Thursday, May 8, 2025
HomeCyber Security NewsEarth Preta APT Exploit Microsoft Utility Tool & Bypass AV Detection to...

Earth Preta APT Exploit Microsoft Utility Tool & Bypass AV Detection to Control Windows

Published on

SIEM as a Service

Follow Us on Google News

Researchers from Trend Micro’s Threat Hunting team have uncovered a sophisticated cyberattack campaign by the advanced persistent threat (APT) group Earth Preta, also known as Mustang Panda.

The group has been leveraging new techniques to infiltrate systems and evade detection, primarily targeting government entities in the Asia-Pacific region, including Taiwan, Vietnam, Malaysia, and Thailand.

Earth Preta employs a combination of spear-phishing emails and advanced malware to compromise windows systems.

- Advertisement - Google News

The group uses the Microsoft Application Virtualization Injector (MAVInject.exe) to inject malicious payloads into legitimate Windows processes, such as waitfor.exe, particularly when ESET antivirus software is detected.

Earth Preta’s kill chain

This approach allows them to bypass security measures and maintain persistence on infected systems.

The attack chain begins with the execution of a malicious file (IRSetup.exe), which drops multiple filesnboth legitimate executables and malicious components into the system.

To distract victims, the attackers deploy a decoy PDF that appears to be an official document, such as one requesting cooperation on an anti-crime platform allegedly supported by government agencies.

 Decoy PDF (left) and translated text (right)

Malware Analysis

The core of Earth Preta’s operation involves a modified variant of the TONESHELL backdoor malware.

This backdoor is sideloaded using OriginLegacyCLI.exe, a legitimate Electronic Arts (EA) application, along with a malicious DLL (EACore.dll).

The malware communicates with a command-and-control (C&C) server at www[.]militarytc[.]com:443 for data exfiltration and remote operations.

Key capabilities of the malware include:

  • Reverse shell access
  • File deletion and movement
  • Persistent storage of victim identifiers for future exploitation

The malware also adapts its behavior based on the presence of ESET antivirus software.

If detected, it uses MAVInject.exe to inject code into running processes; otherwise, it employs alternative techniques like WriteProcessMemory and CreateRemoteThreadEx APIs for code injection.

Trend Micro attributes this campaign to Earth Preta with medium confidence based on shared tactics, techniques, and procedures (TTPs) observed in previous campaigns.

The group has been active since at least 2022 and has reportedly compromised over 200 victims during this period.

Their operations are characterized by their focus on government entities and their reliance on phishing as an initial attack vector.

This campaign underscores the evolving sophistication of APT groups like Earth Preta. By combining legitimate tools with custom malware, they can evade detection and infiltrate high-value targets.

Organizations in the Asia-Pacific region are particularly at risk and should remain vigilant against phishing attempts and ensure robust endpoint protection measures are in place.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

LockBit Ransomware Group Breached: Internal Chats and Data Leaked Online

The notorious LockBit ransomware group, once considered one of the world’s most prolific cyber...

Cisco IOS XE Wireless Controllers Vulnerability Lets Attackers Seize Full Control

A critical security flaw has been discovered in Cisco IOS XE Wireless LAN Controllers...

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

LockBit Ransomware Group Breached: Internal Chats and Data Leaked Online

The notorious LockBit ransomware group, once considered one of the world’s most prolific cyber...

Cisco IOS XE Wireless Controllers Vulnerability Lets Attackers Seize Full Control

A critical security flaw has been discovered in Cisco IOS XE Wireless LAN Controllers...

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...