Hogfarming.7z Today
Security teams should monitor for the following indicators related to this specific file name and associated threat actor behavior: : HogFarming.7z
: Educate staff on the risks of opening unexpected compressed archives, even if the sender appears legitimate. HogFarming.7z
: Government agencies, NGOs, and telecommunications sectors in Southeast Asia and Europe. Security teams should monitor for the following indicators
Based on available threat intelligence and technical databases, is a compressed archive associated with malicious activity, specifically linked to Earth Preta (also known as Mustang Panda), a Chinese-based Advanced Persistent Threat (APT) group . This file has been identified as a delivery vehicle for malware in cyberespionage campaigns targeting government and research entities. Technical Overview This file has been identified as a delivery
: Once the user extracts "HogFarming.7z", they find what appears to be a legitimate document or application.
: The file is primarily distributed via Spear Phishing emails. These emails often use topical lures related to regional geopolitics or government directives to entice victims into downloading and extracting the archive. Analysis of the Infection Chain
: Analysis suggests the archive often carries variants of the PlugX or ToneIns malware. PlugX is a modular Remote Access Trojan (RAT) used for data exfiltration, keystroke logging, and remote command execution.
