Evasive Panda APT poisons DNS requests to deliver MgBot

Dec. 24, 2025, 3:32 p.m.

Description

The Evasive Panda APT group conducted highly-targeted campaigns from November 2022 to November 2024, employing adversary-in-the-middle attacks and DNS poisoning techniques. They developed a new loader that evades detection and uses hybrid encryption for victim-specific implants. The group utilized fake updaters for popular applications to deliver malware, including a multi-stage shellcode execution process. A secondary loader, disguised as a legitimate Windows library, was used to achieve stealthier loading. The attackers employed a custom hybrid encryption method combining DPAPI and RC5 to secure payloads. Victims were detected in Türkiye, China, and India, with some systems compromised for over a year. The campaign showcases the group's advanced capabilities and continuous improvement of tactics.

Date

  • Created: Dec. 24, 2025, 1:36 p.m.
  • Published: Dec. 24, 2025, 1:36 p.m.
  • Modified: Dec. 24, 2025, 3:32 p.m.

Indicators

  • 9c33f106fc93f3e6523627feda2e3250c45d704946dbdf87ad18fb3d815e2992
  • 60.28.124.21
  • 60.29.226.181
  • 106.126.3.78
  • 117.121.133.33
  • 103.27.110.232
  • 58.68.255.45
  • 116.213.178.11
  • 123.139.57.103
  • 103.96.130.107
  • 106.126.3.56

Attack Patterns

Additional Informations

  • Technology
  • Government
  • India
  • British Indian Ocean Territory
  • Türkiye
  • China