Vicious Panda: a new malware campaign exploiting coronavirus

Recently, Check Point researchers have detected malware for Windows that uses the coronavirus (COVID-19) to infect its victims. This malware campaign has been dubbed 'Vicious Panda', and its main objective is the public sector in Mongolia.

Investigation has revealed previous attacks carried out by the same group that is behind the 'Vicious Panda' campaign. These attacks were carried out in 2016 with targets from different sectors in different countries, such as Ukraine, Russia and Belarus.

'Vicious Panda' uses false RTF documents about coronavirus that, when opened in Microsoft Word, exploit the vulnerabilities of the equation editor and execute the malware's initial payload.


The ultimate goal is to infect the system with a Remote Access Trojan (RAT). Once installed on the victim's computer, this Trojan will give the attacker full remote access, allowing them to access files, passwords, etc., present in the affected system.


The computer infection process is carried out thanks to the vulnerabilities (CVE-2017-11882, CVE-2018-0798) existing in the Microsoft Word equation editor. To achieve infection, an RTF file is sent to victims from the Mongolian public sector that allegedly contains information on a topic of interest. In this campaign, the chosen topic of interest was COVID-19, popularly known as Coronavirus.

This file is specially designed by attackers to exploit the aforementioned vulnerabilities, and once it has done so, the initial malware payload is executed. This payload is in charge of creating a file called 'intel.wll' in the directory %APPDATA%\Microsoft\Word\STARTUP.

Adding a malicious file to Word's home directory is a persistence technique, which allows malware to run every time a Microsoft Word document is opened. The extension '.wll' indicates that this file is a DLL that must be executed when opening a document.

The main objective of 'intel.wll' is to download a new encrypted malicious DLL from the control server. This DLL is responsible for loading the actual malicious payload developed by the attackers. Its name is 'minisdllpub.dll' and it is executed using the Rundll32 binary.


The downloaded DLL, 'minisdllpub.dll', acts as 'loader', which initially downloads the final malicious module of the RAT and then runs it. The RAT’s final module is given the name 'mdll.dll'.

The functioning of the DLL that acts as a 'loader' means the malware's functionality can be updated by attackers, or even that new DLLs that expand the initial functionality can be downloaded, making this Trojan able to work with a plugin-based structure, where each plugin is a DLL that can execute different functionality.

The system's remote control module allows attackers to:

  • Take screenshots
  • Get a list of files and directories
  • Create and delete directories
  • Move and delete files
  • Download files
  • Run new processes
  • Get a list of configured services

First of all, 'minisdllpub.dll' creates a mutex named 'Afx:DV3ControlHost'. This allows it to detect if this module is already running, thus preventing multiple instances of the malware from running. This string, used as the name of the mutex, is interesting for the detection of new samples.

Strings used to resolve Windows API functions

In addition, the library that acts as a 'loader' dynamically loads the libraries it needs and stores the pointers to the Windows API functions it needs in its own structure. This makes analysis difficult, since we will not have direct references to the Windows APIs that it uses, nor will we be able to know what they are until we run the sample.

It then connects to the control server and downloads the DLL that executes the RAT. This DLL is encrypted, so it is decrypted after download using the XOR operation and the key present among the text strings.

XOR decryption key

The downloaded and encrypted malicious DLL and its decrypted version are stored in '%APPDATA\Microsoft\', in different files with the extension '.tmp', as can be seen in the following image.


Code that prepares the paths in which the malicious DLL is downloaded and decrypted

After the malicious DLL loads the malware continues to run, waiting for commands provided by the control server that allow attackers to steal interesting information from the infected system.


As we can see, the use of current affairs is often exploited by attackers to get victims to open and execute their spam campaign files. In this case, criminals have used the topic of the moment, the coronavirus pandemic, which is a topic of interest around the world today.

We are dealing with a RAT-type Trojan that provides remote access to attackers. They can take screenshots, access files stored on the system and download files, which means it gives them almost complete control over the infected system. Although functionalities that steal banking or other credentials are not included in this case, that type of functionality can be added at any time. As we have seen, this malware works using DLLs, so all it needs is to add a new DLL that implements 'banker' functionalities. They could even be added in the DLL that implements the RAT functionalities.

But it is not only that this specific malware could evolve into a 'banker'; other Trojans, if they are banking Trojans, could use the strategy of this RAT to infect their victims. In fact, a significant portion of banking malware is distributed through SPAM email campaigns, and they routinely use popular and interesting topics to increase their chances of success.

We must be very wary of the emails we receive and avoid opening attachments. This is even more true now, when we are working from home and receiving a significant number of emails.


Control servers:

  • 95.179.242[.]6
  • 95.179.242[.]27
  • 199.247.25[.]102
  • 95.179.210[.]61
  • 95.179.156[.]97
  • dw.adyboh[.]com
  • wy.adyboh[.]com
  • feb.kkooppt[.]com
  • compdate.my03[.]com
  • jocoly.esvnpe[.]com
  • bmy.hqoohoa[.]com
  • bur.vueleslie[.]com
  • wind.windmilldrops[.]com


RTF files:

  • 234a10e432e0939820b2f40bf612eda9229db720
  • 751155c42e01837f0b17e3b8615be2a9189c997a
  • ae042ec91ac661fdc0230bdddaafdc386fb442a3
  • d7f69f7bd7fc96d842fcac054e8768fd1ecaa88a
  • dba2fa756263549948fac6935911c3e0d4d1fa1f


  • 0e0b006e85e905555c90dfc0c00b306bca062e7b
  • dde7dd81eb9527b7ef99ebeefa821b11581b98e0
  • fc9c38718e4d2c75a8ba894352fa2b3c9348c3d7
  • 601a08e77ccb83ffcd4a3914286bb00e9b192cd6
  • 27a029c864bb39910304d7ff2ca1396f22aa32a2
  • 8b121bc5bd9382dfdf1431987a5131576321aefb
  • bf9ef96b9dc8bdbc6996491d8167a8e1e63283fe
  • fcf75e7cad45099bf977fe719a8a5fc245bd66b8
  • 0bedd80bf62417760d25ce87dea0ce9a084c163c
  • 5eee7a65ae5b5171bf29c329683aacc7eb99ee0c
  • 3900054580bd4155b4b72ccf7144c6188987cd31
  • e7826f5d9a9b08e758224ef34e2212d7a8f1b728
  • a93ae61ce57db88be52593fc3f1565a442c34679
  • 5ff9ecc1184c9952a16b9941b311d1a038fcab56
  • 36e302e6751cc1a141d3a243ca19ec74bec9226a
  • 080baf77c96ee71131b8ce4b057c126686c0c696
  • c945c9f4a56fd1057cac66fbc8b3e021974b1ec6
  • 5560644578a6bcf1ba79f380ca8bdb2f9a4b40b7
  • 207477076d069999533e0150be06a20ba74d5378
  • b942e1d1a0b5f0e66da3aa9bbd0fb46b8e16d71d
  • 9ef97f90dcdfe123ccb7d9b45e6fa9eceb2446f0
  • cf5fb4017483cdf1d5eb659ebc9cd7d19588d935
  • 92de0a807cfb1a332aa0d886a6981e7dee16d621
  • cde40c325fcf179242831a145fd918ca7288d9dc
  • 2426f9db2d962a444391aa3ddf75882faad0b67c
  • 9eda00aae384b2f9509fa48945ae820903912a90
  • 2e50c075343ab20228a8c0c094722bbff71c4a2a
  • 2f80f51188dc9aea697868864d88925d64c26abc



  • 238a1d2be44b684f5fe848081ba4c3e6ff821917


Posted by David García

In his more than 9-year professional career, he has been involved in multiple projects, the most important being in the fields of managed security, anti-fraud and ethical hacking services, and malware analysis. He has contributed his know-how and security-related improvements to a wide variety of fraud and vulnerability analysis products. He currently oversees the smooth running of our different products and researches current fraud developments in order to showcase buguroo overseas as well as providing the development department with feedback on the latest malware and cybercriminal trends.



buguroo’s cloud-based fraud detection delivers a straightforward solution for detecting and stopping today’s – and tomorrow’s malware threats. Banks and their customers can be protected from one of the most malicious threats in use by cybercriminals.


Solicita una demo

Would you like to know how our solution protects your bank?

Check how our solution can help you to resolve your company's online fraud issues by requesting a free DEMO and we explain it to you in detail.

Watch video

Did you like it? Share in your social communities.