Site icon Planned Link

Stay Classy, UNC6384: PRC-Nexus Espionage Campaign Targets Diplomats

Executive Summary

In March 2025, Google’s Threat Intelligence Group (GTIG) documented a complex espionage operation attributed to the PRC-nexus actor UNC6384, overlapping historically with tradecraft seen in TEMP.Hex / Mustang Panda. The campaign hijacks captive-portal flows to redirect victims to a fake “Adobe plugin update” site, delivering a signed downloader (STATICPLUGIN) that ultimately DLL-sideloads CANONSTAGER and deploys SOGU.SEC (PlugX) in memory over encrypted HTTPS C2. Targets included diplomats in Southeast Asia.

MITRE ATT&CK Mapping

Campaign Flow (March 2025)

The UNC6384 intrusion chain layers infrastructure hijacks, signed loaders, DLL sideloading, and memory-only payloads to minimize detection opportunities.

1) Initial Redirect – Captive Portal Hijack (T1557, T1189)

2) Fake Plugin Delivery – User Execution (T1204.002)

3) Stage-1 Loader – STATICPLUGIN (T1553.002, T1106)

4) Stage-2 Sideload – CANONSTAGER (T1218.011)

5) Final Payload – PlugX / SOGU.SEC (T1027, T1620)

6) C2 & Persistence (T1071.001, T1573)

IOC Highlights (selected)

Domains / URLs
mediareleaseupdates[.]com
https[:]//mediareleaseupdates[.]com/AdobePlugins.html
https[:]//mediareleaseupdates[.]com/style3.js
https[:]//mediareleaseupdates[.]com/AdobePlugins.exe
https[:]//mediareleaseupdates[.]com/20250509.bmp

Example hashes (SHA-256)
AdobePlugins.exe    65c42a7e...027ec124
20250509.bmp (MSI)  32998665...f3349916
cnmpaui.dll         e787f64a...b1e4011

TLS Certificate
CN=mediareleaseupdates[.]com; issued by Let’s Encrypt

Comparison with Other Write-ups

Source What it adds
Google GTIG Full intrusion chain, IOCs, YARA signatures, infection flow diagrams.
SecurityWeek (PlugX takedown) Law-enforcement remediation context: C2 access and self-delete at scale.

Operation Self-Delete: When Law Enforcement Flips the Script

In January 2025, U.S. and French authorities (with Sekoia.io) neutralized a Mustang Panda PlugX variant by obtaining court-approved access to a C2 server and pushing the malware’s built-in self-delete command to more than 4,200 infected U.S. systems. The routine removed files, killed processes, and cleaned persistence keys, demonstrating how defender access to adversary infrastructure can enable direct remediation at scale.

Defender Takeaways

Conclusion

UNC6384’s “deception in depth” shows the continued maturation of PRC-nexus espionage tradecraft: infrastructure hijacks, trust subversion via code signing, and memory-resident payloads. Yet the PlugX self-delete operation underlines that defenders aren’t just reacting—given the right intelligence and authorities, they can co-opt adversary capabilities for large-scale remediation. In the immortal words of Ron Burgundy: “Stay classy, UNC6384.”

Sources

Exit mobile version