Hogfarming.7z <Premium Quality>
: The infected system establishes an encrypted connection to a remote server to receive instructions and upload stolen data. Indicators of Compromise (IoCs)
: Government agencies, NGOs, and telecommunications sectors in Southeast Asia and Europe.
: Heavy reliance on .7z or .rar formats to hide malicious .exe and .dll pairings from basic email scanners. Mitigation Recommendations HogFarming.7z
Based on available threat intelligence and technical databases, is a compressed archive associated with malicious activity, specifically linked to Earth Preta (also known as Mustang Panda), a Chinese-based Advanced Persistent Threat (APT) group . This file has been identified as a delivery vehicle for malware in cyberespionage campaigns targeting government and research entities. Technical Overview
: Analysis suggests the archive often carries variants of the PlugX or ToneIns malware. PlugX is a modular Remote Access Trojan (RAT) used for data exfiltration, keystroke logging, and remote command execution. : The infected system establishes an encrypted connection
: Once the user extracts "HogFarming.7z", they find what appears to be a legitimate document or application.
: Add "HogFarming.7z" and similar suspicious archive names to email and web filter blocklists. PlugX is a modular Remote Access Trojan (RAT)
: Launching the primary file triggers the sideloading of a malicious component (often disguised as a library like MpsSvc.dll or similar).