Anonymous :anarchism: 🏴 · @YourAnonRiots
5316 followers · 31496 posts · Server mstdn.social

📢 The new backdoor is capable of evading detection, making it an even bigger threat to victims.

hackread.com/chinese-hackers-m

#Malware #China #MustangPanda #Security #mqttang

Last updated 2 years ago

Hackread.com · @Hackread
151 followers · 88 posts · Server mstdn.social

📢 The new backdoor is capable of evading detection, making it an even bigger threat to victims.

Details: hackread.com/chinese-hackers-m

#Malware #China #MustangPanda #Security #mqttang

Last updated 2 years ago

securityaffairs · @securityaffairs
463 followers · 412 posts · Server infosec.exchange
Barberousse · @barberousse_bin
147 followers · 41 posts · Server todon.eu

analyzed a new backdoor. It uses the open-source QMQTT library to communicate with its C&C server over so we named it MQsTTang. This library depends on parts of the Qt framework, statically linked in the executable. welivesecurity.com/2023/03/02/

A sample of MQsTTang was identified by @Unit42_Intel@twitter.com on 2023-02-17. As stated in that thread, the backdoor uses the legitimate MQTT broker 3.228.54.173. This has the benefit of hiding their actual C&C servers from victims and analysts. twitter.com/Unit42_Intel/statu

This malware family is also tracked as "Kumquat" by @threatinsight@twitter.com: twitter.com/aRtAGGI/status/162

Like in previous campaigns, filenames related to politics and diplomacy are used to lure targets. These include:
- CVs Amb Officer PASSPORT Ministry Of Foreign Affairs.exe
- Documents members of delegation diplomatic from Germany.Exe
- PDF_Passport and CVs of diplomatic members from Tokyo of JAPAN.eXE

IoCs:
📄 SHA-1
02D95E0C369B08248BFFAAC8607BBA119D83B95B
430C2EF474C7710345B410F49DF853BDEAFBDD78
0EA5D10399524C189A197A847B8108AA8070F1B1
740C8492DDA786E2231A46BFC422A2720DB0279A
🚨 ESET Detection Name
Win32/Agent.AFBI trojan
🌐 Servers
80.85.156[.]151
80.85.157[.]3
185.144.31[.]86

@ESETresearch

#esetresearch #MustangPanda #mqtt

Last updated 3 years ago

Jessica Beffa · @jessicabeffa
51 followers · 73 posts · Server infosec.exchange

Today: @ESETresearch analyzed a new backdoor, which communicates via the MQTT protocol. Check it out 👇​

welivesecurity.com/2023/03/02/

#MustangPanda

Last updated 3 years ago

Marcel SIneM(S)US · @simsus
168 followers · 2320 posts · Server social.tchncs.de
avallach · @xorhex
203 followers · 544 posts · Server infosec.exchange
安坂星海 Azaka Sekai · @still
33 followers · 72 posts · Server infosec.exchange

We were originally going to present more, but given the context and the timeframe we were given, I didn't have a lot of time to delve deeper into the subject matter. Otherwise, we would have liked to touch on things like the evolution of their encoding & decoding methods over time, as well as the ever-evolutionizng obfuscation methods (nothing ground-breaking if you're already familiar with ollvm and other common obfuscation methods), the use of the launchers, payload name, invokation methods, and so many more.

The gist of it is we had been on their tail for a decently long time, including monitoring and hunting PlugDisk (USB-enabled data exfilitration PlugX variant) and its predecessor UDiskShell, identifying the then-new EU-specific target back in late 2021, and many more - they are aware that many threat intelligence groups are investigating them and are continuing to avoid having their samples analyzed. Speaking of, one of the things I didn't have time to include is that is also now splitting up the encoded payload to a different path from the loader, attempting to prevent victims from simply zipping the suspected folder and submitting it to VT.

#MustangPanda

Last updated 3 years ago

安坂星海 Azaka Sekai · @still
33 followers · 71 posts · Server infosec.exchange

also hi my brief 10-minute report on announced at JSAC2023 is now on the Malpedia corpus

malpedia.caad.fkie.fraunhofer.

#MustangPanda

Last updated 3 years ago

ecb1650d5f548f10be47aaa84f7546c0
Summary MSs reporting - recommendationl .zip
may have changed the config storage method - the XOR-encoded config block is no longer present in the resulting PE. Investigation required.

#MustangPanda

Last updated 3 years ago

potential 592ec4ded7cc5ae2cfe46a51f4e681c1

#MustangPanda

Last updated 3 years ago

avallach · @xorhex
160 followers · 162 posts · Server infosec.exchange

/ have expanded to using ISO files in addition to RAR and ZIP files.

Also, the config decryption key changed to jOh752oCI for their more recent variants of .

go.recordedfuture.com/hubfs/re

#reddelta #MustangPanda #plugx

Last updated 3 years ago

Looks like had been busy sneaking around all over TW/HK. This one actually slipped through the radar for me, given the threat group doesn't target Taiwan that often.

#MustangPanda #apt

Last updated 3 years ago

TribalCyberSecurity · @tribalcyber
19 followers · 2 posts · Server infosec.exchange
TribalCyberSecurity · @tribalcyber
19 followers · 22 posts · Server ioc.exchange

Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets

blogs.blackberry.com/en/2022/1

“Political Guidance for the new EU approach towards Russia.rar”.

#MustangPanda #apt #ukraine

Last updated 3 years ago

Jan Rubín · @janrubin
17 followers · 9 posts · Server infosec.exchange

Read the research from team that describes a vast collection of tools, presumably used by the group & exfiltrated stolen data. Make some coffee and dive into blog:
decoded.avast.io/threatintel/a

#avastthreatlabs #MustangPanda #apt #AvastDecoded

Last updated 3 years ago

Paul Rascagneres · @r00tbsd
847 followers · 116 posts · Server infosec.exchange

Interesting blog post from TrendMicro about spear-phishing attacks targeting governments by .

trendmicro.com/en_us/research/

#MustangPanda

Last updated 3 years ago

Simodef · @simodef
3 followers · 9 posts · Server ioc.exchange
Jazi · @h2jazi
36 followers · 2 posts · Server infosec.exchange

:
It uses legitimate Microsoft Suite Integration Toolkit executable to side load the PlugX payload.

Archive file:
865d2582e7ae2a13f363ab5cdb60da9c

Payload:
dlmgr.dll
8251d2c698028db64583971760c7f3f0

C2:
98.142.251.29

#MustangPanda #apt

Last updated 3 years ago