LuminousMoth

Threat Actor updated 4 months ago (2024-05-04T22:18:04.567Z)
Download STIX
Preview STIX
LuminousMoth is a threat actor with ties to HoneyMyte, as evidenced by their similar targeting and Tactics, Techniques, and Procedures (TTPs). These include the use of DLL side-loading, Cobalt Strike loaders, and Chrome cookie stealers. The malware's operation begins with the execution of "explorer.exe" to reveal the victim's hidden directory, followed by the copying of four LuminousMoth samples to a specific system path. The malware then propagates itself to removable drives connected to the system, indicating a high rate of infections due to this spreading mechanism. This propagation branch is activated in the context of a compromised removable drive when "USB Driver.exe" is double-clicked. Links between LuminousMoth and Mustang Panda are suggested through shared resources such as the malicious URL http://microsoft.updatecatalogs[.]com/Microsoft Update Catalog.htm and the IP address 2.58.230.5, which resolves to the domain mmtimes.org. This domain was previously associated with Mustang Panda operations. The LuminousMoth campaign deploys various tools for data collection and exfiltration, including the well-known Remote Access Tool PlugX and ARP spoofing for HTML code injection. These techniques redirect victims to a page hosted by the threat actor. The LuminousMoth activity cluster, previously unknown, is affiliated with a Chinese-speaking actor and has been linked to HoneyMyte with medium to high confidence based on these findings. Infrastructure overlaps were found between the Command and Control (C2) servers used in the LuminousMoth campaign and an older one attributed to HoneyMyte. Additionally, there are numerous similarities between resources used by LuminousMoth and those observed in previous HoneyMyte activities, suggesting a persistent and evolving threat landscape.
Description last updated: 2024-05-04T21:39:57.312Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Mustang Panda
4
Mustang Panda, also known as Bronze President, Nomad Panda, Naikon, Earth Preta, and Stately Taurus, is a Chinese-aligned threat actor that has been associated with widespread attacks against various countries in the Asia-Pacific region. The group's malicious activities were first traced back to Mar
Camaro Dragon
3
Camaro Dragon, a Chinese state-sponsored threat actor also known as Stately Taurus, Mustang Panda, Bronze President, Red Delta, Luminous Moth, and Earth Preta, has been active since at least 2012. In 2023, Checkpoint Research discovered a custom firmware image linked to Camaro Dragon that contained
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Espionage
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the LuminousMoth Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
9 months ago
LuminousMoth – PlugX, File Exfiltration and Persistence Revisited
MITRE
9 months ago
LuminousMoth APT: Sweeping attacks for the chosen few
CERT-EU
a year ago
Chinese state-backed hackers accidentally infected a European hospital with malware | #ukscams | #datingscams | #european | #datingscams | #love | #relationships | #scams | #pof | #match.com | #dating | National Cyber Security Consulting
CERT-EU
a year ago
Chinese state-backed hackers accidentally infected a European hospital with malware | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
InfoSecurity-magazine
a year ago
USB Drives Used as Trojan Horses By Camaro Dragon
Checkpoint
a year ago
Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives - Check Point Research
CERT-EU
a year ago
Camaro Dragon spreading self-propagating malware through USB drives
CERT-EU
a year ago
Camaro Dragon Hackers Strike with USB-Driven Self-Propagating Malware
CERT-EU
a year ago
Chinese Espionage Malware Targets European Healthcare via USB Drives