Mustang Panda Uses Signed Kernel Mode Rootkit to Load TONESHELL Backdoor

Cybersecurity researchers have uncovered a sophisticated attack by the Chinese threat actor Mustang Panda, which utilized a previously unknown kernel-mode rootkit driver to deploy the TONESHELL backdoor. The campaign, detected in mid-2025, primarily targeted government organizations in Southeast and East Asia, including Myanmar and Thailand.

According to Kaspersky, the malicious driver, named ProjectConfiguration.sys, is digitally signed using a certificate from Guangzhou Kingteller Technology Co., Ltd., likely obtained through theft or leakage. This kernel-mode minifilter driver is designed to inject backdoor code into system processes while protecting both malicious files and user-mode processes from detection or deletion.

kas

Attack Methodology and TONESHELL Deployment

The rootkit carries two embedded user-mode shellcodes executed as separate threads. The first payload spawns an svchost.exe process and injects a delay-inducing shellcode, while the second delivers the TONESHELL backdoor into the same process. Once active, TONESHELL establishes a TCP connection over port 443 to its command-and-control (C2) servers, including avocadomechanism[.]com and potherbreference[.]com. The malware allows operators to download, upload, cancel transfers, establish a remote shell, and execute commands, all while remaining stealthy.

Advanced Rootkit Capabilities

Kaspersky highlights that the driver employs advanced techniques to evade detection:

  • Dynamic resolution of kernel APIs using hashed addresses
  • Monitoring and preventing file deletion or renaming
  • Blocking access to protected registry keys via a RegistryCallback at altitude 330024+
  • Altering Microsoft Defender driver altitudes to bypass security filters
  • Intercepting process operations for protected process IDs, removing protections post-execution

These methods ensure the malicious driver operates below legitimate antivirus and security layers, making detection extremely challenging.

Significance of Kernel-Mode Delivery

The deployment of TONESHELL through a signed kernel-mode loader marks a notable escalation in Mustang Panda’s operations. Memory forensics is critical for identifying the injected shellcode, as the backdoor executes entirely in memory. Researchers emphasize that the combination of kernel-mode protection, obfuscation, and multi-stage injection significantly enhances the stealth and resilience of the malware, allowing prolonged persistence in targeted systems.

Kaspersky concludes that Mustang Panda’s 2025 campaigns demonstrate a clear evolution toward using kernel-mode injectors for backdoor deployment, signaling increased sophistication in cyber espionage tools.


Found this article interesting? Follow us on  X (Twitter) , Facebook, Blue sky and LinkedIn to read more exclusive content we post.