Hogfarming.7z
: The file is primarily distributed via Spear Phishing emails. These emails often use topical lures related to regional geopolitics or government directives to entice victims into downloading and extracting the archive. Analysis of the Infection Chain
: Heavy reliance on .7z or .rar formats to hide malicious .exe and .dll pairings from basic email scanners. Mitigation Recommendations HogFarming.7z
: Educate staff on the risks of opening unexpected compressed archives, even if the sender appears legitimate. : The file is primarily distributed via Spear
: The infected system establishes an encrypted connection to a remote server to receive instructions and upload stolen data. Indicators of Compromise (IoCs) Mitigation Recommendations : Educate staff on the risks
Based on available threat intelligence and technical databases, is a compressed archive associated with malicious activity, specifically linked to Earth Preta (also known as Mustang Panda), a Chinese-based Advanced Persistent Threat (APT) group . This file has been identified as a delivery vehicle for malware in cyberespionage campaigns targeting government and research entities. Technical Overview
: Analysis suggests the archive often carries variants of the PlugX or ToneIns malware. PlugX is a modular Remote Access Trojan (RAT) used for data exfiltration, keystroke logging, and remote command execution.