Joint Analysis by AhnLab and NCSC on TA-ShadowCricket: Emerging Malware Trends and IRC Server Tracking

Joint Analysis by AhnLab and NCSC on TA-ShadowCricket: Emerging Malware Trends and IRC Server Tracking

 

AhnLab and the National Cyber Security Center (NCSC) have released a report that details the activities of the TA-ShadowCricket group from 2023 to the present.

 

Full Report: (APT Group Tracking Report) TA-ShadowCricket_2025.05.23.pdf

 

Since November 2024, AhnLab has been working with the NCSC to analyze the malicious IRC server and related malware to classify the unidentified threat actor as Larva-24013 and trace their activities, and has confirmed their association with the Shadow Force group. AhnLab manages malicious activities in four stages through the “Threat Actor Naming and Taxonomy,” classifying threat actors as “Larva” (unidentified threat actors) and “Arthropod” (identified threat actors). Following AhnLab’s threat actor taxonomy and naming convention, the threat actor has been identified and named TA-ShadowCricket.

 

TA-ShadowCricket group

TA-ShadowCricket is a threat group formerly known as Shadow Force, and is believed to be associated with China.

The threat actor has been active in the Asia-Pacific region, including South Korea, since 2012. They mainly targeted externally exposed Windows servers’ remote access feature or poorly managed Microsoft SQL (MS-SQL) servers to install IRC bots or backdoors.

 

 

 

Some of the TA-ShadowCricket malware and tools include keywords that appear to be related to the threat actor, such as ‘Melody’, ‘Syrinx’, and ‘WinEggDrop’.

 

 

Analyzing IRC Server

 

As of now, the threat group continues to operate an IRC server with the same domain name, and a Korean IP address is currently connected to this domain. AhnLab and NCSC have obtained the system in which the IRC server is installed and used as a C&C server. Analysis of this system has identified over 2,000 affected IPs in 72 countries worldwide.

 

It was confirmed that TA-ShadowCricket operated IRC botnet devices, and the affected IPs by regions are as follows: 895 in China, 457 in Korea, 98 in India, 94 in Vietnam, 44 in Taiwan, 38 in Germany, 37 in Indonesia, 31 in Thailand, and 25 in the United States.

 

 

 

The attacker accessed and controlled the victim systems via RDP from July 2020 to February 2025. Some of the connections were initiated from IPs located in China.

 

 

Malware & Tools Used by TA-ShadowCricket

 

During the 10-year period of activity, various malware and tools used by TA-ShadowCricket have been identified. While some malware and attack tools have evolved significantly over time, others have remained in active use.

 

The malware and tools used by the TA-ShadowCricket group after breaching the system can be categorized into the following stages.

The process of installing and operating malware after a breach can be broadly divided into three stages.

Stage 1 involves downloading and installing malware, using downloaders and command execution tools. Stage 2 usually involves deploying backdoors, while Stage 3 involves installing malware for additional malicious behaviors.

 

 

The following malware and tools have been in use by TA-ShadowCricket since 2023.

 

 

Phase

Type

Time

Name

Main Features

Stage 1

Reconnaissance and Additional Malware Installation

2023-

Upm 

Privilege Escalation, System Information Collection, and Additional Malware Download and Installation

Reconnaissance and Additional Malware Installation

2023-

SqlShell

Privilege Escalation, System Information Collection, and Additional Malware Download and Installation

Downloader

2024

Downloader

Download Backdoor from FTP

File Patch

2014-

Pemodifier

Patch for Normal Execution File for Persistence

Stage 2

Backdoor

2021-

Maggie

Remote Command Execution

Backdoor

2012-

Wgdrop

IRC Bot, Remote Command Execution

Backdoor

2019-2024

Sqldoor

Execute Remote Command

Stage 3

Data Collection

2023-

CredentialStealer

Credential Theft

Hooking

2024-

Detofin

Using Detour to hook specific APIs

CoinMiner

2021-

Miner

Coin Mining

Scanner

2023-

MaggieScan

Scanner for finding vulnerable MS-SQL servers

Account

2021-

ShadUser

Account Management and Data Collection

Tool

2024

AddPath

Add Windows Defender Exclusion Path

Network

2021-

Fport/Mport

Port Mapping

The threat actor uses Pemodifier, a tool that patches Windows executable files, to modify files required for system operation in order to load a malicious DLL file. The tool is named iat.exe or iatinfect.exe.

 

The Shadowforce malware, which has been used as a backdoor since 2021, has gradually been replaced by the Maggie malware. However, the malware continues to use the file name ntuser.dat. The tool with different features such as adding users and changing RDP settings uses the file name re.0001.

 

While many backdoors connect to designated C&C servers to receive commands, the backdoors used by the TA-ShadowCricket group do not have fixed C&C servers.

The Shadowforce malware activates the backdoor by installing the WinPcap packet capture library and sending network packets with a specific signal (Magic Sequence). The Maggie malware is written as an Extended Stored Procedure (ESP) supported by MS SQL Server, and can be controlled by SQL queries.

 

In some of the affected systems, the installation of keyloggers, credential stealers, and cryptocurrency miners was also confirmed.

 

Conclusion

For over 10 years, the TA-ShadowForce group has been active in the Asia region with Korea as its base. The threat actor has maintained the same attack momentum, such as continuously using malware and tools with the same file names.

However, due to limited coverage by security companies and organizations, detailed information about this threat group remains scarce.

 

Unlike other threat actors, the TA-ShadowCricket group has been active for over 13 years, quietly stealing information and not demanding money or releasing the stolen information on the dark web after their breach.

TA-ShadowCricket continue to manage their C2 servers and maintain control over thousands of compromised systems. This sustained activity suggests they are securing a foundation for future operations, such as launching large-scale DDoS attacks.

Given the tools used, the malware creators, the regions primarily affected, and the fact that the C2 server is accessed from a Chinese IP address, there are indications of a possible link to China. However, the presence of a nickname embedded in the malware and the deployment of CoinMiners raise questions about whether this is truly a state-sponsored APT group.

 

The joint analysis has confirmed that the TA-ShadowCricket group is still managing their breach systems using IRC bots.

Through the analysis of the IRC server, it was identified that more than 2,000 bots are being operated. To prevent further spread of damage, it is essential to block access to the IRC server and promptly detect, neutralize, and remove the associated malware strains.

 

 

 

 

MD5

0b6ac1e20c828eae2fdc3b702118c856
1579fc385238ce366ee137aaf91a50dd
189e46f458a3d460367133022634a5df
2dec0626f227d32cca17bce5f772a286
3c91f2ef60966e483a16224bf8823d0b
FQDN

abc[.]itembuy[.]org
irc[.]itembuy[.]org
www[.]itembuy[.]org
IP

1[.]234[.]4[.]115
114[.]202[.]2[.]32
121[.]178[.]180[.]210
210[.]127[.]211[.]40
211[.]204[.]100[.]20