Mustang Panda Refines Malware Arsenal to Target Asia-Pacific Governments 

Overview 

The threat actor known as Mustang Panda has significantly upgraded its malware toolkit, enabling advanced data exfiltration and the deployment of sophisticated payloads, as detailed in a recent report by Trend Micro. This group, monitored under the name Earth Preta, has been particularly active in cyber espionage campaigns aimed at government entities throughout the Asia-Pacific (APAC) region. 

Recent Developments 

Trend Micro’s findings highlight the propagation of a malware variant known as PUBLOAD, which is being spread via a worm variant called HIUPAN. PUBLOAD, a downloader linked to Mustang Panda since early 2022, plays a crucial role in cyber-attacks by facilitating the delivery of the PlugX malware. 

Malware Features and Functions 

PUBLOAD is designed not only to execute reconnaissance on infected networks but also to harvest sensitive files, including documents and spreadsheets. Additionally, it serves as a conduit for supplemental tools like FDMTP, a secondary control tool, and PTSOCKET, an alternative method for exfiltrating data. 

The exfiltrated information is typically compressed into a RAR archive and sent to an attacker-controlled FTP site using cURL. Mustang Panda also employs the custom PTSOCKET program for multi-threaded file transfers. 

Spear-Phishing Campaigns 

In June 2024, Trend Micro identified a “fast-paced” spear-phishing campaign linked to Mustang Panda. This campaign distributed emails with .url attachments that, when activated, deployed a signed downloader known as DOWNBAIT. Targeted countries included Myanmar, the Philippines, Vietnam, Singapore, Cambodia, and Taiwan, with specific filenames and decoy documents tailored to these regions. 

DOWNBAIT serves as a first-stage loader that retrieves and executes PULLBAIT shellcode in memory. This shellcode subsequently downloads and launches a backdoor referred to as CBROVER, which allows for file downloads and remote shell execution, ultimately facilitating the deployment of the PlugX remote access trojan (RAT). 

Evolving Tactics 

Recent reports from Palo Alto Networks’ Unit 42 have revealed that Mustang Panda has also exploited Visual Studio Code’s embedded reverse shell feature, indicating a shift in their operational tactics. This evolution points to a more sophisticated approach to infiltrating target networks. 

Conclusion 

The advancements observed in Earth Preta’s malware deployment and strategies underscore the ongoing threats faced by government entities in the Asia-Pacific region. As Mustang Panda continues to refine its tactics—from multi-stage downloaders to leveraging cloud services for data exfiltration—staying informed and vigilant is essential for organizations in the area to mitigate potential cyber risks. 

Total
0
Shares
Related Posts

Data Sheet – ESOF Prediction Solution Brief

CASA

VAPT

Survey Report

The Future of Risk
and Vulnerability Management!

Switch to Next Generation
Vulnerability Management - ESOF

Contact Us

    Download Case Study

    Download Case Study

    Download Case Study

    Download Case Study

    Download Case Study

    Data Sheet – ESOF AppSec

    Data Sheet – ESOF VMP

    Data Sheet – ESOF VMDR

    Total
    0
    Share