Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Evasive Panda APT poisons DNS requests to deliver MgBot

0
Medium
Published: Wed Dec 24 2025 (12/24/2025, 13:36:09 UTC)
Source: AlienVault OTX General

Description

The Evasive Panda APT group has conducted a sophisticated campaign from November 2022 to November 2024, leveraging adversary-in-the-middle and DNS poisoning attacks to deliver the MgBot malware. They use fake updaters for popular applications to infect victims through a multi-stage shellcode execution process. A stealthy secondary loader masquerades as a legitimate Windows library to evade detection. Payloads are protected with a custom hybrid encryption combining DPAPI and RC5, tailored per victim. While victims have been identified primarily in Türkiye, China, and India, the advanced techniques and stealthy nature of the campaign pose a medium-severity threat to organizations globally. No known exploits are currently in the wild, but the prolonged undetected compromises highlight the threat's persistence. Indicators include multiple IP addresses and file hashes associated with the campaign. European organizations should be vigilant, especially those with supply chain or software update dependencies that could be targeted by fake updaters.

AI-Powered Analysis

AILast updated: 12/24/2025, 15:41:39 UTC

Technical Analysis

Evasive Panda is an advanced persistent threat (APT) group that has executed a targeted campaign over a two-year period, utilizing adversary-in-the-middle (AITM) attacks and DNS poisoning to intercept and manipulate DNS requests. This manipulation allows the group to redirect victims to malicious servers hosting their malware payloads, specifically the MgBot implant. The infection chain begins with fake updaters mimicking legitimate software update mechanisms for popular applications, tricking users into executing malicious code. The malware employs a multi-stage shellcode execution process, enhancing stealth and complicating detection. A secondary loader, disguised as a legitimate Windows library, is used to load the payload stealthily into memory, bypassing common security controls. The payloads are encrypted using a custom hybrid encryption scheme that combines Windows Data Protection API (DPAPI) and the RC5 cipher, ensuring that each implant is victim-specific and difficult to analyze or decrypt. The campaign demonstrates the group’s continuous evolution in tactics, techniques, and procedures (TTPs), including the use of process injection, code obfuscation, and persistence mechanisms. Although victims have been primarily identified in Türkiye, China, and India, the techniques used could be adapted to target other regions. The campaign has been active for extended periods on compromised systems, indicating a high level of operational security and stealth. Indicators of compromise (IOCs) include specific IP addresses and file hashes linked to the loaders and payloads. The campaign is categorized as medium severity due to its complexity, stealth, and targeted nature, but currently lacks widespread exploitation or a CVSS score.

Potential Impact

For European organizations, the Evasive Panda campaign poses a significant risk due to its stealthy infection vector and persistence capabilities. Organizations relying on software update mechanisms or popular applications are at risk of supply chain compromise through fake updaters. Successful exploitation could lead to unauthorized access, data exfiltration, espionage, and long-term system compromise. The use of DNS poisoning and AITM attacks can undermine network trust and complicate incident detection. Confidentiality and integrity of sensitive data could be severely impacted, especially in sectors such as government, critical infrastructure, and technology. The stealthy secondary loader and hybrid encryption make forensic analysis and remediation more difficult, potentially increasing downtime and recovery costs. Although no direct European victims have been reported, the techniques and tools used by Evasive Panda could be adapted to target European entities, particularly those with geopolitical or economic ties to the regions currently affected. The campaign’s persistence over years highlights the potential for prolonged undetected espionage or sabotage.

Mitigation Recommendations

European organizations should implement DNS security measures such as DNSSEC to prevent DNS poisoning attacks and monitor DNS traffic for anomalies. Employ strict application whitelisting and verify digital signatures on software updates to detect and block fake updaters. Use endpoint detection and response (EDR) solutions capable of identifying multi-stage shellcode execution and suspicious loader behaviors, including DLL masquerading. Regularly audit and monitor for unusual process injections and persistence mechanisms. Deploy network segmentation and restrict outbound traffic to known and trusted IP addresses to limit command and control communications. Implement strong encryption key management and monitor for unusual use of DPAPI or cryptographic APIs. Conduct threat hunting exercises focused on indicators of compromise such as the provided IP addresses and file hashes. Educate users about the risks of installing unauthorized software updates and phishing attempts that could lead to initial compromise. Maintain up-to-date backups and incident response plans tailored to advanced persistent threats. Collaborate with national cybersecurity centers and share threat intelligence to stay informed about evolving TTPs from groups like Evasive Panda.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/evasive-panda-apt/118576/"]
Adversary
Evasive Panda
Pulse Id
694bec49b3afb4e6bc975450
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip60.29.226.181
ip117.121.133.33
ip58.68.255.45
ip60.28.124.21
ip103.27.110.232
ip103.96.130.107
ip106.126.3.56
ip106.126.3.78
ip116.213.178.11
ip123.139.57.103

Hash

ValueDescriptionCopy
hash1c36452c2dad8da95d460bee3bea365e
hash7973e0694ab6545a044a49ff101d412a
hash9e72410d61eaa4f24e0719b34d7cad19
hashc340195696d13642ecf20fbe75461bed
hashb9856f6d0b4037fc83ce7a7a2d280b64156126b7
hash9c33f106fc93f3e6523627feda2e3250c45d704946dbdf87ad18fb3d815e2992

Threat ID: 694c0607550a31ae84b6c4b8

Added to database: 12/24/2025, 3:25:59 PM

Last enriched: 12/24/2025, 3:41:39 PM

Last updated: 12/25/2025, 8:33:10 PM

Views: 319

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats