Home / Industry

Probing the DNS Depths of PeckBirdy

Trend Micro recently published their report on PeckBirdy, a JS-based C&C framework China-aligned APT actors have been using since 2023. The threat was designed to execute across multiple environments, enabling flexible deployment.

So far, two modular backdoors—HOLODONUT and MKDOOR, multiple attack vectors, stolen code-signing certificate Cobalt Strike payloads, and exploits (CVE-2020-16040) have figured along PeckBirdy in various campaigns.

The researchers also identified 36 network IoCs related to the threat. After further scrutiny of the IoCs, specifically extracting unique domains from the subdomains tagged as IoCs, we analyzed 56 IoCs in all. Our analysis led to these discoveries:

  • Three unique client IP addresses communicated with one domain classified as an IoC
  • Six domains identified as IoCs were registered with malicious intent 122—804 days before being dubbed as such
  • 64 email-connected domains
  • 23 additional IP addresses, 20 of which turned out to be malicious
  • Two IP-connected domains
  • 18,188 string-connected domains, 49 of which turned out to be malicious

Note that before embarking on our in-depth IoC investigation, we first assessed the legitimacy of the 28 domains identified as IoCs aided by the WhoisXML API MCP Server. Our analysis confirmed that all of them were illegitimate domains.

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Scrutinizing the Subdomain IoCs

We queried the 20 subdomains tagged as IoCs on Jake AI and found out that two—update[.]myrnicrosoft[.]com and updates[.]oss-cdn[.]com—have already been involved with distributing malware.

Jake AI result for the subdomain update[.]myrnicrosoft[.]com

The remaining subdomains were either compromised though legitimate or suspicious primarily based on their use of potential typosquatting domains.

Dissecting the DNS Traces of the Domain IoCs

Sample network traffic data from the IASC revealed that three unique client IP addresses under two distinct ASNs communicated with a domain classified as an IoC via 91 DNS queries made between 31 December 2025 and 29 January 2026.

We then scoured the First Watch Malicious Domains Data Feed for the 28 domains identified as IoCs and found out that six were registered 122—804 days before they were dubbed as malicious.

DOMAIN IoCFIRST WATCH INCLUSION DATENUMBER OF DAYS BEFORE BEING REPORTED AS IoC
mkdmcdn[.]com11/14/23804
ppcn-cdn[.]xyz03/12/24685
jsunpkg[.]com04/07/24659

Next, we queried the 28 domains identified as IoCs on WHOIS API and discovered that:

  • They were created between 30 November 2017 and 29 November 2025.
  • They were administered by nine different registrars.

  • They were registered in seven different countries.

DNS Chronicle API queries for the 28 domains tagged as IoCs showed that 22 had recorded 2,205 historical domain-to-IP resolutions over time. While the domain img-cache[.]com posted the oldest first resolution date, githubgressaccess[.]info recorded the latest.

DOMAIN IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
img-cache[.]com6812/10/1712/07/18
microsoft-ads[.]com9007/27/1908/16/20
a1icdn[.]com5808/31/1901/27/26
js-cdn[.]xyz5507/30/2001/27/26
static-alicdn[.]com7909/03/2101/27/26

A closer look at the first resolution dates of the domains also showed that seven were likely utilized in the same campaign in 2023, five in 2025, three in 2024, and two each in 2019 and 2021.

Investigating the IP IoCs

We queried the eight IP addresses classified as IoCs on Bulk IP Geolocation Lookup and found out that:

  • They were geolocated in two countries. Only one—China, however, appeared as a registrant country as well.
  • They were administered by two ISPs.

DNS Chronicle API queries for the eight IP addresses identified as IoCs, meanwhile, showed that six recorded 58 historical IP-to-domain resolutions over time.

IP IoCNUMBER OF RESOLUTIONSFIRST RESOLUTION DATELAST RESOLUTION DATE
8[.]218[.]50[.]2071906/10/2211/09/25
43[.]156[.]94[.]1851804/03/2309/14/25
8[.]222[.]143[.]246911/11/2306/11/24

New Artifacts Uncloaked

We started our search for new artifacts by querying the 28 domains identified as IoCs on WHOIS History API and discovered that 21 had 35 unique email addresses in their historical WHOIS records. Upon closer investigation, we learned that five were public email addresses.

Reverse WHOIS API queries for the five public email addresses revealed that while one could belong to a domainer, the remaining four appeared in the historical WHOIS records of other domains. We uncovered 64 unique email-connected domains after those already tagged as IoCs were filtered out.

Next, we queried the 28 domains classified as IoCs on DNS Lookup API and found out that 13 currently resolved to 23 unique IP addresses not on the IoC list.

Threat Intelligence API queries for the 23 unique IP addresses revealed that 20 have already been weaponized for various attacks.


MALICIOUS IP ADDRESSASSOCIATED THREATDATE FIRST SEENDATE LAST SEEN
104[.]21[.]24[.]113Malware distribution
Phishing
Generic threat
10/23/24
06/30/23
01/27/24
01/26/26
01/26/26
01/08/26
104[.]21[.]25[.]105Phishing
Malware distribution
Generic threat
05/22/23
04/11/23
07/01/23
01/27/26
01/26/26
11/05/25
104[.]21[.]44[.]46Phishing
Malware distribution
Generic threat
03/28/23
12/08/23
04/03/23
01/27/26
01/26/26
11/15/25
104[.]21[.]63[.]97Phishing
Malware distribution
Generic threat
05/24/23
08/25/23
04/28/25
01/27/26
01/17/26
01/11/26
104[.]21[.]90[.]19Phishing
Malware distribution
Generic threat
06/24/23
10/05/23
06/17/23
01/27/26
01/26/26
10/31/25

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global