Mustang Panda Uses Kernel Rootkit to Deploy TONESHELL in SEA

Mustang Panda deploys a signed kernel-mode minifilter rootkit to inject TONESHELL into svchost.exe, protect files/registry/processes, and connect to C2 over TCP/443 — detection requires memory forensics.

  • Mustang Panda used a signed kernel-mode minifilter driver to load a new TONESHELL backdoor in mid-2025.
  • The malicious driver protects files, processes, and registry keys and injects TONESHELL into a spawned svchost.exe.
  • TONESHELL connects to C2 domains over TCP port 443 and supports file transfer and a remote shell.
  • Detection requires memory forensics because key components execute in memory and the driver hides API usage and I/O operations.

Mustang Panda deployed a previously undocumented kernel-mode rootkit driver in an attack detected in mid-2025 against an entity in Asia, with campaigns targeting government organizations in Myanmar and Thailand, according to Kaspersky. The driver registers as a Microsoft.com/en-us/Windows-hardware/drivers/ifs/about-file-system-filter-drivers”>minifilter driver, a type of file system filter that sits in the I/O stack to monitor or modify file operations.

- Advertisement -

The driver binary, named “ProjectConfiguration.sys,” is signed with a certificate issued to Guangzhou Kingteller Technology Co., Ltd that was valid from 2012 to 2015. “The driver file is signed with an old, stolen, or leaked digital certificate,” the report stated.

The Malware bundles two user-mode shellcodes embedded in the .data section and injects a small delay shellcode and then the TONESHELL backdoor into the same spawned svchost.exe. “The rootkit functionality protects both the driver’s own module and the user-mode processes into which the backdoor code is injected,” researchers said.

Key driver capabilities include resolving kernel APIs by hashing, blocking file-delete and file-rename operations, denying access to protected registry keys via a RegistryCallback routine, and intercepting process operations for listed process IDs. The driver also alters the altitude used by filters (see allocated altitudes) to bypass lower-altitude antivirus filters.

The TONESHELL implant establishes a TCP connection to C2 domains (for example, avocadomechanism[.]com and potherbreference[.]com) over port 443. Commands include creating temporary files, downloading and uploading files, canceling transfers, establishing a remote shell, receiving operator commands, and closing the connection.

- Advertisement -

Researchers note this is the first observed use of a kernel-mode loader for TONESHELL, increasing stealth and resilience. Memory forensics is required to detect the in-memory shellcode and confirm infection.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Strategy shifts Bitcoin buy plan to focus on preferred stock

Strategy is shifting its capital strategy to fund Bitcoin purchases from common stock sales...

Apple Releases Updates for Exploited Zero-Day Flaw

Apple has released emergency security updates for all major platforms including iOS, macOS, and...

Ethereum Staking Hits New Record: 36.8M ETH Locked

Ethereum's staking ratio has reached a new all-time high, surpassing 30% of its total...

Hoskinson: Midnight Mainnet March, Not for ‘Privacy Maxis’

Cardano founder Charles Hoskinson dismissed targeting privacy-focused communities for Midnight's launch.The new privacy blockchain...

Intel Rebounds 2.5% on AI Bet, Earnings Beat

Intel stock jumped 2.5% to $48.29, rebounding from a recent sharp decline driven by...

Must Read

What Is a Sim Swap Hack?

You've likely heard the term 'sim-swap,' but do you really know what it means? It's a type of fraud that's rapidly increasing, where scammers...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!