G0027 Threat Group-3390
Threat Group-3390 is a Chinese threat group that has extensively used strategic Web compromises to target victims.2 The group has been active since at least 2010 and has targeted organizations in the aerospace, government, defense, technology, energy, manufacturing and gambling/betting sectors.168
Item | Value |
---|---|
ID | G0027 |
Associated Names | Earth Smilodon, TG-3390, Emissary Panda, BRONZE UNION, APT27, Iron Tiger, LuckyMouse |
Version | 2.1 |
Created | 31 May 2017 |
Last Modified | 29 March 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
Earth Smilodon | 7 |
TG-3390 | 295 |
Emissary Panda | 496537 |
BRONZE UNION | 19 |
APT27 | 9657 |
Iron Tiger | 57 |
LuckyMouse | 657 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1548 | Abuse Elevation Control Mechanism | - |
enterprise | T1548.002 | Bypass User Account Control | A Threat Group-3390 tool can use a public UAC bypass method to elevate privileges.9 |
enterprise | T1087 | Account Discovery | - |
enterprise | T1087.001 | Local Account | Threat Group-3390 has used net user to conduct internal discovery of systems.1 |
enterprise | T1583 | Acquire Infrastructure | - |
enterprise | T1583.001 | Domains | Threat Group-3390 has registered domains for C2.11 |
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | Threat Group-3390 malware has used HTTP for C2.6 |
enterprise | T1560 | Archive Collected Data | - |
enterprise | T1560.002 | Archive via Library | Threat Group-3390 has used RAR to compress, encrypt, and password-protect files prior to exfiltration.1 |
enterprise | T1119 | Automated Collection | Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user’s directories.1 |
enterprise | T1547 | Boot or Logon Autostart Execution | - |
enterprise | T1547.001 | Registry Run Keys / Startup Folder | Threat Group-3390‘s malware can add a Registry key to Software\Microsoft\Windows\CurrentVersion\Run for persistence.911 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.001 | PowerShell | Threat Group-3390 has used PowerShell for execution.18 |
enterprise | T1059.003 | Windows Command Shell | Threat Group-3390 has used command-line interfaces for execution.13 |
enterprise | T1543 | Create or Modify System Process | - |
enterprise | T1543.003 | Windows Service | Threat Group-3390‘s malware can create a new service, sometimes naming it after the config information, to gain persistence.911 |
enterprise | T1555 | Credentials from Password Stores | - |
enterprise | T1555.005 | Password Managers | Threat Group-3390 obtained a KeePass database from a compromised host.8 |
enterprise | T1005 | Data from Local System | Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user’s directories.1 |
enterprise | T1074 | Data Staged | - |
enterprise | T1074.001 | Local Data Staging | Threat Group-3390 has locally staged encrypted archives for later exfiltration efforts.1 |
enterprise | T1074.002 | Remote Data Staging | Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration.1 |
enterprise | T1030 | Data Transfer Size Limits | Threat Group-3390 actors have split RAR files for exfiltration into parts.2 |
enterprise | T1140 | Deobfuscate/Decode Files or Information | During execution, Threat Group-3390 malware deobfuscates and decompresses code that was encoded with Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.6 |
enterprise | T1189 | Drive-by Compromise | Threat Group-3390 has extensively used strategic web compromises to target victims.26 |
enterprise | T1567 | Exfiltration Over Web Service | - |
enterprise | T1567.002 | Exfiltration to Cloud Storage | Threat Group-3390 has exfiltrated stolen data to Dropbox.8 |
enterprise | T1190 | Exploit Public-Facing Application | Threat Group-3390 has exploited the Microsoft SharePoint vulnerability CVE-2019-0604 and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in Exchange Server.7 |
enterprise | T1203 | Exploitation for Client Execution | Threat Group-3390 has exploited CVE-2018-0798 in Equation Editor.7 |
enterprise | T1068 | Exploitation for Privilege Escalation | Threat Group-3390 has used CVE-2014-6324 and CVE-2017-0213 to escalate privileges.110 |
enterprise | T1210 | Exploitation of Remote Services | Threat Group-3390 has exploited MS17-010 to move laterally to other systems on the network.3 |
enterprise | T1133 | External Remote Services | Threat Group-3390 actors look for and use VPN profiles during an operation to access the network using external VPN services.2 Threat Group-3390 has also obtained OWA account credentials during intrusions that it subsequently used to attempt to regain access when evicted from a victim network.1 |
enterprise | T1574 | Hijack Execution Flow | - |
enterprise | T1574.001 | DLL Search Order Hijacking | Threat Group-3390 has performed DLL search order hijacking to execute their payload.9 |
enterprise | T1574.002 | DLL Side-Loading | Threat Group-3390 has used DLL side-loading, including by using legitimate Kaspersky antivirus variants as well as rc.exe , a legitimate Microsoft Resource Compiler.216311 |
enterprise | T1562 | Impair Defenses | - |
enterprise | T1562.002 | Disable Windows Event Logging | Threat Group-3390 has used appcmd.exe to disable logging on a victim server.1 |
enterprise | T1070 | Indicator Removal | - |
enterprise | T1070.004 | File Deletion | Threat Group-3390 has deleted existing logs and exfiltrated file archives from a victim.18 |
enterprise | T1070.005 | Network Share Connection Removal | Threat Group-3390 has detached network shares after exfiltrating files, likely to evade detection.1 |
enterprise | T1105 | Ingress Tool Transfer | Threat Group-3390 has downloaded additional malware and tools, including through the use of certutil , onto a compromised host .28 |
enterprise | T1056 | Input Capture | - |
enterprise | T1056.001 | Keylogging | Threat Group-3390 actors installed a credential logger on Microsoft Exchange servers. Threat Group-3390 also leveraged the reconnaissance framework, ScanBox, to capture keystrokes.256 |
enterprise | T1112 | Modify Registry | A Threat Group-3390 tool has created new Registry keys under HKEY_CURRENT_USER\Software\Classes\ and HKLM\SYSTEM\CurrentControlSet\services .97 |
enterprise | T1046 | Network Service Discovery | Threat Group-3390 actors use the Hunter tool to conduct network service discovery for vulnerable systems.23 |
enterprise | T1027 | Obfuscated Files or Information | A Threat Group-3390 tool can encrypt payloads using XOR. Threat Group-3390 malware is also obfuscated using Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.963 |
enterprise | T1027.002 | Software Packing | Threat Group-3390 has packed malware and tools, including using VMProtect.87 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.002 | Tool | Threat Group-3390 has obtained and used tools such as Impacket, pwdump, Mimikatz, gsecdump, NBTscan, and Windows Credential Editor.32 |
enterprise | T1588.003 | Code Signing Certificates | Threat Group-3390 has obtained stolen valid certificates, including from VMProtect and the Chinese instant messaging application Youdu, for their operations.11 |
enterprise | T1003 | OS Credential Dumping | - |
enterprise | T1003.001 | LSASS Memory | Threat Group-3390 actors have used a modified version of Mimikatz called Wrapikatz to dump credentials. They have also dumped credentials from domain controllers.21 |
enterprise | T1003.002 | Security Account Manager | Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.21 |
enterprise | T1003.004 | LSA Secrets | Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.21 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | Threat Group-3390 has used e-mail to deliver malicious attachments to victims.8 |
enterprise | T1055 | Process Injection | - |
enterprise | T1055.012 | Process Hollowing | A Threat Group-3390 tool can spawn svchost.exe and inject the payload into that process.96 |
enterprise | T1012 | Query Registry | A Threat Group-3390 tool can read and decrypt stored Registry values.9 |
enterprise | T1021 | Remote Services | - |
enterprise | T1021.006 | Windows Remote Management | Threat Group-3390 has used WinRM to enable remote execution.1 |
enterprise | T1018 | Remote System Discovery | Threat Group-3390 has used the net view command.9 |
enterprise | T1053 | Scheduled Task/Job | - |
enterprise | T1053.002 | At | Threat Group-3390 actors use at to schedule tasks to run self-extracting RAR archives, which install HTTPBrowser or PlugX on other victims on a network.2 |
enterprise | T1505 | Server Software Component | - |
enterprise | T1505.003 | Web Shell | Threat Group-3390 has used a variety of Web shells.3 |
enterprise | T1608 | Stage Capabilities | - |
enterprise | T1608.001 | Upload Malware | Threat Group-3390 has hosted malicious payloads on Dropbox.8 |
enterprise | T1608.002 | Upload Tool | Threat Group-3390 has staged tools, including gsecdump and WCE, on previously compromised websites.2 |
enterprise | T1608.004 | Drive-by Target | Threat Group-3390 has embedded malicious code into websites to screen a potential victim’s IP address and then exploit their browser if they are of interest.4 |
enterprise | T1195 | Supply Chain Compromise | - |
enterprise | T1195.002 | Compromise Software Supply Chain | Threat Group-3390 has compromised the Able Desktop installer to gain access to victim’s environments.7 |
enterprise | T1016 | System Network Configuration Discovery | Threat Group-3390 actors use NBTscan to discover vulnerable systems.2 |
enterprise | T1049 | System Network Connections Discovery | Threat Group-3390 has used net use and netstat to conduct internal discovery of systems. The group has also used quser.exe to identify existing RDP sessions on a victim.1 |
enterprise | T1033 | System Owner/User Discovery | Threat Group-3390 has used whoami to collect system user information.8 |
enterprise | T1199 | Trusted Relationship | Threat Group-3390 has compromised third party service providers to gain access to victim’s environments.10 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.002 | Malicious File | Threat Group-3390 has lured victims into opening malicious files containing malware.8 |
enterprise | T1078 | Valid Accounts | Threat Group-3390 actors obtain legitimate credentials using a variety of methods and use them to further lateral movement on victim networks.2 |
enterprise | T1047 | Windows Management Instrumentation | A Threat Group-3390 tool can use WMI to execute a binary.9 |
Software
References
-
Counter Threat Unit Research Team. (2017, June 27). BRONZE UNION Cyberespionage Persists Despite Disclosures. Retrieved July 13, 2017. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019. ↩↩↩↩↩↩↩↩↩↩↩↩
-
Gallagher, S.. (2015, August 5). Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”. Retrieved January 25, 2016. ↩↩
-
Khandelwal, S. (2018, June 14). Chinese Hackers Carried Out Country-Level Watering Hole Attack. Retrieved August 18, 2018. ↩↩↩↩↩↩↩
-
Legezo, D. (2018, June 13). LuckyMouse hits national data center to organize country-level waterholing campaign. Retrieved August 18, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩
-
Lunghi, D. and Lu, K. (2021, April 9). Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware. Retrieved November 12, 2021. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Pantazopoulos, N., Henry T. (2018, May 18). Emissary Panda – A potential new malicious tool. Retrieved June 25, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Global Threat Center, Intelligence Team. (2020, December). APT27 Turns to Ransomware. Retrieved November 12, 2021. ↩↩↩↩↩↩↩
-
Daniel Lunghi. (2023, March 1). Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting. Retrieved March 20, 2023. ↩↩↩↩↩
-
Chen, T. and Chen, Z. (2020, February 17). CLAMBLING - A New Backdoor Base On Dropbox. Retrieved November 12, 2021. ↩
-
Counter Threat Unit Research Team. (2019, February 27). A Peek into BRONZE UNION’s Toolbox. Retrieved September 24, 2019. ↩↩