Threat Advisories:
New Report Critical Threat Research : The Iranian Cyber War Intensifies! Download the Report

LOTUSLITE v1.1: Enhanced Evasion Meets Banking-Themed Social Engineering

Red | Attack Report
Download PDF
Summary

The LOTUSLITE v1.1 backdoor malware represents an evolved cyber espionage threat targeting India and South Korea’s banking and financial services sectors, as well as government, diplomatic, and policy organizations. First observed in March 2026, this LOTUSLITE campaign leverages sophisticated banking-themed social engineering tactics to infiltrate Windows-based systems. The LOTUSLITE v1.1 attack is attributed with medium confidence to Mustang Panda (also tracked as Bronze President, Earth Preta, Stately Taurus, TEMP.Hex, HoneyMyte, Red Lich, Camaro Dragon, PKPLUG, Twill Typhoon, Hive0154), a known advanced persistent threat actor.

The LOTUSLITE v1.1 campaign begins with a deceptively simple CHM file disguised as a support request, triggering a hidden JavaScript loader that abuses trusted Windows components to deploy the LOTUSLITE payload. By sideloading a malicious DLL through a legitimate Microsoft-signed binary, the LOTUSLITE malware executes under the radar while employing advanced API resolution techniques to evade detection and analysis. Once the LOTUSLITE backdoor is established, it secures persistence, blends its network traffic with normal HTTPS communications, and enables full backdoor capabilities across targeted systems.

The LOTUSLITE v1.1 campaign’s overlap with parallel operations targeting geopolitical policy experts highlights a broader, coordinated cyber espionage effort by Mustang Panda. This underscores LOTUSLITE’s continued evolution into a stealthy and adaptable cyber espionage tool specifically designed to compromise India’s banking sector and South Korea’s policy organizations while evading modern security controls.

Attack Details

Initial Infection Through Banking-Themed Social Engineering

The LOTUSLITE v1.1 campaign introduces an updated variant of the LOTUSLITE malware, cleverly packaged around a theme tied to India’s banking sector to enhance its credibility and increase successful compromise rates. The LOTUSLITE attack chain begins with a well-crafted spear-phishing email delivering a Compiled HTML Help (CHM) file titled “Request for Support.chm,” a name deliberately chosen by Mustang Panda to mimic legitimate helpdesk or ticketing workflows commonly seen in financial institutions across India and South Korea.

Once the LOTUSLITE CHM file is opened, the file displays a seemingly benign prompt urging the user to click “Yes,” but this interaction quietly triggers the download and execution of a malicious JavaScript payload named music.js, hosted on a remote domain controlled by the Mustang Panda threat actor. This LOTUSLITE script acts as the orchestrator of the infection, abusing trusted Windows utilities like hh.exe and leveraging ActiveX components such as ShortcutCommand, alongside Scriptlet.TypeLib, to bypass built-in security controls and initiate LOTUSLITE execution without raising suspicion in India’s banking environments.

DLL Sideloading and Enhanced Evasion Techniques

Once the LOTUSLITE JavaScript is executed, the script extracts embedded payloads into a public directory on the system, including a legitimate Microsoft-signed binary (Microsoft_DNX.exe) and a malicious DLL (dnx.onecore.dll), which constitutes the LOTUSLITE v1.1 implant. The Mustang Panda attackers exploit DLL sideloading by relying on the signed binary’s behavior of dynamically loading libraries at runtime without strict path validation or authenticity checks, allowing the malicious LOTUSLITE DLL to execute under the guise of a trusted application.

Notably, LOTUSLITE v1.1 introduces enhanced anti-analysis techniques that distinguish it from earlier LOTUSLITE versions. Rather than statically importing APIs, LOTUSLITE v1.1 dynamically resolves them at runtime via ntdll.dll, using functions like LdrLoadDll and RtlInitUnicodeString. This LOTUSLITE approach minimizes detectable indicators in the import table, significantly complicating static analysis and reverse engineering efforts by security researchers attempting to analyze Mustang Panda malware targeting India’s banking sector and South Korean government organizations.

Persistence Mechanisms and Banking-Themed Disguise

To maintain persistence, the LOTUSLITE v1.1 malware modifies the Windows Registry under the HKCU Run key, again using obfuscated API resolution techniques to evade detection by security tools deployed in India’s banking and South Korea’s government infrastructure. LOTUSLITE copies itself into C:\ProgramData\Microsoft_DNX* and leverages a modified command-line argument to control execution flow, either establishing persistence or initiating communication with its command-and-control (C2) server. A mutex named “mdseccoUk” ensures only a single LOTUSLITE instance runs at a time on compromised systems.

The LOTUSLITE DLL’s export table has been expanded to include functions such as HDFCBankMain, which displays a decoy message box referencing “HDFC Bank Limited” to reinforce the banking-themed disguise and deceive victims in India’s financial sector. Meanwhile, legacy artifacts such as KugouMain persist in LOTUSLITE v1.1, providing strong evidence of lineage from earlier LOTUSLITE versions and confirming the malware’s evolution under Mustang Panda’s development.

Command-and-Control Infrastructure and Backdoor Capabilities

On the network side, the LOTUSLITE v1.1 implant communicates with a hardcoded C2 endpoint hosted on a dynamic DNS subdomain controlled by Mustang Panda, using TCP port 443 to blend seamlessly with normal HTTPS traffic in India’s banking networks and South Korea’s government systems. The LOTUSLITE communication protocol relies on a custom binary TLV structure, updated with a new magic header value (0xB2EBCFDF), signaling iterative development by Mustang Panda. Functionally, the LOTUSLITE backdoor retains its core capabilities, including remote shell access, file manipulation, and session control, mirroring the command structure of earlier LOTUSLITE versions.

Coordinated Targeting Across Multiple Sectors

Further investigation reveals that this LOTUSLITE v1.1 activity is not isolated to India’s banking sector. Mustang Panda is also targeting policy experts and individuals engaged in Korean Peninsula and Indo-Pacific security discussions in South Korea. In this parallel campaign, Mustang Panda threat actors employed a spoofed Gmail account impersonating a well-known U.S.-Korea policy figure to distribute malicious files via Google Drive. This overlap in targeting and tooling suggests a broader, coordinated cyber espionage effort by Mustang Panda, with LOTUSLITE continuing to evolve both technically and operationally to support targeted cyber espionage campaigns against India’s banking sector and South Korea’s diplomatic organizations.

With moderate confidence, this LOTUSLITE v1.1 activity is attributed to Mustang Panda based on shared code lineage, overlapping infrastructure, residual build artifacts, and consistent behavioral patterns observed across all three campaigns targeting India and South Korea.

Recommendations

Block Known C2 Infrastructure

Immediately block network communication to the domains editor[.]gleeze[.]com and www[.]cosmosmusic[.]com at the firewall, proxy, and DNS levels to prevent LOTUSLITE v1.1 command-and-control communications. Add the associated LOTUSLITE IoC hashes to endpoint detection blocklists to prevent execution of known LOTUSLITE v1.1 artifacts across India’s banking networks and South Korean government systems.

Restrict CHM File Execution

Deploy Group Policy restrictions to prevent the execution of Compiled HTML (.chm) files from untrusted sources, particularly those arriving via email attachments or web downloads in banking and government environments. Monitor for unexpected invocations of hh.exe, which is abused in this LOTUSLITE campaign as a file extraction mechanism by Mustang Panda.

Harden DLL Sideloading Defenses

Implement application control policies that prevent unsigned or untrusted DLLs from being loaded alongside legitimate signed executables. Monitor for the execution of Microsoft_DNX.exe and kwpswnsserver.exe outside of expected development contexts, as these legitimate binaries are abused for sideloading in this LOTUSLITE v1.1 campaign targeting India’s banking sector.

Monitor Registry Persistence Mechanisms

Deploy detection rules for registry modifications under HKCU\Software\Microsoft\Windows\CurrentVersion\Run, specifically watching for entries pointing to executables staged in C:\ProgramData\ subdirectories. Alert on the creation of the mutexes “mdseccoUkFuiCkTrump” and “1ac5e7ee1a107499” as direct indicators of LOTUSLITE activity on systems across India and South Korea.

Deploy Network Detection Signatures

Create network intrusion detection rules to identify the LOTUSLITE custom binary packet structure, specifically monitoring for the magic value 0xB2EBCFDF in packet headers on TCP port 443. Also retain detection for the legacy magic value 0x8899AABB from LOTUSLITE v1.0 to ensure coverage across both variants deployed by Mustang Panda.

Implement JavaScript Execution Controls

Restrict the execution of JavaScript files (.js) via Windows Script Host in environments where such functionality is not operationally required. Monitor for the creation and execution of JavaScript files in user-writable directories, particularly those triggered by CHM file interactions in India’s banking sector and South Korean government organizations.

Implement Network Segmentation for Financial Systems

Isolate banking and financial application servers from general-purpose endpoints to limit lateral movement opportunities if a LOTUSLITE implant achieves initial compromise. Ensure that sensitive financial systems in India are accessible only through hardened jump servers with multi-factor authentication to prevent Mustang Panda lateral movement.

MITRE ATT&CK TTPs

Initial Access

  • T1566: Phishing
    • T1566.001: Spear-Phishing Attachment

Execution

  • T1059: Command and Scripting Interpreter
    • T1059.007: JavaScript
  • T1218: System Binary Proxy Execution
    • T1218.001: Compiled HTML File
  • T1204: User Execution

Persistence

  • T1547: Boot or Logon Autostart Execution
    • T1547.001: Registry Run Keys / Startup Folder

Defense Evasion

  • T1574: Hijack Execution Flow
    • T1574.001: DLL
  • T1036: Masquerading
    • T1036.005: Match Legitimate Name or Location
  • T1106: Native API
  • T1027: Obfuscated Files or Information

Command and Control

  • T1071: Application Layer Protocol
    • T1071.001: Web Protocols
  • T1095: Non-Application Layer Protocol

Exfiltration

  • T1041: Exfiltration Over C2 Channel
Indicators of Compromise (IoCs)

SHA256 Hashes

  • af31ebe9085df408bedcf8f027fb60389897e5c8d3b0e9695fea29774f9d3aec
  • cc0ff7e25ea686171919575916e2d9ebaeb5800a063f370a6980ea791f8851b8
  • 7beede15ecdc7d3f01db4b699e5fe5f4f2e7c79cd7ef0e918ed0583bf621de7d
  • 9bf2f3b15a621789f898f9bd7710ba857e3f238a4937b64fdc47ef9a92e0b05d
  • 18bc0e0f627d90fb283aa243055b46d0bfb5d85a7240d8f63ec2d1c8a2c15893
  • 6d22d50634c2c2fc853bfd2b564e1837d51087aa684a9c4415634c8c13c44135

Domains

  • editor[.]gleeze[.]com
  • www[.]cosmosmusic[.]com

Mutex

  • mdseccoUkFuiCkTrump
  • 1ac5e7ee1a107499

File Path

  • C:\ProgramData\Microsoft_DNX\
References

https://www.acronis.com/en/tru/posts/same-packet-different-magic-mustang-panda-hits-indias-banking-sector-and-korea-geopolitics/

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox