Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

MISTPEN (Backdoor) – Malware

March 1, 2025
Reading Time: 4 mins read
in Malware
MISTPEN (Backdoor) – Malware

MISTPEN

Type of Malware

Backdoor

Country of Origin

North Korea

Targeted Countries

United States

Date of Initial Activity

2024

Associated Groups

UNC2970

Motivation

Cyberwarfare

Attack Vectors

Phishing

Targeted Systems

Windows

Overview

MISTPEN is a sophisticated backdoor malware recently discovered by Mandiant during an investigation into a cyber espionage campaign attributed to the North Korea-linked threat group UNC2970. This malware was delivered through a trojanized version of the open-source SumatraPDF viewer, hidden within a malicious ZIP archive disguised as a job opportunity document. Targeting professionals in critical U.S. infrastructure sectors, including energy and aerospace, MISTPEN leverages advanced techniques to gain persistence, evade detection, and exfiltrate sensitive data from compromised systems. At its core, MISTPEN operates as a stealthy backdoor, deployed via DLL hijacking techniques facilitated by a modified version of libmupdf.dll. When an unsuspecting victim opens the malicious PDF file with the bundled PDF viewer, MISTPEN decrypts and executes its payload in memory, allowing attackers to maintain covert access to the infected system. The malware employs encryption mechanisms, such as ChaCha20, to protect its payload and communication channels, ensuring that its activities remain hidden from traditional security tools.

Targets

Public Administration Information Individuals

How they operate

At the core of MISTPEN’s delivery mechanism lies a malicious ZIP archive containing an encrypted PDF lure, a modified libmupdf.dll, and the legitimate SumatraPDF.exe binary. When the victim attempts to open the PDF lure using the trojanized viewer, the compromised libmupdf.dll is loaded into memory, serving as the initial stage of the infection. This DLL decrypts the payload embedded in the PDF file using ChaCha20 encryption, ensuring both confidentiality and stealth during the decryption process. Simultaneously, the DLL loads a secondary encrypted payload into memory, identified as MISTPEN, and writes it to a hidden file named thumbs.ini. The malware establishes persistence through DLL search-order hijacking and scheduled tasks. It creates a task named Sumatra Launcher that executes daily using the legitimate Windows binary BdeUISrv.exe. This binary sidesteps traditional antivirus detection by leveraging the trust associated with signed Windows components. Once persistence is achieved, MISTPEN operates as a fully functional backdoor, allowing remote attackers to execute commands, manipulate files, and exfiltrate data. Its reliance on encrypted communication channels ensures that data transfers and instructions from the C2 server remain hidden from network monitoring tools. MISTPEN’s ability to operate covertly is further reinforced by its modular design. The malware can dynamically load additional payloads as instructed by its operators, providing flexibility for specific objectives such as lateral movement, credential harvesting, or deploying secondary malware. Furthermore, its use of memory-only execution minimizes traces on disk, complicating forensic analysis. These features indicate a deliberate focus on evasion and operational longevity, hallmarks of advanced persistent threat (APT) campaigns. The discovery of MISTPEN underscores the growing trend of repurposing open-source tools as delivery mechanisms for advanced malware. By exploiting trust in widely used software, attackers can bypass traditional security defenses and gain access to high-value targets. Defending against such threats requires a combination of robust endpoint protection, proactive monitoring, and heightened user awareness to detect and respond to these increasingly stealthy cyber espionage campaigns. As MISTPEN continues to evolve, its technical sophistication serves as a stark reminder of the capabilities wielded by state-sponsored threat actors in modern cyber warfare.

MITRE Tactics and Techniques

1. Initial Access (TA0001)
Phishing (T1566.002) The malware is delivered via phishing lures, including malicious job description PDFs sent through email and WhatsApp. User Execution (T1204.002) Victims are socially engineered into opening a trojanized PDF reader (SumatraPDF) bundled with the malicious ZIP archive.
2. Execution (TA0002)
Signed Binary Proxy Execution (T1218) The malware abuses BdeUISrv.exe, a legitimate Windows binary, to execute malicious code via DLL search-order hijacking. Command and Scripting Interpreter (T1059.001) Embedded scripts and encrypted payloads are executed in memory after decryption.
3. Persistence (TA0003)
Scheduled Task/Job (T1053.005) The malware creates a scheduled task named Sumatra Launcher to ensure daily execution of the malicious payload. DLL Search Order Hijacking (T1574.001) The malicious libmupdf.dll ensures that the MISTPEN payload is executed whenever SumatraPDF.exe runs.
4. Defense Evasion (TA0005)
Obfuscated Files or Information (T1027) The malware encrypts payloads using ChaCha20 encryption to evade detection during file inspection. Signed Binary Proxy Execution (T1218) Legitimate binaries are leveraged to execute malicious code and minimize suspicion. Deobfuscate/Decode Files or Information (T1140) Encrypted backdoor payloads are decrypted in memory before execution.
5. Credential Access (TA0006)
OS Credential Dumping (T1003) The malware may attempt to extract cached credentials from the infected system for further exploitation.
6. Discovery (TA0007)
System Information Discovery (T1082) The malware gathers details about the infected host, including OS version, user privileges, and hardware configuration. File and Directory Discovery (T1083) MISTPEN searches directories and files for sensitive data or further exploitation opportunities.
7. Command and Control (TA0011)
Encrypted Channel (T1573.001) Communication between the malware and the command-and-control server is encrypted to prevent interception. Remote Access Software (T1219) The malware provides the attacker with remote access capabilities to control the infected system. Ingress Tool Transfer (T1105) MISTPEN can download and execute additional payloads or tools as instructed by the C2 server.
8. Exfiltration (TA0010)
Exfiltration Over C2 Channel (T1041) The malware exfiltrates sensitive data over its encrypted command-and-control channel. Automated Exfiltration (T1020) Data is automatically collected and transferred without requiring manual attacker intervention.  
References
  • An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader
Tags: BackdoorsChaCha20GovernmentMalwareMandiantMISTPENNorth KoreaSumatraPDFUNC2970United States
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial