Mustang Panda
mustang-panda · primary source: MITRE · first observed 2013
CN · ChinaState-sponsoredModerate confidencelast cited Nov 17, 2022 · 4y ago
PRC state-aligned intrusion set focused on espionage against European government and NGO targets, Southeast Asian government and military targets (especially around the South China Sea), Mongolia, Taiwan, and Tibetan and Uyghur diaspora communities. Heavy use of trojanized RAR/PlugX-laden archives as the primary first-stage delivery.
Aliases
Bronze PresidentOtherHoneyMyteOtherEarth PretaOtherRedDeltaOtherTWILL TYPHOONMicrosoft
Motivations
espionage
Target sectors
governmentngodefensediplomaticdissidents
Target countries
MMVNMNPHTHKHTWDEGBBE
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Tools & malware
2 entriesTimeline
1 eventIndicators of compromise
3 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| IPv4 | family · PlugX PlugX USB-worm command-and-control IP attributed to Mustang Panda. Sinkholed by Sekoia in September 2023 (the address had lapsed and was re-registered for USD 7). This is the same C2 the FBI/DOJ used for the court-authorized self-delete operation that cleaned ~4,258 U.S. hosts (announced Jan 2025). | Aug 31, 2023 | Sekoia.io |
| SHA-256 | family · PlugX SHA-256 of the malicious `wsc.dll` PlugX loader from the border-hopping USB-worm variant attributed by Sophos X-Ops to PKPLUG / Mustang Panda. Listed in the IOC table of the March 2023 Sophos News disclosure and re-confirmed by Sekoia's September 2023 sinkholing report. | Mar 8, 2023 | Sophos X-Ops |
| SHA-256 | family · PlugX SHA-256 of `AvastSvc.exe`, the legitimate Avast binary abused for DLL side-loading by the Mustang Panda PlugX USB worm. Listed alongside the malicious DLL in the Sophos IOC table; drops the side-load triad into `%userprofile%/AvastSvcpCP/`. | Mar 8, 2023 | Sophos X-Ops |
Related actors
shared ATT&CK techniques- RU · RussiaGamaredon4 shared techniques
- CN · ChinaNaikon4 shared techniques
- IR · IranAPT393 shared techniques
- KP · DPRKLazarus Group3 shared techniques
- KP · DPRKAPT372 shared techniques
- CN · ChinaAPT412 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). Mustang Panda — actor profile. Retrieved from https://threatintel.local/actors/mustang-panda
latest cited activity · 2022-11-18 · 3 cataloged indicators