Chinese Spy Group Targets Southeast Asian Militaries with Custom 'AppleChris' & 'MemFun' Backdoors

Suspected Chinese Espionage Group CL-STA-1087 Uses Custom Malware in Long-Running Campaign Against Southeast Asian Militaries

HIGH
March 13, 2026
5m read
Threat ActorCyberattackMalware

Impact Scope

People Affected

Military personnel in Southeast Asian countries

Geographic Impact

China (regional)

Related Entities

Threat Actors

CL-STA-1087

Organizations

Other

AppleChrisMemFunGetpass

Full Report

Executive Summary

Security researchers from Palo Alto Networks Unit 42 have uncovered a protracted cyber espionage campaign targeting military organizations across Southeast Asia. The operation, attributed to a suspected China-based advanced persistent threat (APT) group tracked as CL-STA-1087, has been ongoing since at least 2020. The attackers employ a custom toolkit, including two backdoors known as AppleChris and MemFun, and a credential harvesting tool named Getpass. The campaign is characterized by its strategic patience and highly specific intelligence objectives, focusing on the exfiltration of documents detailing military capabilities, command structures, and partnerships with Western nations. This indicates a state-sponsored intelligence operation aimed at gaining strategic military and geopolitical advantages in the region.

Threat Overview

The threat actor CL-STA-1087 is engaged in a classic espionage campaign designed for long-term access and targeted data theft. Unlike financially motivated attacks, this operation is focused on acquiring specific intelligence. The targets are military entities in Southeast Asia, a region of significant geopolitical interest. The attackers' primary goal is to steal documents that provide insight into the victims' military readiness, technological capabilities, and alliances. The use of custom malware and defense evasion techniques suggests a well-resourced and skilled adversary. While the initial access vector is currently unknown, the group's actions post-compromise—including careful lateral movement and deployment of multiple backdoors—point to a deliberate and methodical approach to maintaining access and achieving their objectives.

Technical Analysis

While the initial point of entry has not been identified, the post-exploitation TTPs provide significant insight into the group's methods:

  1. Execution and Persistence: The attackers were first detected using T1059.001 - PowerShell to execute commands. A notable technique was a six-hour sleep command (Start-Sleep -Seconds 21600) before execution, a form of T1497.003 - Time Based Evasion to bypass sandbox analysis.
  2. Command and Control: The PowerShell script was used to create reverse shells, establishing a C2 channel. This aligns with T1090.002 - External Proxy or a custom C2 protocol over standard ports.
  3. Defense Evasion: The use of custom, purpose-built malware like AppleChris and MemFun is a key defense evasion tactic (T1027 - Obfuscated Files or Information), as these tools will not be detected by standard antivirus signatures.
  4. Credential Access: The deployment of the Getpass tool indicates a focus on harvesting credentials, likely through techniques like T1003 - OS Credential Dumping or T1555 - Credentials from Password Stores.
  5. Lateral Movement: The attackers were observed deploying different versions of the AppleChris backdoor across various endpoints. This shows a clear pattern of lateral movement (T1021 - Remote Services) to expand their foothold within the compromised network and ensure redundant access points.
  6. Collection and Exfiltration: The ultimate goal is the collection of specific files (T1005 - Data from Local System) and exfiltration over their C2 channel (T1041 - Exfiltration Over C2 Channel).

Impact Assessment

The strategic impact of this campaign is significant. The theft of sensitive military documents can provide an adversary with critical intelligence on a nation's defense posture, operational plans, and technological gaps. This information could be used to:

  • Gain an advantage in regional territorial disputes.
  • Understand and counter the victim's military strategies.
  • Gain insight into the extent and nature of military cooperation between Southeast Asian nations and Western powers like the United States.
  • Compromise the security of joint military exercises and operations.

For the targeted organizations, this represents a major breach of national security, undermining their defense capabilities and potentially exposing personnel and assets to risk.

IOCs

No specific domains, IPs, or hashes were provided in the source material. The primary indicators are behavioral.

Type Value Description
Malware Family AppleChris Custom backdoor used for persistence and C2.
Malware Family MemFun Custom backdoor used for persistence and C2.
Tool Getpass Custom credential harvesting tool.
TTP PowerShell with long sleep timers Used for defense evasion and delayed execution.

Detection & Response

  • PowerShell Logging: Enable and monitor PowerShell script block logging (Windows Event ID 4104). Hunt for suspicious commands, especially those involving long sleep delays, encoded commands, or network connections.
  • Behavioral Analysis: Deploy EDR solutions capable of detecting anomalous process behavior, such as PowerShell creating reverse shells or processes accessing and exfiltrating large numbers of documents. This aligns with D3FEND's D3-UBA - User Behavior Analysis.
  • Network Monitoring: Monitor for and investigate suspicious outbound connections to unknown IP addresses or domains, especially from servers and sensitive workstations. Look for patterns in data transfer that could indicate exfiltration.
  • Credential Access Monitoring: Monitor for signs of credential dumping using tools like Mimikatz. Enable protections like Credential Guard on Windows systems.

Mitigation

  1. Restrict PowerShell: Use application control policies like AppLocker or Windows Defender Application Control to constrain PowerShell execution. Set the PowerShell execution policy to RemoteSigned or more restrictive and disable it for users who do not need it. This is part of M1038 - Execution Prevention.
  2. Network Segmentation: Implement robust network segmentation (M1030 - Network Segmentation) to prevent attackers from moving laterally from less sensitive parts of the network to classified systems.
  3. Principle of Least Privilege: Strictly enforce the principle of least privilege (M1026 - Privileged Account Management). Ensure user accounts only have access to the data and systems necessary for their roles.
  4. Endpoint Hardening: Harden endpoints by disabling unused services, restricting administrative tools, and using modern security features to prevent credential theft.
  5. Threat Hunting: Assume breach and conduct regular, proactive threat hunts based on known APT TTPs, rather than waiting for alerts.

Timeline of Events

1
January 1, 2020
The cyber espionage campaign by CL-STA-1087 is believed to have started.
2
March 13, 2026
This article was published

MITRE ATT&CK Mitigations

Use application control to restrict the use of PowerShell and other scripting languages to only authorized users and scripts.

Mapped D3FEND Techniques:

Enable comprehensive logging, especially for PowerShell and command-line activity, and centralize logs for analysis and threat hunting.

Isolate critical military and intelligence systems from general-purpose networks to contain breaches and prevent lateral movement.

Strictly control and monitor the use of privileged accounts to limit an attacker's ability to harvest credentials and move laterally.

Sources & References

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
The Hacker News (vertexaisearch.cloud.google.com) March 13, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Cyber EspionageAPTChinaMalwareBackdoorMilitaryThreat Intelligence

📢 Share This Article

Help others stay informed about cybersecurity threats