Breaking Down Mustang Panda's Windows Endpoint Campaign
Mustang Panda (active since at least 2017) continues to rely on classic but effective techniques in their espionage ops. Recent campaigns show heavy use of: masqueraded lnk files disguised as word docs or pdfs to trigger execution without macros msiexec abuse to drop and run payloads under a trusted binary dll side-loading into microsoft defender components for stealthy persistence registry run keys / scheduled tasks / services to survive reboots werfault.exe injection for privilege escalation...