G0073 APT19
APT19 is a Chinese-based threat group that has targeted a variety of industries, including defense, finance, energy, pharmaceutical, telecommunications, high tech, education, manufacturing, and legal services. In 2017, a phishing campaign was used to target seven law and investment firms. 1 Some analysts track APT19 and Deep Panda as the same group, but it is unclear from open source information if the groups are the same. 5 3 4
Item | Value |
---|---|
ID | G0073 |
Associated Names | Codoso, C0d0so0, Codoso Team, Sunshop Group |
Version | 1.5 |
Created | 17 October 2018 |
Last Modified | 21 March 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
Codoso | 4 |
C0d0so0 | 4 |
Codoso Team | 3 |
Sunshop Group | 2 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | APT19 used HTTP for C2 communications. APT19 also used an HTTP malware variant to communicate over HTTP for C2.14 |
enterprise | T1547 | Boot or Logon Autostart Execution | - |
enterprise | T1547.001 | Registry Run Keys / Startup Folder | An APT19 HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\ .4 |
enterprise | T1059 | Command and Scripting Interpreter | APT19 downloaded and launched code within a SCT file.1 |
enterprise | T1059.001 | PowerShell | APT19 used PowerShell commands to execute payloads.1 |
enterprise | T1543 | Create or Modify System Process | - |
enterprise | T1543.003 | Windows Service | An APT19 Port 22 malware variant registers itself as a service.4 |
enterprise | T1132 | Data Encoding | - |
enterprise | T1132.001 | Standard Encoding | An APT19 HTTP malware variant used Base64 to encode communications to the C2 server.4 |
enterprise | T1140 | Deobfuscate/Decode Files or Information | An APT19 HTTP malware variant decrypts strings using single-byte XOR keys.4 |
enterprise | T1189 | Drive-by Compromise | APT19 performed a watering hole attack on forbes.com in 2014 to compromise targets.4 |
enterprise | T1564 | Hide Artifacts | - |
enterprise | T1564.003 | Hidden Window | APT19 used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. 1 |
enterprise | T1574 | Hijack Execution Flow | - |
enterprise | T1574.002 | DLL Side-Loading | APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.4 |
enterprise | T1112 | Modify Registry | APT19 uses a Port 22 malware variant to modify several Registry keys.4 |
enterprise | T1027 | Obfuscated Files or Information | APT19 used Base64 to obfuscate payloads.1 |
enterprise | T1027.010 | Command Obfuscation | APT19 used Base64 to obfuscate executed commands.1 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.002 | Tool | APT19 has obtained and used publicly-available tools like Empire.61 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.1 |
enterprise | T1218 | System Binary Proxy Execution | - |
enterprise | T1218.010 | Regsvr32 | APT19 used Regsvr32 to bypass application control techniques.1 |
enterprise | T1218.011 | Rundll32 | APT19 configured its payload to inject into the rundll32.exe.1 |
enterprise | T1082 | System Information Discovery | APT19 collected system architecture information. APT19 used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine.14 |
enterprise | T1016 | System Network Configuration Discovery | APT19 used an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim’s machine.4 |
enterprise | T1033 | System Owner/User Discovery | APT19 used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username.4 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.002 | Malicious File | APT19 attempted to get users to launch malicious attachments delivered via spearphishing emails.1 |
Software
References
-
Ahl, I. (2017, June 06). Privileges and Credentials: Phished at the Request of Counsel. Retrieved May 17, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Chickowski, E. (2015, February 10). Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole. Retrieved September 13, 2018. ↩
-
FireEye. (n.d.). Advanced Persistent Threat Groups. Retrieved August 3, 2018. ↩↩
-
Grunzweig, J., Lee, B. (2016, January 22). New Attacks Linked to C0d0so0 Group. Retrieved August 2, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Scott, J. and Spaniel, D. (2016, July 28). ICIT Brief - China’s Espionage Dynasty: Economic Death by a Thousand Cuts. Retrieved June 7, 2018. ↩
-
The Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), CERT New Zealand, the UK National Cyber Security Centre (UK NCSC) and the US National Cybersecurity and Communications Integration Center (NCCIC). (2018, October 11). Joint report on publicly available hacking tools. Retrieved March 11, 2019. ↩↩