Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

RONINGLOADER: DragonBreath's New Path to PPL Abuse

0
Medium
Published: Wed Nov 19 2025 (11/19/2025, 08:54:30 UTC)
Source: AlienVault OTX General

Description

RONINGLOADER is a sophisticated multi-stage malware loader used by the DragonBreath APT group to deploy an updated variant of the gh0st RAT. It begins infection via trojanized NSIS installers disguised as legitimate software and employs advanced evasion techniques including signed driver abuse, thread-pool injection, and Protected Process Light (PPL) exploitation to disable Microsoft Defender. The loader terminates antivirus processes, applies custom Windows Defender Application Control (WDAC) policies, and injects payloads into trusted system processes to avoid detection. This campaign targets Chinese EDR tools but demonstrates advanced tactics that could be adapted elsewhere. The malware’s complexity and stealth capabilities pose a medium severity threat, with potential impacts on confidentiality and integrity. European organizations using Windows environments with Microsoft Defender could be at risk, especially those in critical infrastructure and government sectors. Mitigation requires tailored detection of abnormal driver behavior, WDAC policy monitoring, and restricting installation of unsigned drivers. Countries with high adoption of Microsoft Defender and strategic geopolitical interest in China-related espionage are most likely affected.

AI-Powered Analysis

AILast updated: 11/19/2025, 09:27:23 UTC

Technical Analysis

RONINGLOADER is a multi-stage loader malware deployed by the DragonBreath advanced persistent threat (APT) group, designed to deliver an updated gh0st RAT variant. The infection chain starts with trojanized Nullsoft Scriptable Install System (NSIS) installers that masquerade as legitimate software, tricking users into executing the initial payload. RONINGLOADER employs a series of sophisticated evasion techniques to bypass endpoint detection and response (EDR) tools, particularly those used in China. Key evasion methods include abuse of signed kernel-mode drivers to gain elevated privileges, thread-pool injection to stealthily execute code within legitimate processes, and exploitation of Protected Process Light (PPL) to disable Microsoft Defender components. The loader terminates antivirus processes and applies custom Windows Defender Application Control (WDAC) policies to further weaken endpoint defenses. The final payload is injected into trusted system processes, making detection and removal challenging. This campaign reflects an evolution in DragonBreath’s tactics, emphasizing stealth, persistence, and adaptability. Although primarily targeting Chinese EDR solutions, the techniques used could be effective against other Windows environments globally. The malware’s use of driver abuse and PPL exploitation highlights the increasing sophistication of APT groups in circumventing modern security controls. No known public exploits or patches are currently available, and the campaign is ongoing as of late 2025.

Potential Impact

For European organizations, the RONINGLOADER threat poses significant risks primarily to confidentiality and integrity due to the deployment of the gh0st RAT, which enables remote access, data exfiltration, and potential lateral movement within networks. The malware’s ability to disable Microsoft Defender and evade detection can lead to prolonged undetected presence, increasing the risk of espionage, intellectual property theft, and disruption of critical services. Sectors such as government, defense, critical infrastructure, and technology firms are particularly vulnerable due to their strategic value and frequent targeting by APT groups. The use of trojanized installers as the initial infection vector means that social engineering or supply chain compromise could facilitate infection. The stealthy injection into trusted processes complicates incident response and forensic analysis. While the campaign currently targets Chinese EDR tools, the underlying techniques could be adapted to evade European security solutions, especially those relying on Microsoft Defender. The medium severity rating reflects the complexity and potential impact balanced against the current lack of widespread exploitation in Europe.

Mitigation Recommendations

European organizations should implement advanced monitoring for abnormal driver installations and behavior, including auditing signed driver usage to detect potential abuse. Deploying enhanced WDAC policy monitoring and alerting can help identify unauthorized policy changes indicative of malware activity. Endpoint detection solutions should be tuned to detect thread-pool injection and unusual process injection behaviors, especially into trusted system processes. Restricting the installation of unsigned or unapproved drivers through group policies and application whitelisting reduces the attack surface. User education to avoid installing software from untrusted sources, particularly trojanized NSIS installers, is critical. Incident response teams should develop playbooks for handling PPL exploitation and driver abuse scenarios. Regular threat hunting focusing on indicators of compromise related to RONINGLOADER’s tactics and techniques (e.g., process termination patterns, WDAC modifications) will improve early detection. Collaboration with threat intelligence providers to stay updated on DragonBreath activity and related malware variants is recommended. Finally, network segmentation and least privilege principles limit lateral movement if initial compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.elastic.co/security-labs/roningloader"]
Adversary
DragonBreath
Pulse Id
691d85c636ef7e742328d734
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainqaqkongtiao.com

Hash

ValueDescriptionCopy
hash5b92b51e585ad1f235855fd86dc77b85
hash0bb3cff34c803295888efde782925e5b1193114f
hash3dd470e85fe77cd847ca59d1d08ec8ccebe9bd73fd2cf074c29d87ca2fd24e33
hash00893b7c3e8c39d4663257ddec678aa9
hash3a7cb580bd340505f6dc5b4c829a3eca
hash838f8f3d80f676272dd54c9811ee6ce2
hash8ad120e4f3e41849fefa229c9b7d3008
hash96dcdb8bb7934abdb6cd87c33d17be87
hashb10347281e6e8451a77b423f1c8286bb
hashc09570d0dbf0abfe506cc4370defb396
hashd17f86f27e9db5a5afde517b5173121e
hashd378aa2d0853dd754f0729c463540d6b
hashd920c1a909744e206405ec13539ee01c
hashf8c3fc89d7a33c90110e401acc799d05
hashfa42ebb1071abc0e618c296ea2cf71a6
hash0143efc2dd05d7ce2a6c1d2672bc86c3b3381f8e
hash1b62c6fd4e1ce6fbe264f356d1c02816acc9c76a
hash21cc730517d74fa1d13316d7e0d817f3bd710906
hash31cbcab4267482904de5b6bb578c633309d81185
hash332aadd2e2e44d357f085b5b61e459ae9e276f6c
hash50b652fb7cac8803dfad1db1485a0f46715b0391
hash5a7c90c0806c846faa58959627a95b816e636e7f
hash5c0100a6b2fcc5e74649a356d322c2568a4e15ed
hash97e2a79af66c94fadb0f039fea405c1e612d6729
hash9e0c0737b0e37b3e821d011eecd9b0c7c9f2a15a
hashbf778f27c8abc9bd44ca484bf18d45cd17f7bbc8
hashc52d46c66d6469877b156e166ca2dbfb72fe90eb
hashceffd5ea7b813b356c77d469561dbb5ee45aeb24
hash1613a913d0384cbb958e9a8d6b00fffaf77c27d348ebc7886d6c563a6f22f2b7
hash1c1528b546aa29be6614707cbe408cb4b46e8ed05bf3fe6b388b9f22a4ee37e2
hash2515b546125d20013237aeadec5873e6438ada611347035358059a77a32c54f5
hash33b494eaaa6d7ed75eec74f8c8c866b6c42f59ca72b8517b3d4752c3313e617c
hash395f835731d25803a791db984062dd5cfdcade6f95cc5d0f68d359af32f6258d
hash4d5beb8efd4ade583c8ff730609f142550e8ed14c251bae1097c35a756ed39e6
hash82794015e2b40cc6e02d3c1d50241465c0cf2c2e4f0a7a2a8f880edaee203724
hash96f401b80d3319f8285fa2bb7f0d66ca9055d349c044b78c27e339bcfb07cdf0
hashc65170be2bf4f0bd71b9044592c063eaa82f3d43fcbd8a81e30a959bcaad8ae5
hashda2c58308e860e57df4c46465fd1cfc68d41e8699b4871e9a9be3c434283d50b
hashfc63f5dfc93f2358f4cba18cbdf99578fff5dac4cdd2de193a21f6041a0e01bc
hashfd4dd9904549c6655465331921a28330ad2b9ff1c99eb993edf2252001f1d107

Threat ID: 691d8b10ce29a4e4be9cd7ec

Added to database: 11/19/2025, 9:17:04 AM

Last enriched: 11/19/2025, 9:27:23 AM

Last updated: 11/22/2025, 4:21:41 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats