Friday, May 9, 2025
Homecyber securityChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools

Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools

Published on

SIEM as a Service

Follow Us on Google News

The China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ new techniques and tools, including the updated backdoor ToneShell and a novel tool named StarProxy, to evade endpoint detection and response (EDR) systems.

Mustang Panda’s New Techniques

Mustang Panda, known for targeting government and military entities primarily in East Asia, has been found executing attacks from two machines within an organization in Myanmar.

The group’s tools are hosted on a staging server, showcasing their persistent activity in the region.

- Advertisement - Google News

The recent campaign focuses on deploying new variants of the backdoor ToneShell, which now incorporates changes in its command-and-control (C2) communication protocol.

Specifically, ToneShell employs a modified FakeTLS protocol, aiming to mimic the TLS handshake of secure internet traffic, thus blending malicious traffic with legitimate communications to evade detection.

Further examination by ThreatLabz revealed a tool termed StarProxy, which facilitates lateral movement within compromised networks.

Mustang Panda
High-level diagram of StarProxy activity.

This tool uses command-line arguments to specify the IP address and port for communication, leveraging the FakeTLS protocol to encrypt traffic between devices and their C2 servers.

StarProxy bundles with a legitimate and signed binary, IsoBurner.exe, and a malicious DLL, StarBurn.dll, which is invoked upon execution.

It ensures continuous beaconing to receive commands from the C2, encrypting all messages with a custom XOR-based algorithm, which uses hardcoded keys for encryption and decryption.

Key Takeaways

  • ToneShell Variants: New iterations of ToneShell feature different methods for generating client identifiers and use rolling XOR keys of varied sizes for network traffic encryption.
  • DLL Sideloading: All malicious payloads are packed in RAR archives alongside legitimate, signed binaries, exploiting DLL sideloading for execution.

Mustang Panda’s evolution in tactics, techniques, and procedures (TTPs) demonstrates their adaptability and sophistication in evading security measures like EDR.

This development highlights the need for organizations, particularly in target-rich environments, to enhance their detection capabilities and stay updated with evolving cyber threats.

As Mustang Panda continues to refine its tools and evasion strategies, cybersecurity professionals must remain vigilant and proactive in their defense mechanisms to combat such advanced persistent threats (APTs).

Indicators Of Compromise (IOCs)

Here are the key IOCs associated with Mustang Panda’s recent activities:

MD5 HashFilenameDescription
233214d22659aa85f32bb705812a0b22cf.rarRAR archive hosted on attacker’s server
b695a31ea90e61cc08da1837d836655alibcef.dllToneShell DLL
4fefc66a0f7e1b2ed8affc9c3ba66ec7mrender.exeLegitimate signed binary
91d8b31259d8602539fb6eaa0588d6521bf01299ccd8ed830abfe2ace7aea54dclient.rarRAR archive hosted on the server
c1d24a5cb1d57a91cf4a717425bd0d46b4436d14d7f4744fa8dfbb22609f57a8IsoBurner.exeLegitimate and signed binary
63aa30c452e4dc0aa2324ce891da1acfa90ce85476d2dd7ab85ff448f913af5eStarBurn.dllMalicious DLL – StarProxy

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...