Cyber Security News

Earth Preta APT Exploit Microsoft Utility Tool & Bypass AV Detection to Control Windows

Researchers from Trend Micro’s Threat Hunting team have uncovered a sophisticated cyberattack campaign by the advanced persistent threat (APT) group Earth Preta, also known as Mustang Panda.

The group has been leveraging new techniques to infiltrate systems and evade detection, primarily targeting government entities in the Asia-Pacific region, including Taiwan, Vietnam, Malaysia, and Thailand.

Earth Preta employs a combination of spear-phishing emails and advanced malware to compromise windows systems.

The group uses the Microsoft Application Virtualization Injector (MAVInject.exe) to inject malicious payloads into legitimate Windows processes, such as waitfor.exe, particularly when ESET antivirus software is detected.

Earth Preta’s kill chain

This approach allows them to bypass security measures and maintain persistence on infected systems.

The attack chain begins with the execution of a malicious file (IRSetup.exe), which drops multiple filesnboth legitimate executables and malicious components into the system.

To distract victims, the attackers deploy a decoy PDF that appears to be an official document, such as one requesting cooperation on an anti-crime platform allegedly supported by government agencies.

Decoy PDF (left) and translated text (right)

Malware Analysis

The core of Earth Preta’s operation involves a modified variant of the TONESHELL backdoor malware.

This backdoor is sideloaded using OriginLegacyCLI.exe, a legitimate Electronic Arts (EA) application, along with a malicious DLL (EACore.dll).

The malware communicates with a command-and-control (C&C) server at www[.]militarytc[.]com:443 for data exfiltration and remote operations.

Key capabilities of the malware include:

  • Reverse shell access
  • File deletion and movement
  • Persistent storage of victim identifiers for future exploitation

The malware also adapts its behavior based on the presence of ESET antivirus software.

If detected, it uses MAVInject.exe to inject code into running processes; otherwise, it employs alternative techniques like WriteProcessMemory and CreateRemoteThreadEx APIs for code injection.

Trend Micro attributes this campaign to Earth Preta with medium confidence based on shared tactics, techniques, and procedures (TTPs) observed in previous campaigns.

The group has been active since at least 2022 and has reportedly compromised over 200 victims during this period.

Their operations are characterized by their focus on government entities and their reliance on phishing as an initial attack vector.

This campaign underscores the evolving sophistication of APT groups like Earth Preta. By combining legitimate tools with custom malware, they can evade detection and infiltrate high-value targets.

Organizations in the Asia-Pacific region are particularly at risk and should remain vigilant against phishing attempts and ensure robust endpoint protection measures are in place.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research and…

2 hours ago

PoC Exploit Released for Ivanti EPM Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could…

2 hours ago

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale.…

2 hours ago

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group…

2 hours ago

New Bookworm Malware Using SLL Sideloading Technique To Windows

Cybersecurity researchers from Palo Alto Networks' Unit 42 disclosed the resurgence of the Bookworm malware,…

3 hours ago

Fake Chrome Update Delivers DriverEasy Malware by Abusing Dropbox

A recent investigation has uncovered a malicious application, DriverEasy, masquerading as a legitimate Google Chrome…

3 hours ago