Mustang Panda, Bronze President

Mustang Panda, Bronze President, TEMP.Hex, HoneyMyte, Red Lich, Earth Preta, Camaro Dragon
(Type: -)

(CrowdStrike) In April 2017, CrowdStrike Falcon Intelligence observed a previously unattributed actor group with a Chinese nexus targeting a U.S.-based think tank. Further analysis revealed a wider campaign with unique tactics, techniques, and procedures (TTPs). This adversary targets non-governmental organizations (NGOs) in general, but uses Mongolian language decoys and themes, suggesting this actor has a specific focus on gathering intelligence on Mongolia. These campaigns involve the use of shared malware like Poison Ivy or PlugX. Recently, Falcon Intelligence observed new activity from Mustang Panda, using a unique infection chain to target likely Mongolia-based victims. This newly observed activity uses a series of redirections and fileless, malicious implementations of legitimate tools to gain access to the targeted systems. Additionally, Mustang Panda actors reused previously-observed legitimate domains to host files. Also see {{RedDelta}}.

[News Analysis] Trends:

Total Trend: 0

Trend Per Year


Trend Per Month



[News Analysis] News Mention Another Threat Name:



[TTP Analysis] Technique Performance:

reconnaissance
1/43
resource development
4/45
initial access
3/19
execution
8/36
persistence
4/113
privilege escalation
4/96
defense evasion
9/184
credential access
1/63
discovery
6/44
lateral movement
1/22
collection
4/37
command and control
5/39
exfiltration
1/18
impact
0/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1598.003
Phishing For Information : Spearphishing Link
T1583.001
Acquire Infrastructure : Domains
T1585.002
Establish Accounts : Email Accounts
T1608
Stage Capabilities
T1608.001
Stage Capabilities : Upload Malware
T1566.001
Phishing : Spearphishing Attachment
T1566.002
Phishing : Spearphishing Link
T1091
Replication Through Removable Media
T1059.001
Command And Scripting Interpreter : Powershell
T1059.003
Command And Scripting Interpreter : Windows Command Shell
T1059.005
Command And Scripting Interpreter : Visual Basic
T1203
Exploitation For Client Execution
T1053.005
Scheduled Task/job : Scheduled Task
T1204.001
User Execution : Malicious Link
T1204.002
User Execution : Malicious File
T1047
Windows Management Instrumentation
T1547.001
Boot Or Logon Autostart Execution : Registry Run Keys / Startup Folder
T1546.003
Event Triggered Execution : Windows Management Instrumentation Event Subscription
T1574.002
Hijack Execution Flow : Dll Side-loading
T1053.005
Scheduled Task/job : Scheduled Task
T1547.001
Boot Or Logon Autostart Execution : Registry Run Keys / Startup Folder
T1546.003
Event Triggered Execution : Windows Management Instrumentation Event Subscription
T1574.002
Hijack Execution Flow : Dll Side-loading
T1053.005
Scheduled Task/job : Scheduled Task
T1564.001
Hide Artifacts : Hidden Files And Directories
T1574.002
Hijack Execution Flow : Dll Side-loading
T1070.004
Indicator Removal : File Deletion
T1036.005
Masquerading : Match Legitimate Name Or Location
T1036.007
Masquerading : Double File Extension
T1027
Obfuscated Files Or Information
T1027.001
Obfuscated Files Or Information : Binary Padding
T1218.004
System Binary Proxy Execution : Installutil
T1218.005
System Binary Proxy Execution : Mshta
T1003.003
Os Credential Dumping : Ntds
T1083
File And Directory Discovery
T1057
Process Discovery
T1518
Software Discovery
T1082
System Information Discovery
T1016
System Network Configuration Discovery
T1049
System Network Connections Discovery
T1091
Replication Through Removable Media
T1560.001
Archive Collected Data : Archive Via Utility
T1560.003
Archive Collected Data : Archive Via Custom Method
T1119
Automated Collection
T1074.001
Data Staged : Local Data Staging
T1071.001
Application Layer Protocol : Web Protocols
T1573.001
Encrypted Channel : Symmetric Cryptography
T1105
Ingress Tool Transfer
T1219
Remote Access Software
T1102
Web Service
T1052.001
Exfiltration Over Physical Medium : Exfiltration Over Usb


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

Basic Information (Credit @etda.or.th)

Actor: Mustang Panda, Bronze President

Names: Mustang Panda, Bronze President, TEMP.Hex, HoneyMyte, Red Lich, Earth Preta, Camaro Dragon

Country: China

Sponsor: State-sponsored

Motivation: Information theft and espionage

First-seen: 2012

Description: (CrowdStrike) In April 2017, CrowdStrike Falcon Intelligence observed a previously unattributed actor group with a Chinese nexus targeting a U.S.-based think tank. Further analysis revealed a wider campaign with unique tactics, techniques, and procedures (TTPs). This adversary targets non-governmental organizations (NGOs) in general, but uses Mongolian language decoys and themes, suggesting this actor has a specific focus on gathering intelligence on Mongolia. These campaigns involve the use of shared malware like Poison Ivy or PlugX. Recently, Falcon Intelligence observed new activity from Mustang Panda, using a unique infection chain to target likely Mongolia-based victims. This newly observed activity uses a series of redirections and fileless, malicious implementations of legitimate tools to gain access to the targeted systems. Additionally, Mustang Panda actors reused previously-observed legitimate domains to host files. Also see {{RedDelta}}.

Observed-sectors: Aviation

Observed-sectors: Education

Observed-sectors: Government

Observed-sectors: NGOs

Observed-sectors: Think Tanks

Observed-sectors: Telecommunications

Observed-countries: Australia

Observed-countries: Bangladesh

Observed-countries: Belgium

Observed-countries: Bulgaria

Observed-countries: China

Observed-countries: Cyprus

Observed-countries: Czech

Observed-countries: Ethiopia

Observed-countries: France

Observed-countries: Germany

Observed-countries: Greece

Observed-countries: Hong Kong

Observed-countries: Hungary

Observed-countries: India

Observed-countries: Indonesia

Observed-countries: Japan

Observed-countries: Mongolia

Observed-countries: Myanmar

Observed-countries: Nepal

Observed-countries: Pakistan

Observed-countries: Philippines

Observed-countries: Russia

Observed-countries: Singapore

Observed-countries: Slovakia

Observed-countries: South Africa

Observed-countries: South Korea

Observed-countries: South Sudan

Observed-countries: Sweden

Observed-countries: Taiwan

Observed-countries: Thailand

Observed-countries: UK

Observed-countries: USA

Observed-countries: Vietnam

Observed-countries: UN

Tools: AdFind

Tools: China Chopper

Tools: Cobalt Strike

Tools: Hodur

Tools: HopperTick

Tools: nbtscan

Tools: MQsTTang

Tools: NetSess

Tools: Netview

Tools: nmap

Tools: Orat

Tools: Poison Ivy

Tools: PlugX

Tools: PowerView

Tools: PUBLOAD

Tools: PVE Find AD Users

Tools: RCSession

Tools: TeamViewer

Tools: TinyNote

Tools: TONEINS

Tools: TONESHELL

Tools: WmiExec

Tools: WispRider

Operations: 2014

Operations: Secureworks Counter Threat Unit (CTU) researchers have observed BRONZE PRESIDENT activity since mid-2018 but identified artifacts suggesting that the threat actors may have been conducting network intrusions as far back as 2014. https://www.secureworks.com/research/bronze-president-targets-ngos

Operations: 2019-08

Operations: In mid-August 2019, the Anomali Threat Research Team discovered suspicious “.lnk” files during routine intelligence collection. While the distribution method of these documents cannot be confirmed at this time, it is likely that spearphishing is being utilized because it aligns with Mustang Panda’s TTPs, and it is a common tactic used amongst APT actors. https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations#When:17:14:00Z

Operations: 2020-01

Operations: Avira’s Advanced Threat Research team discovered a new version of PlugX from the Mustang Panda APT that is used to spy on some targets in Hong Kong and Vietnam. The way that the APT actor infects the target, and launches the malicious payload is similar to previous versions—but with some differences. https://insights.oem.avira.com/new-wave-of-plugx-targets-hong-kong/

Operations: 2020-03

Operations: Vietnamese cyber-security firm VinCSS detected a Chinese state-sponsored hacking group (codenamed Mustang Panda) spreading emails with a RAR file attachment purporting to carry a message about the coronavirus outbreak from the Vietnamese Prime Minister. https://blog.vincss.net/2020/03/re012-phan-tich-ma-doc-loi-dung-dich-COVID-19-de-phat-tan-gia-mao-chi-thi-cua-thu-tuong-Nguyen-Xuan-Phuc.html

Operations: 2020-03

Operations: ATR identified that the Higaisa and Mustang Panda Advanced Persistent Threat (APT) groups have been utilizing Coronavirus-themed lures in their campaigns. https://www.anomali.com/blog/covid-19-themes-are-being-utilized-by-threat-actors-of-varying-sophistication#When:14:00:00Z

Operations: 2021-03

Operations: Indonesian intelligence agency compromised in suspected Chinese hack https://therecord.media/indonesian-intelligence-agency-compromised-in-suspected-chinese-hack/

Operations: 2021-08

Operations: Mustang Panda’s Hodur: Old tricks, new Korplug variant https://www.welivesecurity.com/2022/03/23/mustang-panda-hodur-old-tricks-new-korplug-variant/

Operations: 2022-02

Operations: Mustang Panda or Temp.Hex, a China-based threat actor, targeted European entities with lures related to the Ukrainian invasion. https://blog.google/threat-analysis-group/update-threat-landscape-ukraine/

Operations: 2022-02

Operations: Mustang Panda deploys a new wave of malware targeting Europe https://blog.talosintelligence.com/2022/05/mustang-panda-targets-europe.html

Operations: 2022-02

Operations: Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets https://blogs.blackberry.com/en/2022/12/mustang-panda-uses-the-russian-ukrainian-war-to-attack-europe-and-asia-pacific-targets

Operations: 2022-03

Operations: BRONZE PRESIDENT Targets Russian Speakers with Updated PlugX https://www.secureworks.com/blog/bronze-president-targets-russian-speakers-with-updated-plugx

Operations: 2022-03

Operations: Earth Preta Spear-Phishing Governments Worldwide https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html

Operations: 2022-06

Operations: BRONZE PRESIDENT Targets Government Officials https://www.secureworks.com/blog/bronze-president-targets-government-officials

Operations: 2022

Operations: Earth Preta’s Cyberespionage Campaign Hits Over 200 https://www.trendmicro.com/en_us/research/23/c/earth-preta-cyberespionage-campaign-hits-over-200.html

Operations: 2022-10

Operations: Pack it Secretly: Earth Preta’s Updated Stealthy Strategies https://www.trendmicro.com/en_us/research/23/c/earth-preta-updated-stealthy-strategies.html

Operations: 2022-12

Operations: Operation “SmugX” SmugX: Unveiling a Chinese-Based APT Operation Targeting European Governmental Entities: Check Point Research Exposes a Shifting Trend https://blog.checkpoint.com/securing-user-and-access/smugx-unveiling-a-chinese-based-apt-operation-targeting-european-governmental-entities-check-point-research-exposes-a-shifting-trend/

Operations: 2023-01

Operations: MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT https://www.welivesecurity.com/2023/03/02/mqsttang-mustang-panda-latest-backdoor-treads-new-ground-qt-mqtt/

Operations: 2023-01

Operations: Malware Spotlight: Camaro Dragon’s TinyNote Backdoor https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/

Operations: 2023 Early

Operations: Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives https://research.checkpoint.com/2023/beyond-the-horizon-traveling-the-world-on-camaro-dragons-usb-flash-drives/

Operations: 2023-04

Operations: New Mustang Panda’s campaing against Australia https://lab52.io/blog/new-mustang-pandas-campaing-against-australia/

Operations: 2023-05

Operations: Check Point Research reveals a malicious firmware implant for TP-Link routers, linked to Chinese APT group https://blog.checkpoint.com/security/check-point-research-reveals-a-malicious-firmware-implant-for-tp-link-routers-linked-to-chinese-apt-group/

Information: https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/

Information: https://www.trendmicro.com/en_us/research/23/f/behind-the-scenes-unveiling-the-hidden-workings-of-earth-preta.html

Mitre-attack: https://attack.mitre.org/groups/G0129/

Last-card-change: 2023-09-05

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1598.003
PHISHING FOR INFORMATION : SPEARPHISHING LINK
mustang panda has delivered web bugs to profile their intended targets.
T1583.001
ACQUIRE INFRASTRUCTURE : DOMAINS
mustang panda have acquired c2 domains prior to operations.
T1585.002
ESTABLISH ACCOUNTS : EMAIL ACCOUNTS
mustang panda has leveraged the legitimate email marketing service smtp2go for phishing campaigns.
T1608
STAGE CAPABILITIES
mustang panda has used servers under their control to validate tracking pixels sent to phishing victims.
T1608.001
STAGE CAPABILITIES : UPLOAD MALWARE
mustang panda has hosted malicious payloads on dropbox including plugx.
T1566.001
PHISHING : SPEARPHISHING ATTACHMENT
mustang panda has used spearphishing attachments to deliver initial access payloads.
T1566.002
PHISHING : SPEARPHISHING LINK
mustang panda has delivered malicious links to their intended targets.
T1091
REPLICATION THROUGH REMOVABLE MEDIA
mustang panda has used a customized plugx variant which could spread through usb connections.
T1059.001
COMMAND AND SCRIPTING INTERPRETER : POWERSHELL
mustang panda has used malicious powershell scripts to enable execution.
T1059.003
COMMAND AND SCRIPTING INTERPRETER : WINDOWS COMMAND SHELL
mustang panda has executed hta files via cmd.exe, and used batch scripts for collection.
T1059.005
COMMAND AND SCRIPTING INTERPRETER : VISUAL BASIC
mustang panda has embedded vbscript components in lnk files to download additional files and automate collection.
T1203
EXPLOITATION FOR CLIENT EXECUTION
mustang panda has exploited cve-2017-0199 in microsoft word to execute code.
T1053.005
SCHEDULED TASK/JOB : SCHEDULED TASK
mustang panda has created a scheduled task to execute additional malicious software, as well as maintain persistence.
T1204.001
USER EXECUTION : MALICIOUS LINK
mustang panda has sent malicious links including links directing victims to a google drive folder.
T1204.002
USER EXECUTION : MALICIOUS FILE
mustang panda has sent malicious files requiring direct victim interaction to execute.
T1047
WINDOWS MANAGEMENT INSTRUMENTATION
mustang panda has executed powershell scripts via wmi.
T1547.001
BOOT OR LOGON AUTOSTART EXECUTION : REGISTRY RUN KEYS / STARTUP FOLDER
mustang panda has created the registry key hkey_local_machine\software\wow6432node\microsoft\windows\currentversion\run\adobelmdyu to maintain persistence.
T1546.003
EVENT TRIGGERED EXECUTION : WINDOWS MANAGEMENT INSTRUMENTATION EVENT SUBSCRIPTION
mustang panda's custom orat tool uses a wmi event consumer to maintain persistence.
T1574.002
HIJACK EXECUTION FLOW : DLL SIDE-LOADING
mustang panda has used a legitimately signed executable to execute a malicious payload within a dll file.
T1053.005
SCHEDULED TASK/JOB : SCHEDULED TASK
mustang panda has created a scheduled task to execute additional malicious software, as well as maintain persistence.
T1547.001
BOOT OR LOGON AUTOSTART EXECUTION : REGISTRY RUN KEYS / STARTUP FOLDER
mustang panda has created the registry key hkey_local_machine\software\wow6432node\microsoft\windows\currentversion\run\adobelmdyu to maintain persistence.
T1546.003
EVENT TRIGGERED EXECUTION : WINDOWS MANAGEMENT INSTRUMENTATION EVENT SUBSCRIPTION
mustang panda's custom orat tool uses a wmi event consumer to maintain persistence.
T1574.002
HIJACK EXECUTION FLOW : DLL SIDE-LOADING
mustang panda has used a legitimately signed executable to execute a malicious payload within a dll file.
T1053.005
SCHEDULED TASK/JOB : SCHEDULED TASK
mustang panda has created a scheduled task to execute additional malicious software, as well as maintain persistence.
T1564.001
HIDE ARTIFACTS : HIDDEN FILES AND DIRECTORIES
mustang panda's plugx variant has created a hidden folder on usb drives named recycle.bin to store malicious executables and collected data.
T1574.002
HIJACK EXECUTION FLOW : DLL SIDE-LOADING
mustang panda has used a legitimately signed executable to execute a malicious payload within a dll file.
T1070.004
INDICATOR REMOVAL : FILE DELETION
mustang panda will delete their tools and files, and kill processes after their objectives are reached.
T1036.005
MASQUERADING : MATCH LEGITIMATE NAME OR LOCATION
mustang panda has used names like adobeupdate.dat and potplayerdb.dat to disguise plugx, and a file named onedrive.exe to load a cobalt strike payload.
T1036.007
MASQUERADING : DOUBLE FILE EXTENSION
mustang panda has used an additional filename extension to hide the true file type.
T1027
OBFUSCATED FILES OR INFORMATION
mustang panda has delivered initial payloads hidden using archives and encoding measures.
T1027.001
OBFUSCATED FILES OR INFORMATION : BINARY PADDING
mustang panda has used junk code within their dll files to hinder analysis.
T1218.004
SYSTEM BINARY PROXY EXECUTION : INSTALLUTIL
mustang panda has used installutil.exe to execute a malicious beacon stager.
T1218.005
SYSTEM BINARY PROXY EXECUTION : MSHTA
mustang panda has used mshta.exe to launch collection scripts.
T1003.003
OS CREDENTIAL DUMPING : NTDS
mustang panda has used vssadmin to create a volume shadow copy and retrieve the ntds.dit file. mustang panda has also used reg save on the system file registry location to help extract the ntds.dit file.
T1083
FILE AND DIRECTORY DISCOVERY
mustang panda has searched the entire target system for doc, docx, ppt, pptx, xls, xlsx, and pdf files.
T1057
PROCESS DISCOVERY
mustang panda has used tasklist /v to determine active process information.
T1518
SOFTWARE DISCOVERY
mustang panda has searched the victim system for the installutil.exe program and its version.
T1082
SYSTEM INFORMATION DISCOVERY
mustang panda has gathered system information using systeminfo.
T1016
SYSTEM NETWORK CONFIGURATION DISCOVERY
mustang panda has used ipconfig and arp to determine network configuration information.
T1049
SYSTEM NETWORK CONNECTIONS DISCOVERY
mustang panda has used netstat -ano to determine network connection information.
T1091
REPLICATION THROUGH REMOVABLE MEDIA
mustang panda has used a customized plugx variant which could spread through usb connections.
T1560.001
ARCHIVE COLLECTED DATA : ARCHIVE VIA UTILITY
mustang panda has used rar to create password-protected archives of collected documents prior to exfiltration.
T1560.003
ARCHIVE COLLECTED DATA : ARCHIVE VIA CUSTOM METHOD
mustang panda has encrypted documents with rc4 prior to exfiltration.
T1119
AUTOMATED COLLECTION
mustang panda used custom batch scripts to collect files automatically from a targeted system.
T1074.001
DATA STAGED : LOCAL DATA STAGING
mustang panda has stored collected credential files in c:\windows\temp prior to exfiltration. mustang panda has also stored documents for exfiltration in a hidden folder on usb drives.
T1071.001
APPLICATION LAYER PROTOCOL : WEB PROTOCOLS
mustang panda has communicated with its c2 via http post requests.
T1573.001
ENCRYPTED CHANNEL : SYMMETRIC CRYPTOGRAPHY
mustang panda has encrypted c2 communications with rc4.
T1105
INGRESS TOOL TRANSFER
mustang panda has downloaded additional executables following the initial infection stage.
T1219
REMOTE ACCESS SOFTWARE
mustang panda has installed teamviewer on targeted systems.
T1102
WEB SERVICE
mustang panda has used dropbox urls to deliver variants of plugx.
T1052.001
EXFILTRATION OVER PHYSICAL MEDIUM : EXFILTRATION OVER USB
mustang panda has used a customized plugx variant which could exfiltrate documents from air-gapped networks.