Chinese ‘Web Shell Whisperer’ exploits shells and tunnels for stealthy access

Home/Exploitation, Internet Security, Security Advisory, Security Update, Tips/Chinese ‘Web Shell Whisperer’ exploits shells and tunnels for stealthy access

Chinese ‘Web Shell Whisperer’ exploits shells and tunnels for stealthy access

Sygnia uncovered a cyber espionage operation by a China-linked group, “Weaver Ant.”

The group targeted a major Asian telecom company, using web shells and tunnels for persistent access and espionage. This case shows how state-backed hackers keep evolving to evade detection and maintain long-term access.

All about Web Shell Whisperer

Weaver Ant used two web shells: an encrypted China Chopper variant and a new ‘INMemory’ shell.

The encrypted China Chopper, with AES encryption, evades WAF detection and is placed on external servers for network access.

Web shell deployment chain.

Sygnia reports that this web shell enables file management, command execution, and data exfiltration, making it a powerful tool for attackers.

The INMemory web shell runs entirely in memory, avoiding detection. It decodes a hardcoded GZipped Base64 string into a PE file (‘eval.dll’) and executes it using JScript.

Weaver Ant also used a recursive HTTP tunnel tool for lateral movement and internal access. This tool forwards requests between web servers, supporting both ASPX and PHP for cross-platform use.

It dynamically builds and runs cURL commands, enabling seamless navigation across web environments. This adaptive tunneling helped maintain flexibility and avoid detection.

To defend against advanced threats, organizations need a strong security strategy.

  • Continuous Monitoring – Keep systems under constant watch for suspicious activity.
  • Proactive Threat Response – Act quickly to contain and mitigate threats.
  • Regular Threat Hunts – Identify hidden risks before they cause damage.
  • Traffic Control & System Hardening – Secure legacy and public-facing devices.
  • Stealth Monitoring – Use port mirroring and decrypt tunneled traffic to detect covert attacks.
  • Stronger Defense – Implementing these measures helps counter state-sponsored threats like Weaver Ant.

IOCs

Value Type Description  
23c4049121a9649682b3b901eaac0cc52c308756 SHA1 ASPX Encrypted China Chopper Web shell 
9022f78087e1679035e09160d59d679dc3ac345d SHA1 ASPX Encrypted China Chopper Web shell 
be52275b0c2086735dac478dc4f09fd16031669a SHA1 ASPX Encrypted China Chopper Web shell 
c879a8eb6630b0cd7537b068f4e9af2c9ca08a62 SHA1 ASPX Encrypted China Chopper Web shell 
25a593b9517d6c325598eab46833003c40f9491a SHA1 ASPX Encrypted China Chopper Web shell 
a9bbea73504139ce91a0ec20fef303c68a131cd4 SHA1 ASPX Encrypted China Chopper Web shell 
334a88e288ae18c6e3fd7fb2d1ad9548497d52ce SHA1 ASPX Encrypted China Chopper Web shell 
4aeeae023766153a91b83d02b1b24da20c0dd135 SHA1 ASPX Encrypted China Chopper Web shell 
3cac6ff7cddcb8f82409c79c85d976300fc60861 SHA1 ASPX Encrypted China Chopper Web shell 
55eeaa904bc6518a2715cc77648e6c5187416a46 SHA1 ASPX Encrypted China Chopper Web shell 
ff7b2c3938306261881c42e78d0df51d9bcdd574 SHA1 PHP Encrypted China Chopper Web shell 
089439168d3c75b4da94ab801f1c46ad6b9e1fdc SHA1 PHP Encrypted China Chopper Web shell 
a5c36b8022751cfeb4a88a21153847df3870c7c0 SHA1 VB Encrypted China Chopper Web shell 
ad3dbec2b621807fa9a2f1b2f575d7077e494626 SHA1 ASPX China Chopper Web shell 
4dc0ebfa52adf9b9eb4fa8f0a359c21a14e183fb SHA1 ASPX China Chopper Web shell 
d102a34b3f0efb57f1d9f04eff26b256875a3aa1 SHA1 ASPX Web shell 
2b9b740fb5fe0549810500476f567002683df71d SHA1 ASPX Web shell 
4fa2b2ab3e24ee9d130cfeda63c7ae1ccbc393dc SHA1 “ReGeorg” 
495a4b4757f3b1eec7fdaa9d0b2930071565f2b1 SHA1 ASPX Custom Web shell 
f31920d636224356e8c7a182c2b9b37e42a09181 SHA1 INMemory module Web shell 
9dc3d272652851428f5cc44f2fd9458bff1d6a78 SHA1 INMemory module Web shell 
4dd22a08a5b103e1f2238aed7f7ce66c5a542533 SHA1 INMemory module Web shell 
02065bbdb3209e0522db3225600b8e79f8a10293 SHA1 INMemory module Web shell 
81622512757f897206a84b29ee866fb933fa3d48 SHA1 INMemory module Web shell 
151dc47b213aaec3751ffd1427737c65757ab410 SHA1 INMemory module Web shell 
492cbe143f795888d8e5006ac595f65f4565ed6e SHA1 INMemory module Web shell 
0e282dc84d6cfd447fece7d3ecc622523b143aa8 SHA1 OWA Backdoor DLL 
49cd96df4c85cdd7461701340c0bb4d05a5049d8 SHA1 OWA Backdoor DLL 
207b7cf5db59d70d4789cb91194c732bcd1cfb4b SHA1 OWA Backdoor DLL 
By | 2025-03-24T21:27:40+05:30 March 24th, 2025|Exploitation, Internet Security, Security Advisory, Security Update, Tips|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!