
Between November 2022 and November 2024, Evasive Panda launched a highly sophisticated and prolonged cyber espionage campaign. The scope of the attack spanned multiple industries across several countries, with Turkey, China, and India as primary targets. Evasive Panda—also tracked as Bronze Highland, Daggerfly, and StormBamboo—has been notorious since 2012 for its advanced tactics, continuously optimizing its tools and techniques to evade detection and maintain long-term persistence within victim systems.
Evasive Panda has launched numerous global attacks over the past several years. In this latest campaign, the actor masqueraded as several widely used services in China, such as Sohu, iQIYI, and Tencent, indicating that the Chinese public was a major target. This operation also involves detecting the version numbers of victim hosts. Past research has revealed that Evasive Panda utilizes two distinct implants: MgBot for Windows and Macma for macOS; it can be inferred that they carry out customized attacks tailored to different operating system versions. Furthermore, most victims remained under the attacker's control for over a year post-infection, demonstrating the actor's capability for long-term espionage and remote command-and-control.
This campaign utilized a precise Adversary-in-the-Middle (AitM) attack, intercepting legitimate software update requests through DNS poisoning and redirecting them to attacker-controlled servers. By combining stealthy loaders with trojanized update files carrying the MgBot backdoor implant, the attackers successfully compromised the update mechanisms of several popular Chinese applications, including SohuVA, iQIYI Video, IObit Smart Defrag, and Tencent QQ. By disguising the intrusion as routine software maintenance, attackers could infiltrate victim systems and significantly increase the infection success rate while minimizing suspicion.
The malware features a highly complex infrastructure: the attackers developed a brand-new loader employing a multi-stage shellcode execution flow, a hybrid encryption mechanism combining the Microsoft Data Protection API (DPAPI) with RC5 encryption, and dynamic runtime API resolution. These features not only drastically increase the difficulty of reverse engineering and forensic analysis but also allow the malware to tailor specific payloads for each individual victim, enhancing both stealth and resilience. Additionally, the MgBot implant utilizes DLL side-loading to inject into legitimate, signed system processes (such as svchost.exe), allowing it to operate entirely in-memory and evade detection by traditional security solutions.
This chapter provides an in-depth analysis of the technical details of the Evasive Panda APT campaign, offering a comprehensive explanation of its root causes and the tactics employed by the threat actor. Through the lens of the MITRE ATT&CK framework, we examine each stage of the attack lifecycle.
Reconnaissance
The Evasive Panda group begins with targeted reconnaissance to gather critical information regarding the victim's infrastructure. The core technique in this phase is DNS Poisoning: by manipulating DNS responses, requests originally destined for legitimate software update services (such as SohuVA and dictionary.com) are redirected to attacker-controlled servers. This allows the attackers to observe network traffic patterns and software versions, gaining situational awareness to customize subsequent malicious payloads.
Initial Access
The attackers gain an initial foothold through trojanized software updates targeting popular Chinese applications, including SohuVA, iQIYI Video, IObit Smart Defrag, and Tencent QQ. Attackers distribute executables disguised as legitimate update packages (e.g., sohuva_update_10.2.29.1-lup-s-tp.exe). These files are either delivered directly to victims or transmitted via the C2 infrastructure after redirecting original update requests through DNS poisoning.
Execution
Once delivered, the malware initiates a multi-stage loader architecture developed using C++ and the Windows Template Library (WTL). The loader first decrypts an encrypted configuration buffer using a custom XOR algorithm, then decompresses the core payload, which is compressed using LZMA.
The execution flow varies depending on the privileges of the logged-in user:
The loader also decrypts critical API function names (such as kernel32.dll and VirtualProtect) at runtime to dynamically and stealthily resolve Windows API addresses. The decrypted shellcode (approximately 9,556 bytes) is injected into the loader's .data section. Since this section is non-executable by default, the malware uses VirtualProtect to mark it as executable, enabling in-memory execution and bypassing many static and behavioral detection mechanisms.
Persistence
The threat actor achieves persistence via DLL Side-Loading. Attackers utilize a secondary loader disguised as libpython2.4.dll (originally a legitimate Windows library). A signed but obsolete executable (evteng.exe, a legitimate Python wrapper) is used to load this malicious DLL, allowing the attacker to execute malicious code under the guise of a trusted process.
Defense Evasion
The attackers employ several highly sophisticated evasion mechanisms:
Discovery
The malware probes the victim's environment using the RtlGetVersion API to query the current username and Windows OS version. This information is embedded in the HTTP headers sent to the attacker-controlled server, enabling the threat actor to tailor the attack payload based on the victim’s specific operating system and user context.
Command and Control (C2)
Command and control is maintained through multiple hardcoded IP addresses and domains stored within the decrypted configuration files. The malware utilizes stealthy communication via HTTP requests that mimic legitimate traffic, often disguising malicious payloads as seemingly harmless files, such as PNG images.
Network Security
Endpoint Protection
User Awareness and Training
FilePaths
C:\ProgramData\Microsoft\MF
C:\ProgramData\Microsoft\eHome\status.dat
C:\ProgramData\Microsoft\eHome\perf.dat
URLs andIPs
MgBot C2
60.28.124[.]21
123.139.57[.]103
140.205.220[.]98
112.80.248[.]27
116.213.178[.]11
60.29.226[.]181
58.68.255[.]45
61.135.185[.]29
103.27.110[.]232
117.121.133[.]33
139.84.170[.]230
AitM C2
103.96.130[.]107
158.247.214[.]28
106.126.3[.]78
106.126.3[.]56
CyCraft is a cybersecurity company founded in 2017, focusing on autonomous AI technology. Headquartered in Taiwan, it has subsidiaries in Japan and Singapore. CyCraft provides professional cybersecurity services to government agencies, police and defense forces, banks, and high-tech manufacturers throughout the Asia-Pacific region. It has received strong backing from the CID Group and Pavilion Capital, a Temasek Holdings Private Limited subsidiary.