Home / Industry

Uncovering the DNS Underbelly of UNC5174: The Shift from SNOWLIGHT to VShell

UNC5174, a Chinese-sponsored group known for using the open-source reverse shell tool named “SUPERSHELL,” struck again. In January 2025, they used a new open-source tool and command-and-control (C&C) infrastructure dubbed “SNOWLIGHT.” This time around, they have begun using another tool dubbed “VShell.”

The Sysdig Threat Research Team disclosed their findings about UNC5174’s latest campaign, including 25 indicators of compromise (IoCs) comprising 13 domains and 12 IP addresses. WhoisXML API expanded the current list of IoCs, which led to the discovery of these new artifacts:

  • One alleged victim IP record obtained from the Internet Abuse Signal Collective (IASC)
  • Eight email-connected domains
  • 13 additional IP addresses, 11 of which turned out to be malicious
  • 67 IP-connected domains, three of which have already been weaponized for attacks
  • 199 string-connected domains, seven of which have already figured in various malicious campaigns

A sample of the additional artifacts obtained from our analysis is available for download from our website.

More about the VShell Attack IoCs

Before embarking on our IoC list expansion, we sought to uncover more information about the attack IoCs first. To that end, we queried the 13 domains identified as IoCs on Bulk WHOIS API and found that only 11 of them had current WHOIS records. We also discovered that:

  • The 11 domains were created between 2009 and 2025, indicating that the threat actors did not have a preference in terms of domain age. Specifically, one domain was created in 2009, three in 2023, four in 2024, and three in 2025.
  • The 11 domains were administered by six registrars led by GoDaddy, which accounted for four domains. Cloudflare and Name.com tied in second place with two domains each. Finally, one domain each was administered by Gname.com, Namecheap, and Whois.

  • Only 10 of the 11 domains had registrant countries on record. Specifically, they were registered in four countries led by the U.S., which accounted for seven domains. Finally, one domain each was registered in China, Iceland, and South Korea.

We also queried the 13 domains identified as IoCs on DNS Chronicle API and found that only nine of them had historical domain-to-IP resolutions. Altogether, the nine domains posted 207 resolutions over time. The domain c1oudf1are[.]com recorded the oldest IP resolution date. In particular, it resolved to the IP address 104[.]18[.]52[.]126 on 16 October 2019. Take a look at the historical DNS details for three other domains below.

DOMAIN IoCNUMBER OF IP RESOLUTIONSFIRST IP RESOLUTION DATE
bing-server[.]com121 August 2023
ciscocdn[.]com326 December 2019
gooogleasia[.]com274 September 2023

Next, we queried the 12 IP addresses identified as IoCs on Bulk IP Geolocation Lookup and found that:

  • They were geolocated in four countries led by China, which accounted for six IP addresses. Finally, two IP addresses each were geolocated in India, Singapore, and the U.S.
  • They were administered by four ISPs led by Google, which accounted for eight IP addresses. Alibaba came in second place with two IP addresses. Finally, one IP address each was administered by Cloudflare and Tencent.

Like the domains identified as IoCs, we queried the 12 IP addresses on DNS Chronicle API as well. We found that 10 of them had historical IP-to-domain resolutions. Specifically, the 10 IP addresses resolved to 1,180 domains so far. Interestingly, six of the 10 IP addresses recorded the oldest resolution date, that is, 19 November 2021. Take a look at five examples below.

IP ADDRESS IoCNUMBER OF DOMAIN RESOLUTIONSFIRST DOMAIN RESOLUTION DATE
188[.]114[.]97[.]31,00025 January 2022
34[.]131[.]20[.]341219 November 2021
34[.]150[.]33[.]2371219 November 2021
34[.]92[.]255[.]511319 November 2021
34[.]96[.]239[.]1834219 November 2021

In addition, using sample netflow data our researchers obtained from the IASC, we found additional information on the IP address 45[.]43[.]208[.]31 that was identified as an IoC. The sample data revealed one alleged victim IP record.

UNC5174 Attack IoC List Expansion Findings

Our analysis began with a WHOIS History API query for the 13 domains identified as IoCs. The results showed that only three domains had email addresses in their historical WHOIS records. In particular, the three domains had 15 email addresses in their records after duplicates were filtered out. Further scrutiny revealed that only two were public email addresses.

A Reverse WHOIS API query for the two public email addresses revealed that they were not present in any domain’s current WHOIS records but they did appear in the historical records of eight email-connected domains after duplicates and those already identified as IoCs were filtered out.

Next, we queried the 13 domains identified as IoCs on DNS Lookup API and found that seven of them actively resolved to IP addresses. Specifically, the seven domains resolved to 13 unique IP addresses after duplicates and those already tagged as IoCs were filtered out.

A Threat Intelligence API query for the 13 additional IP addresses showed that 11 have already been weaponized for cyber attacks.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global