The China-linked cyber-espionage group Mustang Panda (also known as HoneyMyte or Earth Preta) has incorporated a new, sophisticated tool into its arsenal: a kernel-mode rootkit used to stealthily load its TONESHELL backdoor. According to research from Kaspersky, the rootkit is a driver file named ProjectConfiguration.sys that has been signed with a valid, albeit leaked, digital certificate from a Chinese ATM provider. This allows it to load into the Windows kernel without raising alarms. Once active, the rootkit functions as a minifilter driver, giving it the power to hide the presence of the TONESHELL malware from security tools and investigators. This marks a significant evolution in the group's tradecraft, enabling deeper, more persistent, and harder-to-detect intrusions into target networks, primarily government entities in Southeast Asia.
Mustang Panda is a well-known APT group with a history of targeting government, non-profit, and other strategic organizations, particularly in Asia. This latest campaign, observed in mid-2025, demonstrates a clear investment in enhancing their operational security and stealth.
ProjectConfiguration.sys) that provides stealth and persistence.TONESHELL backdoor, a known malware used by the group for reverse shell and downloader capabilities.The core of this new TTP is the use of a signed rootkit to achieve unparalleled stealth.
ProjectConfiguration.sys is dropped and loaded onto the system. It is signed with a leaked certificate from Guangzhou Kingteller Technology Co., Ltd., which allows it to bypass Windows driver signature enforcement.T1014 - Rootkit). This gives it high-level privileges and the ability to intercept and modify system operations.TONESHELL backdoor's files, processes, and registry keys, making them invisible to user-mode applications like Task Manager, File Explorer, and most endpoint security products.TONESHELL shellcode directly into the memory of a legitimate system process, such as svchost.exe (T1055 - Process Injection). This in-memory execution further evades disk-based scanning.TONESHELL backdoor then establishes a reverse shell to an attacker-controlled C2 server, allowing for remote access and the downloading of additional malware.| Tactic | Technique ID | Name | Description |
|---|---|---|---|
| Defense Evasion, Persistence | T1014 |
Rootkit | A kernel-mode rootkit is used to hide malicious activities and maintain persistence. |
| Defense Evasion | T1574.006 |
Hijack Execution Flow: Dynamic-link Library Hijacking | The use of a signed driver to load malicious code into the kernel. (Note: This is a conceptual fit, T1014 is more precise). |
| Defense Evasion | T1055 |
Process Injection | TONESHELL shellcode is injected into the legitimate svchost.exe process. |
| Execution | T1059.003 |
Command and Scripting Interpreter: Windows Command Shell | TONESHELL provides a reverse shell for executing commands. |
| Command and Control | T1071.001 |
Application Layer Protocol: Web Protocols | TONESHELL likely uses standard protocols like HTTP/S for C2 communications. |
The use of a signed kernel-mode rootkit represents a significant escalation in Mustang Panda's capabilities. This technique makes detection extremely difficult, allowing the threat actor to maintain long-term, undetected access to highly sensitive government networks. This level of persistence enables deep espionage, exfiltration of state secrets, and the potential to use the compromised networks as a launchpad for future attacks. The abuse of a legitimate digital certificate also erodes trust in the code-signing ecosystem.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| file_name | ProjectConfiguration.sys |
The name of the malicious rootkit driver file. | Endpoint file system scanning. | high |
| certificate_subject | Guangzhou Kingteller Technology Co., Ltd. |
The subject of the leaked digital certificate used to sign the driver. | Driver signature verification tools, code signing logs. | high |
| process_name | svchost.exe |
Legitimate process making anomalous outbound network connections to unknown IPs. | EDR telemetry, NetFlow analysis. | medium |
TONESHELL code within svchost.exe or other processes. This aligns with D3FEND's D3-DA: Dynamic Analysis.ProjectConfiguration.sys or any drivers signed by Guangzhou Kingteller Technology Co., Ltd. that are not expected in your environment.D3-NTA: Network Traffic Analysis.D3-DLIC: Driver Load Integrity Checking.Mustang Panda (HoneyMyte) expands campaign with updated CoolClient backdoor, new browser data stealers, and continued use of kernel-mode rootkits targeting Asian governments.
Use driver blocklisting to prevent the loading of drivers signed by the compromised certificate or with a known malicious hash.
Mapped D3FEND Techniques:
Use advanced endpoint protection that includes memory scanning to detect injected shellcode and other in-memory threats.
Enable Secure Boot to help ensure the integrity of the boot process and prevent loading of unauthorized kernel-level drivers.
Mapped D3FEND Techniques:
To counter the threat of a signed rootkit like ProjectConfiguration.sys, organizations should implement strict driver load policies. While the driver is signed, the certificate from Guangzhou Kingteller Technology Co., Ltd. is now known to be compromised. Using application control solutions like Windows Defender Application Control (WDAC) or AppLocker, administrators can create rules to explicitly block any driver signed by this specific certificate or with the known hash of the malicious driver. This moves beyond simple signature validation to an intelligence-led blocklisting approach. This policy should be deployed across all endpoints, especially servers and systems holding sensitive data, to prevent the rootkit from ever being loaded into the kernel.
Detecting kernel-level threats requires capabilities beyond traditional file-based scanning. Security teams must employ tools that perform dynamic analysis of system memory. EDR solutions with memory scanning features or dedicated memory forensics tools can be used to hunt for anomalies. Specifically for this threat, analysts should look for evidence of process injection into svchost.exe. This includes examining the memory segments of svchost.exe instances for executable code that doesn't map to a known, legitimate DLL on disk. A mismatch between the in-memory code and the on-disk binary is a strong indicator of injection. This technique is resource-intensive but is one of the few effective ways to uncover threats that are actively hiding from the operating system itself.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats