Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Threat Actor Targets Arabian Gulf Region With PlugX

0
Medium
Published: Mon Apr 13 2026 (04/13/2026, 14:40:01 UTC)
Source: AlienVault OTX General

Description

In March 2026, a China-nexus threat actor attributed with medium confidence to Mustang Panda conducted a targeted campaign against countries in the Arabian Gulf region. The attack used Arabic-language lures themed around missile strikes and employed weaponized ZIP archives containing malicious LNK and CHM files to initiate infection. The campaign deployed a heavily obfuscated variant of the PlugX backdoor via DLL sideloading, utilizing advanced obfuscation techniques such as control flow flattening and mixed boolean arithmetic. The backdoor supports HTTPS command-and-control, DNS-over-HTTPS resolution, and multiple plugins for system manipulation. This campaign rapidly weaponized geopolitical events to increase effectiveness. No known exploits in the wild or patches are indicated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/13/2026, 15:02:15 UTC

Technical Analysis

This threat involves a sophisticated PlugX backdoor campaign launched by a China-nexus actor, likely Mustang Panda, targeting the Arabian Gulf region in response to regional conflict escalation. The infection chain begins with weaponized ZIP archives containing malicious LNK and CHM files, which deploy a heavily obfuscated PlugX variant through DLL sideloading. The malware uses advanced evasion techniques including control flow flattening and mixed boolean arithmetic. Command-and-control communications occur over HTTPS and DNS-over-HTTPS, enhancing stealth. Multiple plugins enable extensive system manipulation. The campaign leverages geopolitical themes in Arabic-language lures to increase victim engagement. There is no indication of a patch or exploit in the wild, and the threat is assessed as medium severity.

Potential Impact

The campaign enables remote attackers to establish persistent, stealthy access to targeted systems in the Arabian Gulf region via a sophisticated PlugX backdoor. The malware's use of advanced obfuscation and multiple plugins allows extensive system manipulation and evasion of detection. The threat actor's rapid exploitation of geopolitical events increases the likelihood of successful compromise. No direct evidence of widespread exploitation or additional payloads is provided.

Mitigation Recommendations

No official patch or remediation is indicated for this malware campaign. Organizations in the Arabian Gulf region should be aware of the threat actor's tactics, including weaponized ZIP archives with LNK and CHM files and DLL sideloading techniques. Defenders should focus on detecting and blocking these infection vectors and monitor for PlugX-related indicators. Since this is not a cloud service and no patch is available, standard endpoint protection and threat hunting for the described behaviors are recommended. Patch status is not yet confirmed — check vendor advisories and threat intelligence sources for updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/china-nexus-threat-actor-targets-arabian-gulf-region-plugx"]
Adversary
Mustang Panda
Pulse Id
69dd0041c90648fbae253073
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash20eb9f216a1177ee539a012e6301a93e
hash43622a9b16021a5fb053e89ea5cb2c4c
hash4f6ea828ab0456539cf7d79af90acf87
hash93a98995ebfd672793b3413606211fa3
hasha158f22a6bf5e3678a499c3a2b039b16
hashb92e4615bb8026a593f0a72451285140
hashbf298f5b0ea62640f538922b32b8c3ed
hashda91acba97f7d2935149d80142df8ec9
hasheb27bbc29b36ae9c66970654925d8c3b
hash2d70a3f331278b490361d3f7274082f69184209d
hash31817d5baa9cc6ff22c172652ef312b7300c18a2
hash43c36b06573aeadabb55fd46c55a68c41a16ecc7
hash537044b0c8930522aa1bbbf6220077b36abcdf54
hasha5e42ac01e59d61c582e696edfde76452e35a43c
hashbdf4b77508c9295a2e70736ee6d689722f67802e
hashe15c3ff555a30dff5b66333492eed43e07ec72a1
hashe3dc5ef72a9d08790f2f21726fa270b77dea3803
hashec955e2b6874159c63578d6bb85fe67117d45508
hash014192c07267294116115d867b1dd48d851f0fa4c011cd96e4c5a5f81a6d1de3
hash10df3c46624c416f44764d7903b8079bc797c967284afc5bc333eeba0fdbba18
hash1ddbed0328a60bb4f725b4ef798d5d14f29c04f7ffe9a7a6940cacb557119a1c
hash5adae26409c6576f95270ce9ca3877df3ee60849c18540fd92c0c9c974ba2f6d
hash733a0a0ead4fc38173d7e30c7f2e14442ede32507e8adcbb8d3bd719fd2079d0
hashc78eb1cecef5f865b6d150adcf67fa5712c5a16b94f1618c32191e61fbe69590
hashe50a4069e173256498e9e801b8f0dcda5a217290869300055ad8a854d4ea210c
hashef7a813124fd19d11bb5d944cb95779f5fe09ff5a18c26399002759d4b0d66e7
hashfa3a1153018ac1e1a35a65e445a2bad33eac582c225cf6c38d0886802481cd43

Ip

ValueDescriptionCopy
ip91.193.17.117

Url

ValueDescriptionCopy
urlhttps://91.193.17.117:443
urlhttps://www.360printsol.com/2026/alfadhalah/thumbnail?img=index.png.

Domain

ValueDescriptionCopy
domainwww.360printsol.com

Threat ID: 69dd01da82d89c981ff9dcf2

Added to database: 4/13/2026, 2:46:50 PM

Last enriched: 4/13/2026, 3:02:15 PM

Last updated: 4/14/2026, 9:21:37 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses