Evasive Panda APT poisons DNS requests to deliver MgBot
#1
Bug 
Quote:Introduction

The Evasive Panda APT group (also known as Bronze Highland, Daggerfly, and StormBamboo) has been active since 2012, targeting multiple industries with sophisticated, evolving tactics. Our latest research (June 2025) reveals that the attackers conducted highly-targeted campaigns, which started in November 2022 and ran until November 2024.

The group mainly performed adversary-in-the-middle (AitM) attacks on specific victims. These included techniques such as dropping loaders into specific locations and storing encrypted parts of the malware on attacker-controlled servers, which were resolved as a response to specific website DNS requests. Notably, the attackers have developed a new loader that evades detection when infecting its targets, and even employed hybrid encryption practices to complicate analysis and make implants unique to each victim.

Furthermore, the group has developed an injector that allows them to execute their MgBot implant in memory by injecting it into legitimate processes. It resides in the memory space of a decade-old signed executable by using DLL sideloading and enables them to maintain a stealthy presence in compromised systems for extended periods.

Additional information about this threat, including indicators of compromise, is available to customers of the Kaspersky Intelligence Reporting Service. Contact: intelreports@kaspersky.com.

Technical details

Initial infection vector

The threat actor commonly uses lures that are disguised as new updates to known third-party applications or popular system applications trusted by hundreds of users over the years.

In this campaign, the attackers used an executable disguised as an update package for SohuVA, which is a streaming app developed by Sohu Inc., a Chinese internet company. The malicious package, named
 
Code:
sohuva_update_10.2.29.1-lup-s-tp.exe

, clearly impersonates a real SohuVA update to deliver malware from the following resource, as indicated by our telemetry:
 http://p2p.hd.sohu.com[.]cn/foxd/gz?file=sohunewplayer_7.0.22.1_03_29_13_13_union.exe&new=/66/157/ovztb0wktdmakeszwh2eha.exe 

There is a possibility that the attackers used a DNS poisoning attack to alter the DNS response of
 
Code:
p2p.hd.sohu.com[.]cn

to an attacker-controlled server’s IP address, while the genuine update module of the SohuVA application tries to update its binaries located in
 
Code:
appdata\roaming\shapp\7.0.18.0\package
.

Although we were unable to verify this at the time of analysis, we can make an educated guess, given that it is still unknown what triggered the update mechanism.

Continue Reading...
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Intel releases XeSS 3 with Multi-Frame G...
Intel’s new Arc dr...harlan4096 — 10:32
Windows 11 Security Update Quietly Disab...
A recent Windows 1...harlan4096 — 10:30
Valve releases Proton 10.0-4, adds 19 ne...
Valve Proton 10.0-...harlan4096 — 08:25
INTEL Arc Graphics 32.0.101.8425/8362 dr...
INTEL Arc Graphics...harlan4096 — 08:23
Mozilla Firefox Browser 147.0.2
Mozilla Firefox Br...harlan4096 — 08:09

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>