Skip to main content

Command Palette

Search for a command to run...

Honeymyte Returns: How CoolClient is Silently Hijacking Browsers?

Mustang Panda is making a comeback with a silent threat targeting browser data and global user information.

Updated
6 min read
Honeymyte Returns: How CoolClient is Silently Hijacking Browsers?

Overview

In recent years, the main targets of the espionage group HoneyMyte (also known as Mustang Panda or Bronze President) have frequently been in Asia and Europe, with Southeast Asia being the most affected.

As an APT group, HoneyMyte uses many complex tools to achieve its goals. These tools include the ToneShell, PlugX, Qreverse, and CoolClient backdoors, USB Tonedisk and SnakeDisk, among others. Recently, they have continued to expand their influence by deploying the CoolClient backdoor with new features aimed at stealing users' browser information and sensitive data.

To better understand the Mustang Panda or HoneyMyte group, readers can refer to the article previously mentioned by the FPT Threat Intelligence team.

Mustang Panda Uses New Malware to Attack the Governments of Myanmar, Vietnam, Taiwan

Main Targets

  • Browser Data: cookies, browsing history, saved login information, login sessions.

  • User Identification Information: email accounts, social networks, internal services.

  • Data for Further Intrusion: authentication tokens and session information to bypass multi-factor authentication (MFA).

  • High-Value Intelligence Victims: individuals or organizations related to research, technology, or sensitive geopolitical areas.

Overview of the CoolClient Backdoor

Variants of CoolClient abusing different software for DLL sideloading (2021–2025)

As mentioned, CoolClient is not entirely a newly emerging backdoor and has a long history of cybercrime dating back before 2019. Its predecessors in campaigns attributed to Mustang Panda / HoneyMyte mainly used simple backdoors and custom loaders. Although it did not have an official name at that stage, there were components with similar functions: maintaining access, loading modules, and remote control.

From 2019 to 2020, CoolClient began to be observed as a lightweight backdoor, often deployed after the initial intrusion phase. The main function of the backdoor during this period was usually to act as a bridge, establishing connections to C2, executing basic commands, and gathering system information.

From 2022 onwards, CoolClient began to shift focus by prioritizing user data and login sessions, rather than just controlling the machine. This can be seen as a clear sign of a long-term espionage strategy.

Recently, CoolClient has directly integrated with a specialized browser stealer and uses scripts to flexibly change behavior according to the target.

Campaign Analysis

Overview of CoolClient execution flow

Now let's go through the detailed attack flow in this campaign to better understand the danger of CoolClient. The entire campaign is a multi-stage infection chain. It is designed to hide, escalate privileges, and maintain long-term control over the victim's system.

In the first stage, the attacker uses the Side-loading DLL technique to infiltrate the system. The APT group used the file Sang.exe for disguise; it is not the main payload but rather the initial execution vector in the entire infection chain. The role of this file is more strategic than technical.

Specifically, Sang.exe is used to:

  • Act as a benign-looking executable.

  • Automatically load the malicious libings.dll because it is in the same directory.

  • Initiate the entire loader chain without needing exploits or macros.

After loading libings.dll, it immediately calls another payload and executes “loader.dat“. A notable point is that the payload does not exist in a clear form on the disk, reducing the chance of being detected by signature-based detection. This technique in the initial stage cleverly exploits the Windows mechanism that prioritizes loading DLLs from the same directory to avoid detection by some antivirus signatures.

After loading the loader.dat payload, it is decrypted to extract the shellcode and 2nd-stage DLL with the main purposes of:

  • Separating the payload from the original executable file.

  • Avoiding static analysis.

  • Allowing the payload to be updated without changing the original file.

Function used to find and extract Base64-encoded credentials from HTTP proxy-authorization headers

2nd-stage DLL at this point will be used as a bridge in the multi-layer infection chain of the campaign. It will continuously check the command line parameter (argv[1]) - the most dangerous stage behaviorally, but it does not contain a full backdoor. This is also where activities occur:

  • Process injection.

  • Persistence setup.

  • Privilege escalation.

  • Selecting a legitimate process (write.exe) to act as a host.

At this stage, the hacker group also sets up persistence mechanisms and performs UAC bypass, escalating privileges to a higher level and allowing deeper manipulation of the system.

After gaining privileges and establishing persistence mechanisms on the system, CoolClient will inject malicious processes into the target system. At this stage, the process “write.exe“ will be used as a springboard for a malicious payload “main.dat“..

At this stage, it is also very difficult to detect by EDR/AV systems because the attacker has exploited the legitimate Windows process: write.exe. The entire shellcode as well as DLL stage 3 (complete backdoor). The main functions of DLL stage 3 are to achieve very specific purposes:

  • Beacon signal (heartbeat)

  • Reverse tunnel

  • Enumerate user session

  • Keylogger

  • Clipboard monitor

  • Monitor active windows

  • Collect system information

  • HTTP proxy credential sniffing

  • File manipulation

  • Data exfiltration

Function that copies Chrome browser login data into a temporary file (chromeTmp) for exfiltration

All processes at this stage will continuously connect to the C2 server to receive commands and store information.

CoolClient plugin that spawns cmd.exe with redirected I/O and forwards command output to C2

Conclusion

The Honeymyte campaign, with the presence of CoolClient, clearly shows the change in how modern threat groups approach targets: quietly controlling user data flow without immediate destruction. Exploiting the browser, a familiar and trusted component, has allowed attackers to collect sensitive information over a long period with almost no clear signs.

CoolClient is not a "noisy" malware, but its sophistication, outward legitimacy, and ability to combine with other components make it a dangerous link in the Honeymyte attack chain. The stolen browser data not only serves immediate espionage goals but also paves the way for deeper infiltration activities in the future.

Honeymyte and CoolClient once again affirm that in the current threat landscape, the most dangerous threats are not the attacks causing immediate disruption, but the silent activities happening right before our eyes.

Recommendations

  1. Strictly control installed software

    • Only install software from official and reliable sources.

    • Avoid using "free", "cracked", or unknown developer tools and utilities.

    • Check digital signatures and publisher information before installing.

  2. Reduce browser risks

    • Do not save passwords directly in the browser unless absolutely necessary.

    • Regularly:

      • Clear cookies and session data.

      • Check and remove unknown extensions.

    • Use a dedicated password manager instead of the default password saving feature.

  3. Enhance account security

    • Enable multi-factor authentication (MFA) for all important accounts.

    • Do not reuse passwords across services.

    • Change passwords immediately if unusual login activity is detected.

  4. Regularly update systems and software

    • Always update:

      • Operating systems

      • Browsers

      • Security software

    • New patches often fix vulnerabilities exploited by APT groups.

  5. Increase user awareness

    • Be cautious with emails, attachments, or strange links, even if they seem legitimate.

    • Understand that modern threats do not necessarily cause errors or slow down the machine, but often operate quietly over a long period.

    • Regularly check for unusual signs in the system.

IOCs

  1. CoolClient

    • F518D8E5FE70D9090F6280C68A95998F

    • 1A61564841BBBB8E7774CBBEB3C68D5D

    • AEB25C9A286EE4C25CA55B72A42EFA2C

    • 6B7300A8B3F4AAC40EEECFD7BC47EE7C

  2. CoolClient plugins

    • 7AA53BA3E3F8B0453FFCFBA06347AB34

    • A1CD59F769E9E5F6A040429847CA6EAE

    • 1BC5329969E6BF8EF2E9E49AAB003F0B

  3. Browser login data stealer

    • 1A5A9C013CE1B65ABC75D809A25D36A7

    • E1B7EF0F3AC0A0A64F86E220F362B149

    • DA6F89F15094FD3F74BA186954BE6B05

  4. Scripts

    • C19BD9E6F649DF1DF385DEEF94E0E8C4

    • 838B591722512368F81298C313E37412

    • A4D7147F0B1CA737BFC133349841AAB

  5. CoolClient C2

    • account.hamsterxnxx[.]com

    • popnike-share[.]com

    • japan.Lenovoappstore[.]com

  6. FTP server

    • 113.23.212[.]15

Reference

  1. Chinese Mustang Panda hackers deploy infostealers via CoolClient backdoor

  2. HoneyMyte updates CoolClient backdoor, uses new data stealing tools | Securelist

  3. Online Virus Scanner — Kaspersky Threat Intelligence Portal

More from this blog

F

FPT IS Security

761 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.