Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. ShadowPad

ShadowPad

ShadowPad is a modular backdoor that was first identified in a supply chain compromise of the NetSarang software in mid-July 2017. The malware was originally thought to be exclusively used byAPT41, but has since been observed to be used by various Chinese threat activity groups.[1][2][3]

ID: S0596
Associated Software: POISONPLUG.SHADOW
Type: MALWARE
Platforms: Windows
Version: 1.3
Created: 23 March 2021
Last Modified: 22 October 2025

Associated Software Descriptions

NameDescription
POISONPLUG.SHADOW

[4]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

ShadowPad communicates over HTTP to retrieve a string that is decoded into a C2 server URL.[3]

.002Application Layer Protocol:File Transfer Protocols

ShadowPad has used FTP for C2 communications.[3]

.004Application Layer Protocol:DNS

ShadowPad has used DNS tunneling for C2 communications.[3]

EnterpriseT1132.002Data Encoding:Non-Standard Encoding

ShadowPad has encoded data as readable Latin characters.[2]

EnterpriseT1140Deobfuscate/Decode Files or Information

ShadowPad has decrypted a binary blob to start execution.[3]

EnterpriseT1568.002Dynamic Resolution:Domain Generation Algorithms

ShadowPad uses a DGA that is based on the day of the month for C2 servers.[2][3][4]

EnterpriseT1070Indicator Removal

ShadowPad has deleted arbitrary Registry values.[3]

EnterpriseT1105Ingress Tool Transfer

ShadowPad has downloaded code from a C2 server.[2]

EnterpriseT1680Local Storage Discovery

ShadowPad has discovered system information including volume serial numbers.[3]

EnterpriseT1112Modify Registry

ShadowPad can modify the Registry to store and maintain a configuration block and virtual file system.[3][5]

EnterpriseT1095Non-Application Layer Protocol

ShadowPad has used UDP for C2 communications.[3]

EnterpriseT1027Obfuscated Files or Information

ShadowPad has encrypted its payload, a virtual file system, and various files.[2][5]

.011Fileless Storage

ShadowPad maintains a configuration block and virtual file system in the Registry.[3][5]

EnterpriseT1057Process Discovery

ShadowPad has collected the PID of a malicious process.[3]

EnterpriseT1055Process Injection

ShadowPad has injected an install module into a newly created process.[3]

.001Dynamic-link Library Injection

ShadowPad has injected a DLL into svchost.exe.[3]

EnterpriseT1029Scheduled Transfer

ShadowPad has sent data back to C2 every 8 hours.[2]

EnterpriseT1082System Information Discovery

ShadowPad has discovered system information including memory status, CPU frequency, and OS versions.[3]

EnterpriseT1016System Network Configuration Discovery

ShadowPad has collected the domain name of the victim system.[3]

EnterpriseT1033System Owner/User Discovery

ShadowPad has collected the username of the victim system.[3]

EnterpriseT1124System Time Discovery

ShadowPad has collected the current date and time of the victim system.[3]

Groups That Use This Software

Campaigns

References

  1. Insikt Group. (2021, February 28). China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions. Retrieved March 22, 2021.
  2. GReAT. (2017, August 15). ShadowPad in corporate networks. Retrieved March 22, 2021.
  3. Kaspersky Lab. (2017, August). ShadowPad: popular server management software hit in supply chain attack. Retrieved March 22, 2021.
  4. Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
  5. Chen, J., et al. (2022). Delving Deep: An Analysis of Earth Lusca’s Operations. Retrieved July 1, 2022.
  6. Lior Rochberger, Tom Fakterman, Robert Falcone. (2023, September 22). Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda. Retrieved September 9, 2025.
×

[8]ページ先頭

©2009-2026 Movatter.jp