Evasive Panda APT poisons DNS requests to deliver MgBot
The Evasive Panda APT group has conducted a sophisticated campaign from November 2022 to November 2024, leveraging adversary-in-the-middle and DNS poisoning attacks to deliver the MgBot malware. They use fake updaters for popular applications to infect victims through a multi-stage shellcode execution process. A stealthy secondary loader masquerades as a legitimate Windows library to evade detection. Payloads are protected with a custom hybrid encryption combining DPAPI and RC5, tailored per victim. While victims have been identified primarily in Türkiye, China, and India, the advanced techniques and stealthy nature of the campaign pose a medium-severity threat to organizations globally. No known exploits are currently in the wild, but the prolonged undetected compromises highlight the threat's persistence. Indicators include multiple IP addresses and file hashes associated with the campaign. European organizations should be vigilant, especially those with supply chain or software update dependencies that could be targeted by fake updaters.
AI Analysis
Technical Summary
Evasive Panda is an advanced persistent threat (APT) group that has executed a targeted campaign over a two-year period, utilizing adversary-in-the-middle (AITM) attacks and DNS poisoning to intercept and manipulate DNS requests. This manipulation allows the group to redirect victims to malicious servers hosting their malware payloads, specifically the MgBot implant. The infection chain begins with fake updaters mimicking legitimate software update mechanisms for popular applications, tricking users into executing malicious code. The malware employs a multi-stage shellcode execution process, enhancing stealth and complicating detection. A secondary loader, disguised as a legitimate Windows library, is used to load the payload stealthily into memory, bypassing common security controls. The payloads are encrypted using a custom hybrid encryption scheme that combines Windows Data Protection API (DPAPI) and the RC5 cipher, ensuring that each implant is victim-specific and difficult to analyze or decrypt. The campaign demonstrates the group’s continuous evolution in tactics, techniques, and procedures (TTPs), including the use of process injection, code obfuscation, and persistence mechanisms. Although victims have been primarily identified in Türkiye, China, and India, the techniques used could be adapted to target other regions. The campaign has been active for extended periods on compromised systems, indicating a high level of operational security and stealth. Indicators of compromise (IOCs) include specific IP addresses and file hashes linked to the loaders and payloads. The campaign is categorized as medium severity due to its complexity, stealth, and targeted nature, but currently lacks widespread exploitation or a CVSS score.
Potential Impact
For European organizations, the Evasive Panda campaign poses a significant risk due to its stealthy infection vector and persistence capabilities. Organizations relying on software update mechanisms or popular applications are at risk of supply chain compromise through fake updaters. Successful exploitation could lead to unauthorized access, data exfiltration, espionage, and long-term system compromise. The use of DNS poisoning and AITM attacks can undermine network trust and complicate incident detection. Confidentiality and integrity of sensitive data could be severely impacted, especially in sectors such as government, critical infrastructure, and technology. The stealthy secondary loader and hybrid encryption make forensic analysis and remediation more difficult, potentially increasing downtime and recovery costs. Although no direct European victims have been reported, the techniques and tools used by Evasive Panda could be adapted to target European entities, particularly those with geopolitical or economic ties to the regions currently affected. The campaign’s persistence over years highlights the potential for prolonged undetected espionage or sabotage.
Mitigation Recommendations
European organizations should implement DNS security measures such as DNSSEC to prevent DNS poisoning attacks and monitor DNS traffic for anomalies. Employ strict application whitelisting and verify digital signatures on software updates to detect and block fake updaters. Use endpoint detection and response (EDR) solutions capable of identifying multi-stage shellcode execution and suspicious loader behaviors, including DLL masquerading. Regularly audit and monitor for unusual process injections and persistence mechanisms. Deploy network segmentation and restrict outbound traffic to known and trusted IP addresses to limit command and control communications. Implement strong encryption key management and monitor for unusual use of DPAPI or cryptographic APIs. Conduct threat hunting exercises focused on indicators of compromise such as the provided IP addresses and file hashes. Educate users about the risks of installing unauthorized software updates and phishing attempts that could lead to initial compromise. Maintain up-to-date backups and incident response plans tailored to advanced persistent threats. Collaborate with national cybersecurity centers and share threat intelligence to stay informed about evolving TTPs from groups like Evasive Panda.
Affected Countries
Türkiye, Germany, France, United Kingdom, Italy, Netherlands
Indicators of Compromise
- ip: 60.29.226.181
- ip: 117.121.133.33
- ip: 58.68.255.45
- ip: 60.28.124.21
- hash: 1c36452c2dad8da95d460bee3bea365e
- hash: 7973e0694ab6545a044a49ff101d412a
- hash: 9e72410d61eaa4f24e0719b34d7cad19
- hash: c340195696d13642ecf20fbe75461bed
- hash: b9856f6d0b4037fc83ce7a7a2d280b64156126b7
- hash: 9c33f106fc93f3e6523627feda2e3250c45d704946dbdf87ad18fb3d815e2992
- ip: 103.27.110.232
- ip: 103.96.130.107
- ip: 106.126.3.56
- ip: 106.126.3.78
- ip: 116.213.178.11
- ip: 123.139.57.103
Evasive Panda APT poisons DNS requests to deliver MgBot
Description
The Evasive Panda APT group has conducted a sophisticated campaign from November 2022 to November 2024, leveraging adversary-in-the-middle and DNS poisoning attacks to deliver the MgBot malware. They use fake updaters for popular applications to infect victims through a multi-stage shellcode execution process. A stealthy secondary loader masquerades as a legitimate Windows library to evade detection. Payloads are protected with a custom hybrid encryption combining DPAPI and RC5, tailored per victim. While victims have been identified primarily in Türkiye, China, and India, the advanced techniques and stealthy nature of the campaign pose a medium-severity threat to organizations globally. No known exploits are currently in the wild, but the prolonged undetected compromises highlight the threat's persistence. Indicators include multiple IP addresses and file hashes associated with the campaign. European organizations should be vigilant, especially those with supply chain or software update dependencies that could be targeted by fake updaters.
AI-Powered Analysis
Technical Analysis
Evasive Panda is an advanced persistent threat (APT) group that has executed a targeted campaign over a two-year period, utilizing adversary-in-the-middle (AITM) attacks and DNS poisoning to intercept and manipulate DNS requests. This manipulation allows the group to redirect victims to malicious servers hosting their malware payloads, specifically the MgBot implant. The infection chain begins with fake updaters mimicking legitimate software update mechanisms for popular applications, tricking users into executing malicious code. The malware employs a multi-stage shellcode execution process, enhancing stealth and complicating detection. A secondary loader, disguised as a legitimate Windows library, is used to load the payload stealthily into memory, bypassing common security controls. The payloads are encrypted using a custom hybrid encryption scheme that combines Windows Data Protection API (DPAPI) and the RC5 cipher, ensuring that each implant is victim-specific and difficult to analyze or decrypt. The campaign demonstrates the group’s continuous evolution in tactics, techniques, and procedures (TTPs), including the use of process injection, code obfuscation, and persistence mechanisms. Although victims have been primarily identified in Türkiye, China, and India, the techniques used could be adapted to target other regions. The campaign has been active for extended periods on compromised systems, indicating a high level of operational security and stealth. Indicators of compromise (IOCs) include specific IP addresses and file hashes linked to the loaders and payloads. The campaign is categorized as medium severity due to its complexity, stealth, and targeted nature, but currently lacks widespread exploitation or a CVSS score.
Potential Impact
For European organizations, the Evasive Panda campaign poses a significant risk due to its stealthy infection vector and persistence capabilities. Organizations relying on software update mechanisms or popular applications are at risk of supply chain compromise through fake updaters. Successful exploitation could lead to unauthorized access, data exfiltration, espionage, and long-term system compromise. The use of DNS poisoning and AITM attacks can undermine network trust and complicate incident detection. Confidentiality and integrity of sensitive data could be severely impacted, especially in sectors such as government, critical infrastructure, and technology. The stealthy secondary loader and hybrid encryption make forensic analysis and remediation more difficult, potentially increasing downtime and recovery costs. Although no direct European victims have been reported, the techniques and tools used by Evasive Panda could be adapted to target European entities, particularly those with geopolitical or economic ties to the regions currently affected. The campaign’s persistence over years highlights the potential for prolonged undetected espionage or sabotage.
Mitigation Recommendations
European organizations should implement DNS security measures such as DNSSEC to prevent DNS poisoning attacks and monitor DNS traffic for anomalies. Employ strict application whitelisting and verify digital signatures on software updates to detect and block fake updaters. Use endpoint detection and response (EDR) solutions capable of identifying multi-stage shellcode execution and suspicious loader behaviors, including DLL masquerading. Regularly audit and monitor for unusual process injections and persistence mechanisms. Deploy network segmentation and restrict outbound traffic to known and trusted IP addresses to limit command and control communications. Implement strong encryption key management and monitor for unusual use of DPAPI or cryptographic APIs. Conduct threat hunting exercises focused on indicators of compromise such as the provided IP addresses and file hashes. Educate users about the risks of installing unauthorized software updates and phishing attempts that could lead to initial compromise. Maintain up-to-date backups and incident response plans tailored to advanced persistent threats. Collaborate with national cybersecurity centers and share threat intelligence to stay informed about evolving TTPs from groups like Evasive Panda.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/evasive-panda-apt/118576/"]
- Adversary
- Evasive Panda
- Pulse Id
- 694bec49b3afb4e6bc975450
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip60.29.226.181 | — | |
ip117.121.133.33 | — | |
ip58.68.255.45 | — | |
ip60.28.124.21 | — | |
ip103.27.110.232 | — | |
ip103.96.130.107 | — | |
ip106.126.3.56 | — | |
ip106.126.3.78 | — | |
ip116.213.178.11 | — | |
ip123.139.57.103 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash1c36452c2dad8da95d460bee3bea365e | — | |
hash7973e0694ab6545a044a49ff101d412a | — | |
hash9e72410d61eaa4f24e0719b34d7cad19 | — | |
hashc340195696d13642ecf20fbe75461bed | — | |
hashb9856f6d0b4037fc83ce7a7a2d280b64156126b7 | — | |
hash9c33f106fc93f3e6523627feda2e3250c45d704946dbdf87ad18fb3d815e2992 | — |
Threat ID: 694c0607550a31ae84b6c4b8
Added to database: 12/24/2025, 3:25:59 PM
Last enriched: 12/24/2025, 3:41:39 PM
Last updated: 12/25/2025, 8:33:10 PM
Views: 319
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Linearizing SHA-256 via fractional modular analysis (Kaoru Method)
Medium2025 Holiday Scams: Docusign Phishing Meets Loan Spam
MediumPirate Group Anna’s Archive Copies 256 Million Spotify Songs in Data Scrape
MediumTrial, Error, and Typos: Why Some Malware Attacks Aren't as 'Sophisticated' as You Think
MediumMacSync Stealer Evolves: From ClickFix to Code-Signed Swift Malware
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.