Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. APT1

APT1

APT1 is a Chinese threat group that has been attributed to the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department, commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398.[1]

ID: G0006
Associated Groups: Comment Crew, Comment Group, Comment Panda
Version: 1.4
Created: 31 May 2017
Last Modified: 25 April 2025

Associated Group Descriptions

NameDescription
Comment Crew

[1]

Comment Group

[1]

Comment Panda

[2]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087.001Account Discovery:Local Account

APT1 used the commandsnet localgroup,net user, andnet group to find accounts on the system.[1]

EnterpriseT1583.001Acquire Infrastructure:Domains

APT1 has registered hundreds of domains for use in operations.[1]

EnterpriseT1560.001Archive Collected Data:Archive via Utility

APT1 has used RAR to compress files before moving them outside of the victim network.[1]

EnterpriseT1119Automated Collection

APT1 used a batch script to perform a series of discovery techniques and saves it to a text file.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.[1]

EnterpriseT1584.001Compromise Infrastructure:Domains

APT1 hijacked FQDNs associated with legitimate websites hosted by hop points.[1]

EnterpriseT1005Data from Local System

APT1 has collected files from a local victim.[1]

EnterpriseT1114.001Email Collection:Local Email Collection

APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.[1]

.002Email Collection:Remote Email Collection

APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived.[1]

EnterpriseT1585.002Establish Accounts:Email Accounts

APT1 has created email accounts for later use in social engineering, phishing, and when registering domains.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used byAPT1 as a name for malware.[1][3]

EnterpriseT1135Network Share Discovery

APT1 listed connected network shares.[1]

EnterpriseT1588.001Obtain Capabilities:Malware

APT1 used publicly available malware for privilege escalation.[1]

.002Obtain Capabilities:Tool

APT1 has used various open-source tools for privilege escalation purposes.[1]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

APT1 has been known to use credential dumping usingMimikatz.[1]

EnterpriseT1566.001Phishing:Spearphishing Attachment

APT1 has sent spearphishing emails containing malicious attachments.[1]

.002Phishing:Spearphishing Link

APT1 has sent spearphishing emails containing hyperlinks to malicious files.[1]

EnterpriseT1057Process Discovery

APT1 gathered a list of running processes on the system usingtasklist /v.[1]

EnterpriseT1021.001Remote Services:Remote Desktop Protocol

TheAPT1 group is known to have used RDP during operations.[4]

EnterpriseT1016System Network Configuration Discovery

APT1 used theipconfig /all command to gather network configuration information.[1]

EnterpriseT1049System Network Connections Discovery

APT1 used thenet use command to get a listing on network connections.[1]

EnterpriseT1007System Service Discovery

APT1 used the commandsnet start andtasklist to get a listing of the services on the system.[1]

EnterpriseT1550.002Use Alternate Authentication Material:Pass the Hash

TheAPT1 group is known to have used pass the hash.[1]

Software

IDNameReferencesTechniques
S0017BISCUIT[1]Command and Scripting Interpreter:Windows Command Shell,Encrypted Channel:Asymmetric Cryptography,Fallback Channels,Ingress Tool Transfer,Input Capture:Keylogging,Process Discovery,Screen Capture,System Information Discovery,System Owner/User Discovery,System Time Discovery
S0119Cachedump[1]OS Credential Dumping:Cached Domain Credentials
S0025CALENDAR[1]Command and Scripting Interpreter:Windows Command Shell,Web Service:Bidirectional Communication
S0026GLOOXMAIL[1]Application Layer Protocol:Publish/Subscribe Protocols,Web Service:Bidirectional Communication
S0008gsecdump[1]OS Credential Dumping:Security Account Manager,OS Credential Dumping:LSA Secrets
S0100ipconfig[1]System Network Configuration Discovery
S0121Lslsass[1]OS Credential Dumping:LSASS Memory
S0002Mimikatz[1]Access Token Manipulation:SID-History Injection,Account Manipulation,Boot or Logon Autostart Execution:Security Support Provider,Credentials from Password Stores,Credentials from Password Stores:Credentials from Web Browsers,Credentials from Password Stores:Windows Credential Manager,OS Credential Dumping:DCSync,OS Credential Dumping:Security Account Manager,OS Credential Dumping:LSASS Memory,OS Credential Dumping:LSA Secrets,Rogue Domain Controller,Steal or Forge Authentication Certificates,Steal or Forge Kerberos Tickets:Golden Ticket,Steal or Forge Kerberos Tickets:Silver Ticket,Unsecured Credentials:Private Keys,Use Alternate Authentication Material:Pass the Hash,Use Alternate Authentication Material:Pass the Ticket
S0039Net[1]Account Discovery:Domain Account,Account Discovery:Local Account,Account Manipulation:Additional Local or Domain Groups,Create Account:Local Account,Create Account:Domain Account,Indicator Removal:Network Share Connection Removal,Network Share Discovery,Password Policy Discovery,Permission Groups Discovery:Domain Groups,Permission Groups Discovery:Local Groups,Remote Services:SMB/Windows Admin Shares,Remote System Discovery,System Network Connections Discovery,System Service Discovery,System Services:Service Execution,System Time Discovery
S0122Pass-The-Hash Toolkit[1]Use Alternate Authentication Material:Pass the Hash
S0012PoisonIvy[1]Application Window Discovery,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Boot or Logon Autostart Execution:Active Setup,Command and Scripting Interpreter:Windows Command Shell,Create or Modify System Process:Windows Service,Data from Local System,Data Staged:Local Data Staging,Encrypted Channel:Symmetric Cryptography,Execution Guardrails:Mutual Exclusion,Ingress Tool Transfer,Input Capture:Keylogging,Modify Registry,Obfuscated Files or Information,Process Injection:Dynamic-link Library Injection,Rootkit
S0029PsExec[1]Create Account:Domain Account,Create or Modify System Process:Windows Service,Lateral Tool Transfer,Remote Services:SMB/Windows Admin Shares,System Services:Service Execution
S0006pwdump[1]OS Credential Dumping:Security Account Manager
S0345Seasalt[3][5]Application Layer Protocol:Web Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:Windows Command Shell,Create or Modify System Process:Windows Service,File and Directory Discovery,Indicator Removal:File Deletion,Ingress Tool Transfer,Masquerading:Masquerade Task or Service,Obfuscated Files or Information:Encrypted/Encoded File,Process Discovery
S0057Tasklist[1]Process Discovery,Software Discovery:Security Software Discovery,System Service Discovery
S0109WEBC2[1]Command and Scripting Interpreter:Windows Command Shell,Hijack Execution Flow:DLL,Ingress Tool Transfer
S0123xCmd[3]System Services:Service Execution

References

×

[8]ページ先頭

©2009-2026 Movatter.jp