: The malware modifies registry keys or creates scheduled tasks to ensure it remains active after system reboots.
: Government agencies, NGOs, and telecommunications sectors in Southeast Asia and Europe. HogFarming.7z
: The file is primarily distributed via Spear Phishing emails. These emails often use topical lures related to regional geopolitics or government directives to entice victims into downloading and extracting the archive. Analysis of the Infection Chain : The malware modifies registry keys or creates
: Deploy EDR (Endpoint Detection and Response) solutions to monitor for unusual DLL loading behavior from legitimate system binaries. These emails often use topical lures related to
: Analysis suggests the archive often carries variants of the PlugX or ToneIns malware. PlugX is a modular Remote Access Trojan (RAT) used for data exfiltration, keystroke logging, and remote command execution.
: It is frequently utilized in campaigns that leverage DLL Side-Loading techniques. In these scenarios, a legitimate, digitally signed executable is bundled with a malicious DLL that the executable is forced to load.