Evasive Panda APT poisons DNS requests to deliver MgBot
Dec. 24, 2025, 3:32 p.m.
Description
The Evasive Panda APT group conducted highly-targeted campaigns from November 2022 to November 2024, employing adversary-in-the-middle attacks and DNS poisoning techniques. They developed a new loader that evades detection and uses hybrid encryption for victim-specific implants. The group utilized fake updaters for popular applications to deliver malware, including a multi-stage shellcode execution process. A secondary loader, disguised as a legitimate Windows library, was used to achieve stealthier loading. The attackers employed a custom hybrid encryption method combining DPAPI and RC5 to secure payloads. Victims were detected in Türkiye, China, and India, with some systems compromised for over a year. The campaign showcases the group's advanced capabilities and continuous improvement of tactics.
Tags
Date
- Created: Dec. 24, 2025, 1:36 p.m.
- Published: Dec. 24, 2025, 1:36 p.m.
- Modified: Dec. 24, 2025, 3:32 p.m.
Indicators
- 9c33f106fc93f3e6523627feda2e3250c45d704946dbdf87ad18fb3d815e2992
- 60.28.124.21
- 60.29.226.181
- 106.126.3.78
- 117.121.133.33
- 103.27.110.232
- 58.68.255.45
- 116.213.178.11
- 123.139.57.103
- 103.96.130.107
- 106.126.3.56
Additional Informations
- Technology
- Government
- India
- British Indian Ocean Territory
- Türkiye
- China