Who is APT35?
APT35, also known by various aliases such as **Charming Kitten, Phosphorus, and Mint Sandstorm**, is an Iranian state sponsored cyber-espionage group active since at least 2014. The group has been involved in numerous cyber espionage campaigns targeting various sectors globally.
In 2021, Google’s Threat Analysis Group highlighted APT35’s use of conference-themed phishing emails and the exploitation of Telegram for operator notifications.
In 2022, Google’s Threat Analysis Group identified a new tool developed by APT35, dubbed HYPERSCRAPE, designed to steal data from well-known email providers. This tool requires the target’s credentials to create a session on their behalf and acts in such a way that using old-style mail services appears normal to the server, downloading the victim’s emails and making changes to hide its fingerprint.
The hash cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa
is flagged as malicious and attributed to APT35 / Charming Kitten.
Logs show three key events directed toward the victim host:
At 11:22 AM, outbound HTTP traffic from Arthur’s host was logged to another APT35-attributed IP: 136.243.108[.]14, with the source process identified as downloader.exe.
Let’sDefend threat intel and VirusTotal both confirm this IP is tied to APT35 operations.
Browser history on Arthur’s machine shows extensive non-business use (Amazon, Netflix, Instagram, etc.), likely in violation of company policy or indicating BYOD usage.
All history is from 2 days prior, except for a single visit to microsoft.com on the day of the event.
Terminal history is empty — either cleared or not logged.
The Network Action tab reveals:
– Post-compromise outbound connections to criminal IPs
– Three suspicious connections at 11:50 AM to internal IP 172.31.26[.]208, which is unrecognized by the inventory system
The Process tab shows:
– Execution of emaildownloader.exe at 2023-12-27 11:21:37.051 from explorer.exe
– Then:
– MpCmdRun.exe (Defender CLI) spawning conhost.exe with undocumented arguments: 0xffffffff -ForceV1
– This is not typical Defender behavior, suggesting LOLBAS abuse for stealth execution or post-exploitation.
gather victim identity information
external
YES
No
YES
cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa
MD5 hash
md5 hash
136.243.108[.]14
Ip address attacker
Ip address
On December 27, 2023, suspicious activity was detected involving host Arthur. Threat intelligence and forensic data confirm indicators consistent with APT35 (Charming Kitten), an Iranian state-sponsored cyber-espionage group.
Threat intel flagged hash cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa as malicious, attributed to APT35 and associated with the HYPERSCRAPE malware tool.
Log management shows:
– RDP connection to Arthur’s host from 173.209.51[.]54 at 11:17 AM.
– Shortly after, an Exchange download event titled “Notification of Multiple Mail Download” — behavior consistent with HYPERSCRAPE’s email theft operations.
– Outbound HTTP traffic from the victim to 136.243.108[.]14 at 11:22 AM, an IP known to be APT35 infrastructure, flagged as malicious on VirusTotal.
Endpoint telemetry shows:
– Execution of emaildownloader.exe, followed by MpCmdRun.exe spawning conhost.exe with suspicious undocumented arguments (0xffffffff -ForceV1), suggesting LOLBAS abuse for stealth execution or post-exploitation.
– Terminal history is empty (potentially cleared).
– Network action tab reveals multiple connections to criminal IPs and a possible lateral traffic toward internal IP 172.31.26[.]208 (unrecognized by endpoint inventory).
– No related activity was found in email security logs, and browser history on the host shows non-corporate usage unrelated to the incident.
This attack is consistent with APT35’s typical tactics, leveraging stolen credentials, LOLBin abuse, and exfiltration through Exchange services.
Cybersecurity learner, log nerd, and TryHackMe badge hoarder. Let’s connect on LinkedIn before I get pulled into another packet capture.
Apparently we have to tell you this: yes, cookies are used. They're not edible, and no, you can't escape them — but you can pick what gets tracked. Yay for EU law!