Skip to content

G0098 BlackTech

BlackTech is a suspected Chinese cyber espionage group that has primarily targeted organizations in East Asia–particularly Taiwan, Japan, and Hong Kong–and the US since at least 2013. BlackTech has used a combination of custom malware, dual-use tools, and living off the land tactics to compromise media, construction, engineering, electronics, and financial company networks.143

Item Value
ID G0098
Associated Names Palmerworm
Version 2.0
Created 05 May 2020
Last Modified 06 April 2022
Navigation Layer View In ATT&CK® Navigator

Associated Group Descriptions

Name Description
Palmerworm 42

Techniques Used

Domain ID Name Use
enterprise T1190 Exploit Public-Facing Application BlackTech has exploited a buffer overflow vulnerability in Microsoft Internet Information Services (IIS) 6.0, CVE-2017-7269, in order to establish a new HTTP or command and control (C2) server.1
enterprise T1203 Exploitation for Client Execution BlackTech has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities CVE-2012-0158, CVE-2014-6352, CVE-2017-0199, and Adobe Flash CVE-2015-5119.1
enterprise T1574 Hijack Execution Flow -
enterprise T1574.002 DLL Side-Loading BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories.6
enterprise T1036 Masquerading -
enterprise T1036.002 Right-to-Left Override BlackTech has used right-to-left-override to obfuscate the filenames of malicious e-mail attachments.1
enterprise T1106 Native API BlackTech has used built-in API functions.2
enterprise T1046 Network Service Discovery BlackTech has used the SNScan tool to find other potential targets on victim networks.4
enterprise T1588 Obtain Capabilities -
enterprise T1588.002 Tool BlackTech has obtained and used tools such as Putty, SNScan, and PsExec for its operations.4
enterprise T1588.003 Code Signing Certificates BlackTech has used stolen code-signing certificates for its malicious payloads.4
enterprise T1588.004 Digital Certificates BlackTech has used valid, stolen digital certificates for some of their malware and tools.7
enterprise T1566 Phishing -
enterprise T1566.001 Spearphishing Attachment BlackTech has used spearphishing e-mails with malicious password-protected archived files (ZIP or RAR) to deliver malware.15
enterprise T1566.002 Spearphishing Link BlackTech has used spearphishing e-mails with links to cloud services to deliver malware.1
enterprise T1021 Remote Services -
enterprise T1021.004 SSH BlackTech has used Putty for remote access.4
enterprise T1204 User Execution -
enterprise T1204.001 Malicious Link BlackTech has used e-mails with malicious links to lure victims into installing malware.1
enterprise T1204.002 Malicious File BlackTech has used e-mails with malicious documents to lure victims into installing malware.15

Software

ID Name References Techniques
S0696 Flagpro - Web Protocols:Application Layer Protocol Application Window Discovery Registry Run Keys / Startup Folder:Boot or Logon Autostart Execution Visual Basic:Command and Scripting Interpreter Windows Command Shell:Command and Scripting Interpreter Standard Encoding:Data Encoding Data from Local System Exfiltration Over C2 Channel Indicator Removal on Host Ingress Tool Transfer Masquerading Native API Network Share Discovery Obfuscated Files or Information Local Groups:Permission Groups Discovery Spearphishing Attachment:Phishing Process Discovery Remote System Discovery Scheduled Transfer System Language Discovery:System Location Discovery System Network Configuration Discovery System Network Connections Discovery System Owner/User Discovery Malicious File:User Execution
S0437 Kivars - File and Directory Discovery Hidden Window:Hide Artifacts File Deletion:Indicator Removal on Host Ingress Tool Transfer Keylogging:Input Capture Remote Services Screen Capture
S0435 PLEAD - Web Protocols:Application Layer Protocol Application Window Discovery Windows Command Shell:Command and Scripting Interpreter Credentials from Web Browsers:Credentials from Password Stores Credentials from Password Stores Junk Data:Data Obfuscation Symmetric Cryptography:Encrypted Channel File and Directory Discovery File Deletion:Indicator Removal on Host Ingress Tool Transfer Native API Process Discovery Proxy Malicious File:User Execution Malicious Link:User Execution
S0029 PsExec - Domain Account:Create Account Windows Service:Create or Modify System Process Lateral Tool Transfer SMB/Windows Admin Shares:Remote Services Service Execution:System Services
S0436 TSCookie - Web Protocols:Application Layer Protocol Windows Command Shell:Command and Scripting Interpreter Credentials from Web Browsers:Credentials from Password Stores Deobfuscate/Decode Files or Information Symmetric Cryptography:Encrypted Channel File and Directory Discovery Ingress Tool Transfer Non-Application Layer Protocol Process Discovery Process Injection Proxy System Network Configuration Discovery Malicious Link:User Execution
S0579 Waterbear - Deobfuscate/Decode Files or Information DLL Side-Loading:Hijack Execution Flow Indicator Blocking:Impair Defenses Ingress Tool Transfer Modify Registry Native API Obfuscated Files or Information Indicator Removal from Tools:Obfuscated Files or Information Process Discovery Process Injection Thread Execution Hijacking:Process Injection Query Registry Security Software Discovery:Software Discovery System Network Connections Discovery

References

Back to top