Skip to content

G0143 Aquatic Panda

Aquatic Panda is a suspected China-based threat group with a dual mission of intelligence collection and industrial espionage. Active since at least May 2020, Aquatic Panda has primarily targeted entities in the telecommunications, technology, and government sectors.1

Item Value
ID G0143
Associated Names
Version 2.0
Created 18 January 2022
Last Modified 10 October 2024
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1087 Account Discovery Aquatic Panda used the last command in Linux environments to identify recently logged-in users on victim machines.2
enterprise T1595 Active Scanning -
enterprise T1595.002 Vulnerability Scanning Aquatic Panda has used publicly accessible DNS logging services to identify servers vulnerable to Log4j (CVE 2021-44228).1
enterprise T1560 Archive Collected Data -
enterprise T1560.001 Archive via Utility Aquatic Panda has used several publicly available tools, including WinRAR and 7zip, to compress collected files and memory dumps prior to exfiltration.12
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.001 PowerShell Aquatic Panda has downloaded additional scripts and executed Base64 encoded commands in PowerShell.1
enterprise T1059.003 Windows Command Shell Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to cmd /C.1
enterprise T1059.004 Unix Shell Aquatic Panda used malicious shell scripts in Linux environments following access via SSH to install Linux versions of Winnti malware.2
enterprise T1543 Create or Modify System Process -
enterprise T1543.003 Windows Service Aquatic Panda created new Windows services for persistence that masqueraded as legitimate Windows services via name change.2
enterprise T1005 Data from Local System Aquatic Panda captured local Windows security event log data from victim machines using the wevtutil utility to extract contents to an evtx output file.2
enterprise T1574 Hijack Execution Flow -
enterprise T1574.001 DLL Aquatic Panda has used DLL search-order hijacking to load exe, dll, and dat files into memory.1 Aquatic Panda loaded a malicious DLL into the legitimate Windows Security Health Service executable (SecurityHealthService.exe) to execute malicious code on victim systems.2
enterprise T1574.006 Dynamic Linker Hijacking Aquatic Panda modified the ld.so preload file in Linux environments to enable persistence for Winnti malware.2
enterprise T1562 Impair Defenses -
enterprise T1562.001 Disable or Modify Tools Aquatic Panda has attempted to stop endpoint detection and response (EDR) tools on compromised systems.1
enterprise T1070 Indicator Removal -
enterprise T1070.001 Clear Windows Event Logs Aquatic Panda clears Windows Event Logs following activity to evade defenses.2
enterprise T1070.003 Clear Command History Aquatic Panda cleared command history in Linux environments to remove traces of activity after operations.2
enterprise T1070.004 File Deletion Aquatic Panda has deleted malicious executables from compromised machines.12
enterprise T1105 Ingress Tool Transfer Aquatic Panda has downloaded additional malware onto compromised hosts.1
enterprise T1654 Log Enumeration Aquatic Panda enumerated logs related to authentication in Linux environments prior to deleting selective entries for defense evasion purposes.2
enterprise T1036 Masquerading -
enterprise T1036.004 Masquerade Task or Service Aquatic Panda created new, malicious services using names such as Windows User Service to attempt to blend in with legitimate items on victim systems.2
enterprise T1036.005 Match Legitimate Resource Name or Location Aquatic Panda renamed or moved malicious binaries to legitimate locations to evade defenses and blend into victim environments.2
enterprise T1112 Modify Registry Aquatic Panda modified the victim registry to enable the RestrictedAdmin mode feature, allowing for pass the hash behaviors to function via RDP.2
enterprise T1027 Obfuscated Files or Information -
enterprise T1027.010 Command Obfuscation Aquatic Panda has encoded PowerShell commands in Base64.1
enterprise T1588 Obtain Capabilities -
enterprise T1588.001 Malware Aquatic Panda has acquired and used njRAT in its operations.1
enterprise T1588.002 Tool Aquatic Panda has acquired and used Cobalt Strike in its operations.1
enterprise T1003 OS Credential Dumping -
enterprise T1003.001 LSASS Memory Aquatic Panda has attempted to harvest credentials through LSASS memory dumping.1
enterprise T1021 Remote Services Aquatic Panda used remote scheduled tasks to install malicious software on victim systems during lateral movement actions.2
enterprise T1021.001 Remote Desktop Protocol Aquatic Panda leveraged stolen credentials to move laterally via RDP in victim environments.2
enterprise T1021.002 SMB/Windows Admin Shares Aquatic Panda used remote shares to enable lateral movement in victim environments.2
enterprise T1021.004 SSH Aquatic Panda used SSH with captured user credentials to move laterally in victim environments.2
enterprise T1518 Software Discovery -
enterprise T1518.001 Security Software Discovery Aquatic Panda has attempted to discover third party endpoint detection and response (EDR) tools on compromised systems.1
enterprise T1218 System Binary Proxy Execution -
enterprise T1218.011 Rundll32 Aquatic Panda used rundll32.exe to proxy execution of a malicious DLL file identified as a keylogging binary.2
enterprise T1082 System Information Discovery Aquatic Panda has used native OS commands to understand privilege levels and system details.1
enterprise T1033 System Owner/User Discovery Aquatic Panda gathers information on recently logged-in users on victim devices.2
enterprise T1007 System Service Discovery Aquatic Panda has attempted to discover services for third party EDR products.1
enterprise T1550 Use Alternate Authentication Material -
enterprise T1550.002 Pass the Hash Aquatic Panda used a registry edit to enable a Windows feature called RestrictedAdmin in victim environments. This change allowed Aquatic Panda to leverage “pass the hash” mechanisms as the alteration allows for RDP connections with a valid account name and hash only, without possessing a cleartext password value.2
enterprise T1078 Valid Accounts -
enterprise T1078.002 Domain Accounts Aquatic Panda used multiple mechanisms to capture valid user accounts for victim domains to enable lateral movement and access to additional hosts in victim environments.2
enterprise T1047 Windows Management Instrumentation Aquatic Panda used WMI for lateral movement in victim environments.2

Software

ID Name References Techniques
S0154 Cobalt Strike 1 Sudo and Sudo Caching:Abuse Elevation Control Mechanism Bypass User Account Control:Abuse Elevation Control Mechanism Parent PID Spoofing:Access Token Manipulation Token Impersonation/Theft:Access Token Manipulation Make and Impersonate Token:Access Token Manipulation Domain Account:Account Discovery DNS:Application Layer Protocol Web Protocols:Application Layer Protocol File Transfer Protocols:Application Layer Protocol BITS Jobs Browser Session Hijacking JavaScript:Command and Scripting Interpreter Visual Basic:Command and Scripting Interpreter PowerShell:Command and Scripting Interpreter Python:Command and Scripting Interpreter Windows Command Shell:Command and Scripting Interpreter Windows Service:Create or Modify System Process Standard Encoding:Data Encoding Data from Local System Protocol or Service Impersonation:Data Obfuscation Data Transfer Size Limits Deobfuscate/Decode Files or Information Asymmetric Cryptography:Encrypted Channel Symmetric Cryptography:Encrypted Channel Exploitation for Client Execution Exploitation for Privilege Escalation File and Directory Discovery Process Argument Spoofing:Hide Artifacts Disable or Modify Tools:Impair Defenses Timestomp:Indicator Removal Ingress Tool Transfer Keylogging:Input Capture Modify Registry Native API Network Service Discovery Network Share Discovery Non-Application Layer Protocol Indicator Removal from Tools:Obfuscated Files or Information Obfuscated Files or Information Office Template Macros:Office Application Startup LSASS Memory:OS Credential Dumping Security Account Manager:OS Credential Dumping Domain Groups:Permission Groups Discovery Local Groups:Permission Groups Discovery Process Discovery Dynamic-link Library Injection:Process Injection Process Hollowing:Process Injection Process Injection Protocol Tunneling Domain Fronting:Proxy Internal Proxy:Proxy Query Registry Reflective Code Loading Remote Desktop Protocol:Remote Services SSH:Remote Services Windows Remote Management:Remote Services SMB/Windows Admin Shares:Remote Services Distributed Component Object Model:Remote Services Remote System Discovery Scheduled Transfer Screen Capture Software Discovery Code Signing:Subvert Trust Controls Rundll32:System Binary Proxy Execution System Network Configuration Discovery System Network Connections Discovery System Service Discovery Service Execution:System Services Pass the Hash:Use Alternate Authentication Material Domain Accounts:Valid Accounts Local Accounts:Valid Accounts Windows Management Instrumentation
S0385 njRAT 1 Web Protocols:Application Layer Protocol Application Window Discovery Registry Run Keys / Startup Folder:Boot or Logon Autostart Execution PowerShell:Command and Scripting Interpreter Windows Command Shell:Command and Scripting Interpreter Credentials from Web Browsers:Credentials from Password Stores Standard Encoding:Data Encoding Data from Local System Fast Flux DNS:Dynamic Resolution Exfiltration Over C2 Channel File and Directory Discovery Disable or Modify System Firewall:Impair Defenses File Deletion:Indicator Removal Clear Persistence:Indicator Removal Ingress Tool Transfer Keylogging:Input Capture Modify Registry Native API Non-Standard Port Encrypted/Encoded File:Obfuscated Files or Information Compile After Delivery:Obfuscated Files or Information Peripheral Device Discovery Process Discovery Query Registry Remote Desktop Protocol:Remote Services Remote System Discovery Replication Through Removable Media Screen Capture System Information Discovery System Owner/User Discovery Video Capture
S0596 ShadowPad Aquatic Panda used ShadowPad as a remote access tool to victim environments.2 DNS:Application Layer Protocol File Transfer Protocols:Application Layer Protocol Web Protocols:Application Layer Protocol Non-Standard Encoding:Data Encoding Deobfuscate/Decode Files or Information Domain Generation Algorithms:Dynamic Resolution Indicator Removal Ingress Tool Transfer Local Storage Discovery Modify Registry Non-Application Layer Protocol Fileless Storage:Obfuscated Files or Information Obfuscated Files or Information Process Discovery Process Injection Dynamic-link Library Injection:Process Injection Scheduled Transfer System Information Discovery System Network Configuration Discovery System Owner/User Discovery System Time Discovery
S0645 Wevtutil Aquatic Panda uses Wevtutil to extract Windows security event log data from victim machines.2 Data from Local System Disable Windows Event Logging:Impair Defenses Clear Windows Event Logs:Indicator Removal
S0430 Winnti for Linux Aquatic Panda used Winnti for Linux for access to victim Linux hosts during intrusions2. Web Protocols:Application Layer Protocol Deobfuscate/Decode Files or Information Symmetric Cryptography:Encrypted Channel Ingress Tool Transfer Non-Application Layer Protocol Encrypted/Encoded File:Obfuscated Files or Information Rootkit Traffic Signaling
S0141 Winnti for Windows Aquatic Panda used Winnti for Windows for persistent access to Windows victims.2 Bypass User Account Control:Abuse Elevation Control Mechanism Web Protocols:Application Layer Protocol Registry Run Keys / Startup Folder:Boot or Logon Autostart Execution Windows Service:Create or Modify System Process Deobfuscate/Decode Files or Information Symmetric Cryptography:Encrypted Channel Environmental Keying:Execution Guardrails File and Directory Discovery File Deletion:Indicator Removal Timestomp:Indicator Removal Ingress Tool Transfer Match Legitimate Resource Name or Location:Masquerading Native API Non-Application Layer Protocol Compression:Obfuscated Files or Information Encrypted/Encoded File:Obfuscated Files or Information Process Discovery External Proxy:Proxy Internal Proxy:Proxy Rundll32:System Binary Proxy Execution System Information Discovery Service Execution:System Services

References