Skip to main content

Latest Mustang Panda Arsenal: Toneshell, StarProxy, PAKLOG, CorKLOG, and SplatCloak

Medium
Published: Wed Apr 16 2025 (04/16/2025, 20:35:24 UTC)
Source: AlienVault OTX

Description

Mustang Panda, a threat actor group, has developed new tools including two keyloggers (PAKLOG and CorKLOG) and an EDR evasion driver (SplatCloak). PAKLOG monitors keystrokes and clipboard data, using a custom encoding scheme. CorKLOG captures keystrokes, encrypts data with RC4, and establishes persistence through services or scheduled tasks. SplatCloak disables kernel-level notification callbacks for Windows Defender and Kaspersky drivers, employing obfuscation techniques like control flow flattening and mixed boolean arithmetic. Along with those tools, the group has been observed using updated versions of ToneShell and a new tool called StarProxy. ToneShell, a backdoor, now features changes in its FakeTLS C2 communication protocol and client identifier storage methods. StarProxy, a lateral movement tool, uses the FakeTLS protocol to proxy traffic and facilitate attacker communications.

AI-Powered Analysis

AILast updated: 07/02/2025, 03:57:42 UTC

Technical Analysis

Mustang Panda, a known threat actor group, has expanded its malware arsenal with several sophisticated tools targeting Windows environments. The new additions include two keyloggers, PAKLOG and CorKLOG, and an Endpoint Detection and Response (EDR) evasion driver named SplatCloak. PAKLOG captures keystrokes and clipboard data, employing a custom encoding scheme to obfuscate the stolen information, complicating detection and analysis. CorKLOG also captures keystrokes but encrypts the data using the RC4 algorithm and establishes persistence on infected systems through Windows services or scheduled tasks, ensuring long-term access. SplatCloak is a kernel-mode driver designed to disable notification callbacks used by security products such as Windows Defender and Kaspersky, effectively evading detection. It uses advanced obfuscation techniques including control flow flattening and mixed boolean arithmetic to hinder reverse engineering efforts. Alongside these tools, Mustang Panda continues to use updated versions of ToneShell, a backdoor that communicates with its command and control (C2) infrastructure via a modified FakeTLS protocol, enhancing stealth and resilience. The client identifier storage method has also been altered, likely to evade signature-based detection. StarProxy, a newly observed tool, facilitates lateral movement within compromised networks by proxying attacker traffic through the FakeTLS protocol, enabling stealthy command relay and data exfiltration. Collectively, these tools demonstrate Mustang Panda's focus on stealth, persistence, and network maneuverability, indicating a mature and evolving threat capable of targeted espionage and data theft.

Potential Impact

For European organizations, the deployment of Mustang Panda's updated toolkit poses significant risks. The keyloggers (PAKLOG and CorKLOG) threaten confidentiality by capturing sensitive credentials, intellectual property, and personal data. The EDR evasion capabilities of SplatCloak reduce the effectiveness of native and third-party security solutions, increasing the likelihood of prolonged undetected intrusions. ToneShell's backdoor and StarProxy's lateral movement capabilities enable attackers to maintain persistent access and move laterally within networks, potentially compromising multiple systems and critical infrastructure. This can lead to data breaches, espionage, operational disruption, and reputational damage. Given the sophistication of these tools and their focus on stealth, detection and remediation efforts may be delayed, exacerbating the impact. European organizations in sectors such as government, defense, critical infrastructure, finance, and technology are particularly at risk due to the strategic value of their data and systems.

Mitigation Recommendations

European organizations should implement targeted mitigations beyond generic advice. First, deploy advanced endpoint detection solutions capable of identifying kernel-level manipulations and obfuscated code patterns, focusing on anomalies in driver behavior and service creation. Regularly audit scheduled tasks and Windows services for unauthorized persistence mechanisms. Network monitoring should include detection of FakeTLS protocol anomalies and unusual proxy traffic indicative of StarProxy activity. Employ threat hunting to search for indicators of Mustang Panda tools, even if specific IOCs are not publicly available. Enforce strict least privilege policies to limit lateral movement opportunities and segment networks to contain potential intrusions. Regularly update and harden EDR and antivirus solutions, ensuring they can detect or block obfuscation techniques like control flow flattening. Conduct user awareness training emphasizing phishing and social engineering risks, as initial infection vectors often rely on these methods. Finally, collaborate with national cybersecurity centers and share threat intelligence to stay informed about Mustang Panda activity and emerging detection techniques.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-paklog-corklog-and-splatcloak-p2","https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-toneshell-and-starproxy-p1"]
Adversary
Mustang Panda

Indicators of Compromise

Hash

ValueDescriptionCopy
hash3385a945449774d71377d3a08e5d0d43
hash6c4eb9be8ea20055b88c5b703d41d1d2
hash91f1f4bd673807647126e65ab8fd15ae
hasha4eb2d1252b90f4b1d77ed374092a162
hashade40faa90439abdac911ce1ac50e4b9
hashcbb7309092862f0999f7a442e17b1ba6
hashf8e865c9ed99b1e4725f5ccdc3ef0ba7
hash09ededdcbdb0c03c850f1d29920e412348120c8d
hash2696467025b0d1052d11d3f7bc68c6cb4cb635a5
hash361ad9f8d0b3f248a35e8d570ca58e8e152573cd
hash3e8cb0b1f93da475889dd065ee21261e1b6f6fff
hash5747a2dd63c97f97ee439482dfd4389041043902
hashae896332d3b40b627f44e6dc038f8c2396ecaf4d
hashb2d865e243ea3d642c3a0a2c7d0ea52b79a18ec4
hashf7cc59edd9fa8fd9b0d7d2316d86c348458b8101
hash3a59407db18f575adf956027c8e8af961e1e2ef01d097f6c0a934aeaad45de03
hash3fa4e089bf7bf183d7e746b9eb02b852df5673d7ab39008252e3954fc70d2cba
hash6c01b3d9f7929d8d18747cb6feba416e8702f853a303a63ae37af38e95af79cd
hash6f3a2913a59309c6b4b38040cfb08a4e04404e6f93215fd72dbc52781d99ff29
hash86f6d29ef0532236ad180dcf9a4b0c1ac1f8f2ec9cec7a5b312f4e940df7edce
hash9c61a53b787bb42b12a3a44151ce1348669b4c745d087fb602df2b28d0fd92b5
hashbefbc4c451721ad8cce0795f82aa0762640644807130bf5d0cba44a1cb194d9c
hash1b388ef6594415421ef1b3cd9502fc7a
hash2012bf5de269d9acd0bfd7250ab46c68
hash233214d22659aa85f32bb705812a0b22
hash3ed1b60aada8ec3fc0965976c542dda5
hash4572914d6fd4b50604b30c761736ef7d
hash5936b135905bee8f038b9266362f22c7
hash6164f397ff13c56310e94af235a9aa02
hash784bcd1f62b97589f479525d27f883cb
hash9afdcf5369eca11d412870f7cb805da9
MD5 of 20b4624781bdc1f670942dc07bf673abd1c5e70f
hashb695a31ea90e61cc08da1837d836655a
hash03272f764bc0f6d80a830c164a5357cd9179030e
hash092cd5ad641ce749c100c2ad045e4aabb9bb7e90
hash1afde3bfe7ff7a9a164c9e6a0de12f5f1ce50b9a
hash20b4624781bdc1f670942dc07bf673abd1c5e70f
hash337850d965dd9860162c2084d83d4113bac95593
hash70b286728cf006ae6da37d918d372b7cedd40855
hashb2544370e041c2b3d38e5b1c0a22b4eab2d70588
hashda01214c5df3ee4a5a6b99414e4bb1fd88f6eb3e
hashf435900ebbc8a46c3b0b273d48b2ac149a35b194
hashfcc7095f6ddbffb7c2ca29188c45bbdf4c922c66
hash21e271bde14b62a1c982ea3aefc1c42a7f5b412126e920e7dd4200cbf14fe475
SHA256 of 20b4624781bdc1f670942dc07bf673abd1c5e70f
hash57e22a93fc31bd299871840864e82fa553e99501af7645102d07dceed2a8ef1a
hash63aa30c452e4dc0aa2324ce891da1acfa90ce85476d2dd7ab85ff448f913af5e
hash649b32f2db7d71cd083e9af4fae2fb3c086f5ed73eac622f427f7fa5d513c605
hash88e1b73318ba2107c2e70a59064d51e4fecd37ab6175735e43abfa8657d2cd91
hash91d8b31259d8602539fb6eaa0588d6521bf01299ccd8ed830abfe2ace7aea54d
hasha0f42337601429ffda00aa64b8e6102e2470b2388c132f96002f37d40f40d587
hasha9b1289383ffe3ee2bd0df96ad6918b9a7e27819e4bc10c3922d8bbd61cbd959
hashcf1f057bc8cb25b2d6d0704cef0655ea4d41ea247c51984b25635bd23c8ae109
hashede116e8f652728773363f6808fa8bbd5af873398e4bb5393c210677fa96a654

Domain

ValueDescriptionCopy
domainwww.dest-working.com
domainwww.profile-keybord.com

Threat ID: 682c992c7960f6956616a38c

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 7/2/2025, 3:57:42 AM

Last updated: 8/17/2025, 2:27:32 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats