Thursday, February 20, 2025
HomeCyber Security NewsEarth Preta APT Exploit Microsoft Utility Tool & Bypass AV Detection to...

Earth Preta APT Exploit Microsoft Utility Tool & Bypass AV Detection to Control Windows

Published on

SIEM as a Service

Follow Us on Google News

Researchers from Trend Micro’s Threat Hunting team have uncovered a sophisticated cyberattack campaign by the advanced persistent threat (APT) group Earth Preta, also known as Mustang Panda.

The group has been leveraging new techniques to infiltrate systems and evade detection, primarily targeting government entities in the Asia-Pacific region, including Taiwan, Vietnam, Malaysia, and Thailand.

Earth Preta employs a combination of spear-phishing emails and advanced malware to compromise windows systems.

The group uses the Microsoft Application Virtualization Injector (MAVInject.exe) to inject malicious payloads into legitimate Windows processes, such as waitfor.exe, particularly when ESET antivirus software is detected.

Earth Preta’s kill chain

This approach allows them to bypass security measures and maintain persistence on infected systems.

The attack chain begins with the execution of a malicious file (IRSetup.exe), which drops multiple filesnboth legitimate executables and malicious components into the system.

To distract victims, the attackers deploy a decoy PDF that appears to be an official document, such as one requesting cooperation on an anti-crime platform allegedly supported by government agencies.

 Decoy PDF (left) and translated text (right)

Malware Analysis

The core of Earth Preta’s operation involves a modified variant of the TONESHELL backdoor malware.

This backdoor is sideloaded using OriginLegacyCLI.exe, a legitimate Electronic Arts (EA) application, along with a malicious DLL (EACore.dll).

The malware communicates with a command-and-control (C&C) server at www[.]militarytc[.]com:443 for data exfiltration and remote operations.

Key capabilities of the malware include:

  • Reverse shell access
  • File deletion and movement
  • Persistent storage of victim identifiers for future exploitation

The malware also adapts its behavior based on the presence of ESET antivirus software.

If detected, it uses MAVInject.exe to inject code into running processes; otherwise, it employs alternative techniques like WriteProcessMemory and CreateRemoteThreadEx APIs for code injection.

Trend Micro attributes this campaign to Earth Preta with medium confidence based on shared tactics, techniques, and procedures (TTPs) observed in previous campaigns.

The group has been active since at least 2022 and has reportedly compromised over 200 victims during this period.

Their operations are characterized by their focus on government entities and their reliance on phishing as an initial attack vector.

This campaign underscores the evolving sophistication of APT groups like Earth Preta. By combining legitimate tools with custom malware, they can evade detection and infiltrate high-value targets.

Organizations in the Asia-Pacific region are particularly at risk and should remain vigilant against phishing attempts and ensure robust endpoint protection measures are in place.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti Endpoint Manager Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti Endpoint Manager Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...