Skip to content

G1042 RedEcho

RedEcho is a People’s Republic of China-related threat actor associated with long-running intrusions in Indian critical infrastructure entities. RedEcho overlaps with various other PRC-linked threat groups, such as APT41, and is linked to ShadowPad malware use through shared infrastructure.12

Item Value
ID G1042
Associated Names
Version 1.0
Created 21 November 2024
Last Modified 13 March 2025
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1583 Acquire Infrastructure -
enterprise T1583.001 Domains RedEcho has registered domains spoofing Indian critical infrastructure entities.1
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols RedEcho network activity is associated with SSL traffic via TCP 443 and proxied HTTP traffic over non-standard ports.1
enterprise T1568 Dynamic Resolution RedEcho used dynamic DNS domains associated with malicious infrastructure.1
enterprise T1573 Encrypted Channel -
enterprise T1573.002 Asymmetric Cryptography RedEcho uses SSL for network communication.1
enterprise T1571 Non-Standard Port RedEcho has used non-standard ports such as TCP 8080 for HTTP communication.1

Software

ID Name References Techniques
S0596 ShadowPad RedEcho has used ShadowPad during intrusions.12 DNS:Application Layer Protocol File Transfer Protocols:Application Layer Protocol Web Protocols:Application Layer Protocol Non-Standard Encoding:Data Encoding Deobfuscate/Decode Files or Information Domain Generation Algorithms:Dynamic Resolution Indicator Removal Ingress Tool Transfer Local Storage Discovery Modify Registry Non-Application Layer Protocol Fileless Storage:Obfuscated Files or Information Obfuscated Files or Information Process Discovery Process Injection Dynamic-link Library Injection:Process Injection Scheduled Transfer System Information Discovery System Network Configuration Discovery System Owner/User Discovery System Time Discovery

References