Mustang Panda Uses Kernel Rootkit to Deploy TONESHELL in SEA

Mustang Panda deploys a signed kernel-mode minifilter rootkit to inject TONESHELL into svchost.exe, protect files/registry/processes, and connect to C2 over TCP/443 — detection requires memory forensics.

  • Mustang Panda used a signed kernel-mode minifilter driver to load a new TONESHELL backdoor in mid-2025.
  • The malicious driver protects files, processes, and registry keys and injects TONESHELL into a spawned svchost.exe.
  • TONESHELL connects to C2 domains over TCP port 443 and supports file transfer and a remote shell.
  • Detection requires memory forensics because key components execute in memory and the driver hides API usage and I/O operations.

Mustang Panda deployed a previously undocumented kernel-mode rootkit driver in an attack detected in mid-2025 against an entity in Asia, with campaigns targeting government organizations in Myanmar and Thailand, according to Kaspersky. The driver registers as a Microsoft.com/en-us/Windows-hardware/drivers/ifs/about-file-system-filter-drivers”>minifilter driver, a type of file system filter that sits in the I/O stack to monitor or modify file operations.

- Advertisement -

The driver binary, named “ProjectConfiguration.sys,” is signed with a certificate issued to Guangzhou Kingteller Technology Co., Ltd that was valid from 2012 to 2015. “The driver file is signed with an old, stolen, or leaked digital certificate,” the report stated.

The Malware bundles two user-mode shellcodes embedded in the .data section and injects a small delay shellcode and then the TONESHELL backdoor into the same spawned svchost.exe. “The rootkit functionality protects both the driver’s own module and the user-mode processes into which the backdoor code is injected,” researchers said.

Key driver capabilities include resolving kernel APIs by hashing, blocking file-delete and file-rename operations, denying access to protected registry keys via a RegistryCallback routine, and intercepting process operations for listed process IDs. The driver also alters the altitude used by filters (see allocated altitudes) to bypass lower-altitude antivirus filters.

The TONESHELL implant establishes a TCP connection to C2 domains (for example, avocadomechanism[.]com and potherbreference[.]com) over port 443. Commands include creating temporary files, downloading and uploading files, canceling transfers, establishing a remote shell, receiving operator commands, and closing the connection.

- Advertisement -

Researchers note this is the first observed use of a kernel-mode loader for TONESHELL, increasing stealth and resilience. Memory forensics is required to detect the in-memory shellcode and confirm infection.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Crypto Stocks Surge After Trump Backs Bitcoin Bill

Coinbase stock surged over 15% after former President Donald Trump expressed support for a...

Kraken Gets Fed Master Account, Banks Cry Foul

Kraken secured a Federal Reserve master account on Wednesday, becoming the first crypto bank...

Palihapitiya: Bitcoin’s Public Ledger A “Structural Failing”

Billionaire investor Chamath Palihapitiya argues Bitcoin has a "structural failing" in fungibility and privacy,...

Justin Sun’s Rednote Account Banned Amid Stock Drop

Tron founder Justin Sun has been banned from Rednote (Xiaohongshu), losing his last major...

BTC Death Cross Looms: Bullish Catalyst Needed to Save Rally

Bitcoin's price rally this week is confronting a stern technical warning that the broader...

Must Read

What is Moon Tropica (CAH) – Technology, Tokenomics, Game Preview

Gaming enthusiasts and crypto enthusiasts, hHave you heard about Moon Tropica? If you're longing for that nostalgic feel of classic games from your childhood...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!