RONINGLOADER: DragonBreath's New Path to PPL Abuse
RONINGLOADER is a sophisticated multi-stage malware loader used by the DragonBreath APT group to deploy an updated variant of the gh0st RAT. It begins infection via trojanized NSIS installers disguised as legitimate software and employs advanced evasion techniques including signed driver abuse, thread-pool injection, and Protected Process Light (PPL) exploitation to disable Microsoft Defender. The loader terminates antivirus processes, applies custom Windows Defender Application Control (WDAC) policies, and injects payloads into trusted system processes to avoid detection. This campaign targets Chinese EDR tools but demonstrates advanced tactics that could be adapted elsewhere. The malware’s complexity and stealth capabilities pose a medium severity threat, with potential impacts on confidentiality and integrity. European organizations using Windows environments with Microsoft Defender could be at risk, especially those in critical infrastructure and government sectors. Mitigation requires tailored detection of abnormal driver behavior, WDAC policy monitoring, and restricting installation of unsigned drivers. Countries with high adoption of Microsoft Defender and strategic geopolitical interest in China-related espionage are most likely affected.
AI Analysis
Technical Summary
RONINGLOADER is a multi-stage loader malware deployed by the DragonBreath advanced persistent threat (APT) group, designed to deliver an updated gh0st RAT variant. The infection chain starts with trojanized Nullsoft Scriptable Install System (NSIS) installers that masquerade as legitimate software, tricking users into executing the initial payload. RONINGLOADER employs a series of sophisticated evasion techniques to bypass endpoint detection and response (EDR) tools, particularly those used in China. Key evasion methods include abuse of signed kernel-mode drivers to gain elevated privileges, thread-pool injection to stealthily execute code within legitimate processes, and exploitation of Protected Process Light (PPL) to disable Microsoft Defender components. The loader terminates antivirus processes and applies custom Windows Defender Application Control (WDAC) policies to further weaken endpoint defenses. The final payload is injected into trusted system processes, making detection and removal challenging. This campaign reflects an evolution in DragonBreath’s tactics, emphasizing stealth, persistence, and adaptability. Although primarily targeting Chinese EDR solutions, the techniques used could be effective against other Windows environments globally. The malware’s use of driver abuse and PPL exploitation highlights the increasing sophistication of APT groups in circumventing modern security controls. No known public exploits or patches are currently available, and the campaign is ongoing as of late 2025.
Potential Impact
For European organizations, the RONINGLOADER threat poses significant risks primarily to confidentiality and integrity due to the deployment of the gh0st RAT, which enables remote access, data exfiltration, and potential lateral movement within networks. The malware’s ability to disable Microsoft Defender and evade detection can lead to prolonged undetected presence, increasing the risk of espionage, intellectual property theft, and disruption of critical services. Sectors such as government, defense, critical infrastructure, and technology firms are particularly vulnerable due to their strategic value and frequent targeting by APT groups. The use of trojanized installers as the initial infection vector means that social engineering or supply chain compromise could facilitate infection. The stealthy injection into trusted processes complicates incident response and forensic analysis. While the campaign currently targets Chinese EDR tools, the underlying techniques could be adapted to evade European security solutions, especially those relying on Microsoft Defender. The medium severity rating reflects the complexity and potential impact balanced against the current lack of widespread exploitation in Europe.
Mitigation Recommendations
European organizations should implement advanced monitoring for abnormal driver installations and behavior, including auditing signed driver usage to detect potential abuse. Deploying enhanced WDAC policy monitoring and alerting can help identify unauthorized policy changes indicative of malware activity. Endpoint detection solutions should be tuned to detect thread-pool injection and unusual process injection behaviors, especially into trusted system processes. Restricting the installation of unsigned or unapproved drivers through group policies and application whitelisting reduces the attack surface. User education to avoid installing software from untrusted sources, particularly trojanized NSIS installers, is critical. Incident response teams should develop playbooks for handling PPL exploitation and driver abuse scenarios. Regular threat hunting focusing on indicators of compromise related to RONINGLOADER’s tactics and techniques (e.g., process termination patterns, WDAC modifications) will improve early detection. Collaboration with threat intelligence providers to stay updated on DragonBreath activity and related malware variants is recommended. Finally, network segmentation and least privilege principles limit lateral movement if initial compromise occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Poland, Belgium, Sweden
Indicators of Compromise
- domain: qaqkongtiao.com
- hash: 5b92b51e585ad1f235855fd86dc77b85
- hash: 0bb3cff34c803295888efde782925e5b1193114f
- hash: 3dd470e85fe77cd847ca59d1d08ec8ccebe9bd73fd2cf074c29d87ca2fd24e33
- hash: 00893b7c3e8c39d4663257ddec678aa9
- hash: 3a7cb580bd340505f6dc5b4c829a3eca
- hash: 838f8f3d80f676272dd54c9811ee6ce2
- hash: 8ad120e4f3e41849fefa229c9b7d3008
- hash: 96dcdb8bb7934abdb6cd87c33d17be87
- hash: b10347281e6e8451a77b423f1c8286bb
- hash: c09570d0dbf0abfe506cc4370defb396
- hash: d17f86f27e9db5a5afde517b5173121e
- hash: d378aa2d0853dd754f0729c463540d6b
- hash: d920c1a909744e206405ec13539ee01c
- hash: f8c3fc89d7a33c90110e401acc799d05
- hash: fa42ebb1071abc0e618c296ea2cf71a6
- hash: 0143efc2dd05d7ce2a6c1d2672bc86c3b3381f8e
- hash: 1b62c6fd4e1ce6fbe264f356d1c02816acc9c76a
- hash: 21cc730517d74fa1d13316d7e0d817f3bd710906
- hash: 31cbcab4267482904de5b6bb578c633309d81185
- hash: 332aadd2e2e44d357f085b5b61e459ae9e276f6c
- hash: 50b652fb7cac8803dfad1db1485a0f46715b0391
- hash: 5a7c90c0806c846faa58959627a95b816e636e7f
- hash: 5c0100a6b2fcc5e74649a356d322c2568a4e15ed
- hash: 97e2a79af66c94fadb0f039fea405c1e612d6729
- hash: 9e0c0737b0e37b3e821d011eecd9b0c7c9f2a15a
- hash: bf778f27c8abc9bd44ca484bf18d45cd17f7bbc8
- hash: c52d46c66d6469877b156e166ca2dbfb72fe90eb
- hash: ceffd5ea7b813b356c77d469561dbb5ee45aeb24
- hash: 1613a913d0384cbb958e9a8d6b00fffaf77c27d348ebc7886d6c563a6f22f2b7
- hash: 1c1528b546aa29be6614707cbe408cb4b46e8ed05bf3fe6b388b9f22a4ee37e2
- hash: 2515b546125d20013237aeadec5873e6438ada611347035358059a77a32c54f5
- hash: 33b494eaaa6d7ed75eec74f8c8c866b6c42f59ca72b8517b3d4752c3313e617c
- hash: 395f835731d25803a791db984062dd5cfdcade6f95cc5d0f68d359af32f6258d
- hash: 4d5beb8efd4ade583c8ff730609f142550e8ed14c251bae1097c35a756ed39e6
- hash: 82794015e2b40cc6e02d3c1d50241465c0cf2c2e4f0a7a2a8f880edaee203724
- hash: 96f401b80d3319f8285fa2bb7f0d66ca9055d349c044b78c27e339bcfb07cdf0
- hash: c65170be2bf4f0bd71b9044592c063eaa82f3d43fcbd8a81e30a959bcaad8ae5
- hash: da2c58308e860e57df4c46465fd1cfc68d41e8699b4871e9a9be3c434283d50b
- hash: fc63f5dfc93f2358f4cba18cbdf99578fff5dac4cdd2de193a21f6041a0e01bc
- hash: fd4dd9904549c6655465331921a28330ad2b9ff1c99eb993edf2252001f1d107
RONINGLOADER: DragonBreath's New Path to PPL Abuse
Description
RONINGLOADER is a sophisticated multi-stage malware loader used by the DragonBreath APT group to deploy an updated variant of the gh0st RAT. It begins infection via trojanized NSIS installers disguised as legitimate software and employs advanced evasion techniques including signed driver abuse, thread-pool injection, and Protected Process Light (PPL) exploitation to disable Microsoft Defender. The loader terminates antivirus processes, applies custom Windows Defender Application Control (WDAC) policies, and injects payloads into trusted system processes to avoid detection. This campaign targets Chinese EDR tools but demonstrates advanced tactics that could be adapted elsewhere. The malware’s complexity and stealth capabilities pose a medium severity threat, with potential impacts on confidentiality and integrity. European organizations using Windows environments with Microsoft Defender could be at risk, especially those in critical infrastructure and government sectors. Mitigation requires tailored detection of abnormal driver behavior, WDAC policy monitoring, and restricting installation of unsigned drivers. Countries with high adoption of Microsoft Defender and strategic geopolitical interest in China-related espionage are most likely affected.
AI-Powered Analysis
Technical Analysis
RONINGLOADER is a multi-stage loader malware deployed by the DragonBreath advanced persistent threat (APT) group, designed to deliver an updated gh0st RAT variant. The infection chain starts with trojanized Nullsoft Scriptable Install System (NSIS) installers that masquerade as legitimate software, tricking users into executing the initial payload. RONINGLOADER employs a series of sophisticated evasion techniques to bypass endpoint detection and response (EDR) tools, particularly those used in China. Key evasion methods include abuse of signed kernel-mode drivers to gain elevated privileges, thread-pool injection to stealthily execute code within legitimate processes, and exploitation of Protected Process Light (PPL) to disable Microsoft Defender components. The loader terminates antivirus processes and applies custom Windows Defender Application Control (WDAC) policies to further weaken endpoint defenses. The final payload is injected into trusted system processes, making detection and removal challenging. This campaign reflects an evolution in DragonBreath’s tactics, emphasizing stealth, persistence, and adaptability. Although primarily targeting Chinese EDR solutions, the techniques used could be effective against other Windows environments globally. The malware’s use of driver abuse and PPL exploitation highlights the increasing sophistication of APT groups in circumventing modern security controls. No known public exploits or patches are currently available, and the campaign is ongoing as of late 2025.
Potential Impact
For European organizations, the RONINGLOADER threat poses significant risks primarily to confidentiality and integrity due to the deployment of the gh0st RAT, which enables remote access, data exfiltration, and potential lateral movement within networks. The malware’s ability to disable Microsoft Defender and evade detection can lead to prolonged undetected presence, increasing the risk of espionage, intellectual property theft, and disruption of critical services. Sectors such as government, defense, critical infrastructure, and technology firms are particularly vulnerable due to their strategic value and frequent targeting by APT groups. The use of trojanized installers as the initial infection vector means that social engineering or supply chain compromise could facilitate infection. The stealthy injection into trusted processes complicates incident response and forensic analysis. While the campaign currently targets Chinese EDR tools, the underlying techniques could be adapted to evade European security solutions, especially those relying on Microsoft Defender. The medium severity rating reflects the complexity and potential impact balanced against the current lack of widespread exploitation in Europe.
Mitigation Recommendations
European organizations should implement advanced monitoring for abnormal driver installations and behavior, including auditing signed driver usage to detect potential abuse. Deploying enhanced WDAC policy monitoring and alerting can help identify unauthorized policy changes indicative of malware activity. Endpoint detection solutions should be tuned to detect thread-pool injection and unusual process injection behaviors, especially into trusted system processes. Restricting the installation of unsigned or unapproved drivers through group policies and application whitelisting reduces the attack surface. User education to avoid installing software from untrusted sources, particularly trojanized NSIS installers, is critical. Incident response teams should develop playbooks for handling PPL exploitation and driver abuse scenarios. Regular threat hunting focusing on indicators of compromise related to RONINGLOADER’s tactics and techniques (e.g., process termination patterns, WDAC modifications) will improve early detection. Collaboration with threat intelligence providers to stay updated on DragonBreath activity and related malware variants is recommended. Finally, network segmentation and least privilege principles limit lateral movement if initial compromise occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.elastic.co/security-labs/roningloader"]
- Adversary
- DragonBreath
- Pulse Id
- 691d85c636ef7e742328d734
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainqaqkongtiao.com | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash5b92b51e585ad1f235855fd86dc77b85 | — | |
hash0bb3cff34c803295888efde782925e5b1193114f | — | |
hash3dd470e85fe77cd847ca59d1d08ec8ccebe9bd73fd2cf074c29d87ca2fd24e33 | — | |
hash00893b7c3e8c39d4663257ddec678aa9 | — | |
hash3a7cb580bd340505f6dc5b4c829a3eca | — | |
hash838f8f3d80f676272dd54c9811ee6ce2 | — | |
hash8ad120e4f3e41849fefa229c9b7d3008 | — | |
hash96dcdb8bb7934abdb6cd87c33d17be87 | — | |
hashb10347281e6e8451a77b423f1c8286bb | — | |
hashc09570d0dbf0abfe506cc4370defb396 | — | |
hashd17f86f27e9db5a5afde517b5173121e | — | |
hashd378aa2d0853dd754f0729c463540d6b | — | |
hashd920c1a909744e206405ec13539ee01c | — | |
hashf8c3fc89d7a33c90110e401acc799d05 | — | |
hashfa42ebb1071abc0e618c296ea2cf71a6 | — | |
hash0143efc2dd05d7ce2a6c1d2672bc86c3b3381f8e | — | |
hash1b62c6fd4e1ce6fbe264f356d1c02816acc9c76a | — | |
hash21cc730517d74fa1d13316d7e0d817f3bd710906 | — | |
hash31cbcab4267482904de5b6bb578c633309d81185 | — | |
hash332aadd2e2e44d357f085b5b61e459ae9e276f6c | — | |
hash50b652fb7cac8803dfad1db1485a0f46715b0391 | — | |
hash5a7c90c0806c846faa58959627a95b816e636e7f | — | |
hash5c0100a6b2fcc5e74649a356d322c2568a4e15ed | — | |
hash97e2a79af66c94fadb0f039fea405c1e612d6729 | — | |
hash9e0c0737b0e37b3e821d011eecd9b0c7c9f2a15a | — | |
hashbf778f27c8abc9bd44ca484bf18d45cd17f7bbc8 | — | |
hashc52d46c66d6469877b156e166ca2dbfb72fe90eb | — | |
hashceffd5ea7b813b356c77d469561dbb5ee45aeb24 | — | |
hash1613a913d0384cbb958e9a8d6b00fffaf77c27d348ebc7886d6c563a6f22f2b7 | — | |
hash1c1528b546aa29be6614707cbe408cb4b46e8ed05bf3fe6b388b9f22a4ee37e2 | — | |
hash2515b546125d20013237aeadec5873e6438ada611347035358059a77a32c54f5 | — | |
hash33b494eaaa6d7ed75eec74f8c8c866b6c42f59ca72b8517b3d4752c3313e617c | — | |
hash395f835731d25803a791db984062dd5cfdcade6f95cc5d0f68d359af32f6258d | — | |
hash4d5beb8efd4ade583c8ff730609f142550e8ed14c251bae1097c35a756ed39e6 | — | |
hash82794015e2b40cc6e02d3c1d50241465c0cf2c2e4f0a7a2a8f880edaee203724 | — | |
hash96f401b80d3319f8285fa2bb7f0d66ca9055d349c044b78c27e339bcfb07cdf0 | — | |
hashc65170be2bf4f0bd71b9044592c063eaa82f3d43fcbd8a81e30a959bcaad8ae5 | — | |
hashda2c58308e860e57df4c46465fd1cfc68d41e8699b4871e9a9be3c434283d50b | — | |
hashfc63f5dfc93f2358f4cba18cbdf99578fff5dac4cdd2de193a21f6041a0e01bc | — | |
hashfd4dd9904549c6655465331921a28330ad2b9ff1c99eb993edf2252001f1d107 | — |
Threat ID: 691d8b10ce29a4e4be9cd7ec
Added to database: 11/19/2025, 9:17:04 AM
Last enriched: 11/19/2025, 9:27:23 AM
Last updated: 11/22/2025, 4:21:41 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-11-21
MediumNew Tools and Techniques of ToddyCat APT
MediumAnalysis of APT-C-26 (Lazarus) Group's Attack Campaign Using Remote IT Disguise to Deploy Monitoring Software
MediumAPT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
MediumSyncro + Lovable: RAT delivery via AI-generated websites | Kaspersky official blog
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.