Technical Analysis & Remediation
MITRE ATT&CK Mapping
Initial Access
T1566.001 (Spearphishing Attachment) - ZIP archives containing malicious LNKs.
Execution
T1204.002 (Malicious File) - User clicks LNK; T1059.005 (Visual Basic) - HTA scripts executed via mshta.exe.
Defense Evasion
T1036 (Masquerading) - LNK files mimic legitimate PDF icons
T1027 (Obfuscated Files or Information) - Reversed C2 endpoints.
Persistence
T1547.001 (Registry Run Keys / Startup Folder) - LNK dropped in Startup.
Telemetry & Artifacts
Network IOCs (C2)
dns.wmiprovider[.]com (Hardcoded C2)
aeroclubofindia.co[.]in (Payload Staging/Compromised Site)
Filesystem Anchors
NCERT-Whatsapp-Advisory.pdf.lnk (Phishing Lure)
nikmights.msi (Installer Payload)
C:\ProgramData\PcDirvs\wininet.dll (Malicious DLL)
C:\ProgramData\PcDirvs\pcDirvs.exe (Loader)
iinneldc.dll (RAT Payload)
C2 Communication Patterns
The malware uses reversed HTTP endpoints to evade static detection: /retsiger (register), /taebtraeh (heartbeat), /dnammoc_teg (get_command).
Payload Characteristics
Adaptive Persistence
The malware checks for specific AV vendors (Kaspersky, Quick Heal, Avast, AVG, Avira) and alters its installation path or method (e.g., using Registry vs. Startup folder) to bypass detection.
Linux Track
Introduction of the "Adel" RAT indicates an expansion into Linux environments, likely targeting backend servers or workstations running non-Windows OS.
Remediation - THE ENTERPRISE TRACK (NIST CSF 2.0)
GOVERN (GV) – Crisis Management
Command
Block all LNK, HTA, and MSI attachments at the email gateway immediately.
Command
Issue an advisory to employees regarding "NCERT" or government-themed WhatsApp advisories delivered via email.
DETECT (DE) – Monitoring & Analysis
Command
Hunt for process execution chains where mshta.exe spawns network connections to unknown external IPs.
Command
Query SIEM for URL strings containing reversed keywords: retsiger, taebtraeh, dnammoc.
Command
Scan endpoints for the directory C:\ProgramData\PcDirvs\ or files named nikmights.msi.
RESPOND (RS) – Mitigation & Containment
Command
Isolate any host attempting to contact dns.wmiprovider[.]com.
Command
If wininet.dll is found in a non-standard path (e.g., ProgramData), immediately suspend the parent process and capture memory for forensics.
RECOVER (RC) – Restoration
Command
Reimage compromised hosts. Persistence mechanisms involving Registry modifications and Startup items may be difficult to fully eradicate manually.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Do not open files ending in .lnk or .hta that arrive via email, even if they look like PDFs.
Command
Update your Antivirus software immediately. This malware specifically looks for Quick Heal, Kaspersky, and Avast to try and bypass them; ensure your definitions are current to force detection.
Priority 2: Identity
Command
If you opened a "Government Advisory" PDF recently that acted suspiciously (e.g., flashed a command prompt), change your passwords from a different, clean device.
Priority 3: Persistence
Command
Check your Windows Startup folder.
Press Windows Key + R, type shell:startup, and press Enter.
Look for suspicious shortcuts (LNK files) or scripts you did not create.
Hardening & References
Baseline
Restrict mshta.exe and wscript.exe execution via AppLocker or WDAC if not required for business operations.
Framework
NIST SP 800-61r3 (Incident Handling)
MITRE ATT&CK T1566.
Context
This campaign specifically exploits the trust in government advisories (e.g., PKCERT/NCERT) to deliver payloads. Verification of the sender's actual email address (not just the display name) is critical.
Source
The Hacker News