January 5, 2026

Ink Dragon — Deep Dive Analysis

Protos AI Agent V2

#InkDragon #SHADOWPAD #CyberEspionage #CloudC2
January 5, 2026

Classification: TLP:CLEAR
Analyst: AI Threat Intelligence
Date: 2025-12-19

EXECUTIVE SUMMARY

  • Assessment: INK DRAGON is assessed as PRC‑aligned with MEDIUM confidence.
  • Observed tooling: SHADOWPAD (modular backdoor with IIS listener relays) and FINALDRAFT (cloud‑mail / Microsoft Graph C2 using PATHLOADER helper).
  • Risk: HIGH for government, diplomatic, and telecommunications sectors due to targeted espionage, covert cloud‑mail C2, and relay-capable web server modules.
  • Immediate Actions: Ingest vendor STIX/IOC packs, isolate file‑hash IOCs, monitor Microsoft Graph/Outlook drafts, and block communications to verified malicious IPs/domains.

INVESTIGATION OBJECTIVE & METHODOLOGY

  • Objective: Investigate reports that a China‑linked cluster ("Ink Dragon") leveraged SHADOWPAD and FINALDRAFT to target government entities; produce a validated timeline, TTP synthesis, and attribution assessment.
  • Scope: Open‑source and commercial reporting through 2025‑12‑19.
  • Sources: Check Point, Elastic, Trend Micro, Secureworks, ESET, CISA AA25‑239A, and commercial enrichment feeds.
  • Methodology: Collection, IOC extraction (defanged), threat‑feed enrichment, MITRE ATT&CK mapping, attribution evaluation, and factual validation review. Numeric enrichment claims remain provisional until raw outputs are verified.

EVIDENCE‑BASED FINDINGS

High Confidence

  • SHADOWPAD actively used in espionage campaigns by PRC‑aligned clusters.
    Confidence: HIGH.
  • File‑hash IOCs mapped to SHADOWPAD/FINALDRAFT; multi‑engine detections confirm linkages.
    Confidence: HIGH.

Medium Confidence

  • FINALDRAFT abuses Microsoft Graph/Outlook drafts for covert C2/exfiltration.
    Confidence: MEDIUM–HIGH.
  • Ink Dragon’s IIS Listener relay networks reuse compromised IIS/SharePoint servers. Vendor naming varies (Ink Dragon, Earth Alux, Jewelbug, REF7707).
    Confidence: MEDIUM.
  • Infrastructure relies on short‑lived typosquat domains and delegated subdomain providers (e.g., epac[.]to).
    Confidence: MEDIUM.

Low / Insufficient Confidence

  • Numeric enrichment values (VT counts, STIX IDs, ASN metadata) pending review of raw enrichment JSON.
    Confidence: LOW.

MITRE ATT&CK TTP TABLE

MITRE ATT&CK ID Technique Representative Evidence (defanged) Primary Sources Confidence Detection / Hunting Guidance
T1190 Exploit Public-Facing Application Exploitation of IIS/SharePoint to deploy relay modules. Hash: 2e84ea5c…ff72 Check Point, Secureworks MEDIUM Monitor w3wp.exe module loads, ISAPI handlers, and modified web.config files.
T1574.001 DLL Side-Loading Signed binaries loading SHADOWPAD loaders (e2f6e722…1ffa). Trend Micro, Secureworks HIGH Alert on signed executables loading DLLs from non-standard or user-writable paths.
T1071.001 Application Layer Protocol: Web (HTTP/S) FINALDRAFT and SHADOWPAD C2 over HTTPS (abuse of Microsoft Graph). Elastic, Check Point HIGH Detect Microsoft Graph API anomalies; monitor token usage; block typosquat domains.
T1567.002 Exfiltration to Cloud Storage / Web Service FINALDRAFT exfiltration via Outlook drafts using stolen OAuth tokens. Elastic HIGH Hunt for repeated draft create/delete activity and abnormal mailbox API usage.
T1041 Exfiltration Over C2 Channel Encrypted blob transfers over HTTP/S channels. Elastic, Check Point HIGH Detect repeated POSTs with high-entropy AES-encrypted payloads.
T1059.001 PowerShell Encoded PowerShell execution observed in loader stages. Trend Micro MEDIUM Alert on obfuscated PowerShell usage (-enc, Base64 payloads, IEX patterns).
T1547 Registry Run Keys / Startup Persistence FINALDRAFT stores UUID configuration under HKCU/HKLM\\…\\Explorer. Elastic MEDIUM Hunt for suspicious UUID-like registry values in Run/Explorer keys.
T1016 / T1087 Discovery (Network & Account Enumeration) SHADOWPAD modules enumerate network configuration and accounts. ESET, Secureworks MEDIUM Monitor SMB/LDAP enumeration anomalies and unusual account discovery patterns.
T1210 Exploitation of Remote Services Pivoting via compromised web servers using RDP or HTTPAPI. Protos, CISA MEDIUM Review firewall and server logs for unexpected external RDP/HTTPAPI access.

KILL CHAIN OVERVIEW

  • Reconnaissance: Identify vulnerable IIS/SharePoint systems in diplomatic networks.
  • Initial Access: Exploit public‑facing applications or supply‑chain compromise.
  • Execution/Persistence: PATHLOADER retrieves encrypted payloads; SHADOWPAD maintains persistence via services, tasks, and registry entries.
  • C2 & Exfiltration: FINALDRAFT uses Microsoft Graph/Outlook drafts; SHADOWPAD operates custom HTTP/S C2 via IIS relays.
  • Lateral Movement: Relay‑enabled pivoting; occasional ransomware side‑effects.

THREAT ACTOR PROFILE: INK DRAGON

  • Attribution: PRC‑aligned (MEDIUM confidence).
  • Aliases: Earth Alux, Jewelbug, REF7707, CL‑STA‑0049 (per Check Point).
  • Observed TTPs: SHADOWPAD IIS relays, PATHLOADER, FINALDRAFT, registry UUID persistence, typosquat domains.
  • Target Sectors: Government, diplomacy, foreign policy, telecom.

RISK ASSESSMENT

Factor Rating Justification
Impact HIGH Potential theft of sensitive policy documents and the establishment of sustained access within affected environments.
Likelihood HIGH Active campaigns observed targeting organizations in Asia and Europe, indicating continued operational activity.
Confidence MEDIUM Assessment corroborated by multiple security vendors; some technical details and telemetry remain unverified.

MITIGATION STRATEGIES

Priority 1 (Immediate)

  1. Ingest vendor STIX/IOC packs (CISA AA25‑239A, Elastic, Trend Micro, Check Point).
  2. Hunt for SHA256 hashes on endpoints; isolate matches.
  3. Monitor Graph API/Outlook drafts for unusual token grants or polling.
  4. Block egress to 45[.]61[.]151[.]12, 103[.]169[.]91[.]231, and other verified IPs.

Priority 2 (Short Term)

  1. Deploy YARA/EDR rules for SHADOWPAD and FINALDRAFT.
  2. Add DNS blocklists for parent domains; evaluate sinkholing for epac[.]to.
  3. Audit IIS/SharePoint modules and enable advanced logging.

Priority 3 (Long Term)

  1. Implement conditional access and MFA for all OAuth apps.
  2. Integrate passive DNS and certificate transparency monitoring.
  3. Restrict Internet‑exposed management services; use VPN+MFA.

DETECTION OPPORTUNITIES

  • EDR/YARA: Detect PATHLOADER AES decryption and shellcode.
  • SIEM: Correlate Graph token refresh + draft creation + external HTTP retrieval.
  • IDS: Flag HTTP beacons to typosquat domains.

EVIDENCE GAPS & LIMITATIONS

  • Missing raw enrichment outputs (VirusTotal, Shodan, WhoisXML) prevent numeric validation.
  • ASN discrepancies (e.g., 45[.]61[.]151[.]12) require historical verification.
  • Vendor naming divergences (Ink Dragon vs Earth Alux vs REF7707) noted.

INDICATORS OF COMPROMISE (DEFANGED)

Domains (confirmed):
poster.checkponit[.]com, support.vmphere[.]com, update.hobiter[.]com
Domains (uncorroborated):
updata.dsqurey[.]com, dscriy.chtq[.]net, sery.brushupdata[.]com, billing.epac[.]to, vsmrcil.casacam[.]net, www[.]cloudvn[.]info, stratorpriv.lubni23[.]com
IPs: 45[.]61[.]151[.]12, 103[.]169[.]91[.]231, 1[.]222[.]84[.]29, 23[.]227[.]202[.]253, 167[.]88[.]173[.]252, 172[.]86[.]106[.]15
Hashes: 2e84ea5c...ff72, e2f6e722...1ffa, f9dd0b57...00c1, 9a11d6fc...853bcf, 39e85de1...59530, 83406905...28cc8c

SOURCES & REFERENCES

  • Vendor Reports: Check Point (Ink Dragon / Earth Alux / REF7707), Elastic Security Labs (FINALDRAFT / Graph API C2), Trend Micro, Secureworks, ESET.
  • Government: CISA AA25‑239A multi‑agency advisory.
  • Feeds: VirusTotal, Shodan, WhoisXML, Protos Threat Feed.

Download Full Report

Ink Dragon — Deep Dive Analysis


Inquire Now
Inquire Now
Oops! Something went wrong while submitting the form.