|
||
|
||
Trend Micro recently published their report on PeckBirdy, a JS-based C&C framework China-aligned APT actors have been using since 2023. The threat was designed to execute across multiple environments, enabling flexible deployment.
So far, two modular backdoors—HOLODONUT and MKDOOR, multiple attack vectors, stolen code-signing certificate Cobalt Strike payloads, and exploits (CVE-2020-16040) have figured along PeckBirdy in various campaigns.
The researchers also identified 36 network IoCs related to the threat. After further scrutiny of the IoCs, specifically extracting unique domains from the subdomains tagged as IoCs, we analyzed 56 IoCs in all. Our analysis led to these discoveries:
Note that before embarking on our in-depth IoC investigation, we first assessed the legitimacy of the 28 domains identified as IoCs aided by the WhoisXML API MCP Server. Our analysis confirmed that all of them were illegitimate domains.
A sample of the additional artifacts obtained from our analysis is available for download from our website.
We queried the 20 subdomains tagged as IoCs on Jake AI and found out that two—update[.]myrnicrosoft[.]com and updates[.]oss-cdn[.]com—have already been involved with distributing malware.

The remaining subdomains were either compromised though legitimate or suspicious primarily based on their use of potential typosquatting domains.
Sample network traffic data from the IASC revealed that three unique client IP addresses under two distinct ASNs communicated with a domain classified as an IoC via 91 DNS queries made between 31 December 2025 and 29 January 2026.

We then scoured the First Watch Malicious Domains Data Feed for the 28 domains identified as IoCs and found out that six were registered 122—804 days before they were dubbed as malicious.
| DOMAIN IoC | FIRST WATCH INCLUSION DATE | NUMBER OF DAYS BEFORE BEING REPORTED AS IoC |
|---|---|---|
| mkdmcdn[.]com | 11/14/23 | 804 |
| ppcn-cdn[.]xyz | 03/12/24 | 685 |
| jsunpkg[.]com | 04/07/24 | 659 |
Next, we queried the 28 domains identified as IoCs on WHOIS API and discovered that:

They were administered by nine different registrars.

They were registered in seven different countries.

DNS Chronicle API queries for the 28 domains tagged as IoCs showed that 22 had recorded 2,205 historical domain-to-IP resolutions over time. While the domain img-cache[.]com posted the oldest first resolution date, githubgressaccess[.]info recorded the latest.
| DOMAIN IoC | NUMBER OF RESOLUTIONS | FIRST RESOLUTION DATE | LAST RESOLUTION DATE |
|---|---|---|---|
| img-cache[.]com | 68 | 12/10/17 | 12/07/18 |
| microsoft-ads[.]com | 90 | 07/27/19 | 08/16/20 |
| a1icdn[.]com | 58 | 08/31/19 | 01/27/26 |
| js-cdn[.]xyz | 55 | 07/30/20 | 01/27/26 |
| static-alicdn[.]com | 79 | 09/03/21 | 01/27/26 |
A closer look at the first resolution dates of the domains also showed that seven were likely utilized in the same campaign in 2023, five in 2025, three in 2024, and two each in 2019 and 2021.
We queried the eight IP addresses classified as IoCs on Bulk IP Geolocation Lookup and found out that:

They were administered by two ISPs.

DNS Chronicle API queries for the eight IP addresses identified as IoCs, meanwhile, showed that six recorded 58 historical IP-to-domain resolutions over time.
| IP IoC | NUMBER OF RESOLUTIONS | FIRST RESOLUTION DATE | LAST RESOLUTION DATE |
|---|---|---|---|
| 8[.]218[.]50[.]207 | 19 | 06/10/22 | 11/09/25 |
| 43[.]156[.]94[.]185 | 18 | 04/03/23 | 09/14/25 |
| 8[.]222[.]143[.]246 | 9 | 11/11/23 | 06/11/24 |
We started our search for new artifacts by querying the 28 domains identified as IoCs on WHOIS History API and discovered that 21 had 35 unique email addresses in their historical WHOIS records. Upon closer investigation, we learned that five were public email addresses.
Reverse WHOIS API queries for the five public email addresses revealed that while one could belong to a domainer, the remaining four appeared in the historical WHOIS records of other domains. We uncovered 64 unique email-connected domains after those already tagged as IoCs were filtered out.
Next, we queried the 28 domains classified as IoCs on DNS Lookup API and found out that 13 currently resolved to 23 unique IP addresses not on the IoC list.
Threat Intelligence API queries for the 23 unique IP addresses revealed that 20 have already been weaponized for various attacks.
| MALICIOUS IP ADDRESS | ASSOCIATED THREAT | DATE FIRST SEEN | DATE LAST SEEN |
|---|---|---|---|
| 104[.]21[.]24[.]113 | Malware distribution Phishing Generic threat | 10/23/24 06/30/23 01/27/24 | 01/26/26 01/26/26 01/08/26 |
| 104[.]21[.]25[.]105 | Phishing Malware distribution Generic threat | 05/22/23 04/11/23 07/01/23 | 01/27/26 01/26/26 11/05/25 |
| 104[.]21[.]44[.]46 | Phishing Malware distribution Generic threat | 03/28/23 12/08/23 04/03/23 | 01/27/26 01/26/26 11/15/25 |
| 104[.]21[.]63[.]97 | Phishing Malware distribution Generic threat | 05/24/23 08/25/23 04/28/25 | 01/27/26 01/17/26 01/11/26 |
| 104[.]21[.]90[.]19 | Phishing Malware distribution Generic threat | 06/24/23 10/05/23 06/17/23 | 01/27/26 01/26/26 10/31/25 |
This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.
Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byRadix
Sponsored byIPv4.Global