tracking the threat activity under the moniker CL-STA-1087, where CL refers to cluster, and STA stands for state-backed motivation.

    “The activity demonstrated strategic operational patience and a focus on highly targeted intelligence collection, rather than bulk data theft,” security researchers Lior Rochberger and Yoav Zemah said. “The attackers behind this cluster actively searched for and collected highly specific files concerning military capabilities, organizational structures, and collaborative efforts with Western armed forces.”

    The campaign exhibits hallmarks commonly associated with advanced persistent threat (APT) operations, including carefully crafted delivery methods, defense evasion strategies, highly stable operational infrastructure, and custom payload deployment designed to support sustained unauthorized access to compromised systems.

    The tools used by the threat actor in the malicious activity include backdoors named AppleChris and MemFun, and a credential harvester called Getpass.

    The cybersecurity vendor said it detected the intrusion set after identifying suspicious PowerShell execution, allowing the script to enter into a sleep state for six hours and then create reverse shells to a threat actor-controlled command-and-control (C2) server. The exact initial access vector used in the attack remains unknown.

    The infection sequence involves the deployment of AppleChris, different versions of which are dropped across target endpoints following lateral movement to maintain persistence and evade signature-based detection. The threat actors have also been observed conducting searches related to official meeting records, joint military activities, and detailed assessments of operational capabilities.

    “The attackers showed particular interest in files related to military organizational structures and strategy, including command, control, communications, computers, and intelligence (C4I) systems,” the researchers noted.

    Both AppleChris variants and MemFun are designed to access a shared Pastebin account, which acts as a dead drop resolver to fetch the actual C2 address stored in Base64-decoded format. One version of AppleChris also relies on Dropbox to extract the C2 information, with the Pastebin-based approach used as a fallback option. The Pastebin pastes date back to September 2020.

    Launched via DLL hijacking, AppleChris initiates contact with the C2 server to receive commands that allow it to conduct drive enumeration, directory listing, file upload/download/deletion, process enumeration, remote shell execution, and silent process creation.

    The second tunneler variant represents an evolution of its predecessor, using just Pastebin to get the C2 address, in addition to introducing advanced network proxy capabilities.

    “To bypass automated security systems, some of the malware variants employ sandbox evasion tactics at runtime,” Unit 42 said. “These variants trigger delayed execution through sleep timers of 30 seconds (EXE) and 120 seconds (DLL), effectively outlasting the typical monitoring windows of automated sandboxes.”

    MemFun is launched by means of a multi-stage chain: an initial loader injects shellcode responsible for launching an in-memory downloader, whose main purpose is to retrieve C2 configuration details from Pastebin, communicate with the C2 server, and obtain a DLL that, in turn, triggers the execution of the backdoor.

    Since the DLL is fetched from the C2 at runtime, it gives threat actors the ability to easily deliver other payloads without having to change anything. This behavior transforms MemFun into a modular malware platform as opposed to a static backdoor like AppleChris.

    The execution of MemFun begins with a dropper that runs anti-forensic checks before altering its own file creation timestamp to match the creation time of the Windows System directory. Subsequently, it injects the main payload into the memory of a suspended process associated with “dllhost.exe” using a technique referred to as process hollowing.

    In doing so, the malware runs under the guise of a legitimate Windows process to fly under the radar and avoid leaving additional artifacts on disk. 

    Also put to use in the attacks is a custom version of Mimikatz known as Getpass that escalates privileges and attempts to extract plaintext passwords, NTLM hashes and authentication data directly from the “lsass.exe” process memory.

    “The threat actor behind the cluster demonstrated operational patience and security awareness,” Unit 42 concluded. “They maintained dormant access for months while focusing on precision intelligence collection and implementing robust operational security measures to ensure campaign longevity.”

    AppleChris Asian Chinese hackers Malware MemFun Militaries Southeast Target
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleYour smart home needs a mesh network, here’s what that means
    Next Article How to Spot ‘Living Off the Land’ Computer Attacks
    admin
    • Website

    Related Posts

    Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

    March 14, 2026

    Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

    March 14, 2026

    Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls

    March 14, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Microsoft is quietly turning Windows apps into websites, and New Outlook is a warning

    March 14, 2026

    Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

    March 14, 2026

    Only 15% of pages retrieved by ChatGPT appear in final answers: Report

    March 14, 2026

    Google Messages is better than ever, but it still leaves me frustrated

    March 14, 2026
    Categories
    • Blogging (40)
    • Cybersecurity (771)
    • Privacy & Online Earning (120)
    • SEO & Digital Marketing (485)
    • Tech Tools & Mobile / Apps (944)
    • WiFi / Internet & Networking (129)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Microsoft is quietly turning Windows apps into websites, and New Outlook is a warning

    March 14, 2026

    Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

    March 14, 2026

    Only 15% of pages retrieved by ChatGPT appear in final answers: Report

    March 14, 2026
    Most Popular
    • Microsoft is quietly turning Windows apps into websites, and New Outlook is a warning
    • Critical HPE AOS-CX Vulnerability Allows Admin Password Resets
    • Only 15% of pages retrieved by ChatGPT appear in final answers: Report
    • Google Messages is better than ever, but it still leaves me frustrated
    • New Qualcomm GBL exploit brings bootloader unlocking to flagship Androids
    • Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
    • ‘Current’ Fixes My Biggest Issues With RSS Readers
    • Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.