S1221 MOPSLED
MOPSLED is a shellcode-based modular backdoor that has been used by China-nexus cyber espionage actors including UNC3886 and APT41.1
| Item | Value |
|---|---|
| ID | S1221 |
| Associated Names | |
| Type | MALWARE |
| Version | 1.0 |
| Created | 11 June 2025 |
| Last Modified | 11 June 2025 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1071 | Application Layer Protocol | - |
| enterprise | T1071.001 | Web Protocols | MOPSLED can communicate to C2 nodes over HTTP.1 |
| enterprise | T1140 | Deobfuscate/Decode Files or Information | MOPSLED can decrypt obfuscated configuration files.1 |
| enterprise | T1095 | Non-Application Layer Protocol | MOPSLED can use a custom binary protocol over TCP for C2 communication.1 |
| enterprise | T1027 | Obfuscated Files or Information | - |
| enterprise | T1027.013 | Encrypted/Encoded File | MOPSLED can encrypt configuration files with a custom ChaCha20 algorithm.1 |
| enterprise | T1102 | Web Service | MOPSLED can use third-party web services such as GitHub and Google Drive for C2.1 |
| enterprise | T1102.001 | Dead Drop Resolver | MOPSLED has the ability to retrieve a C2 address from a dead drop URL.1 |
Groups That Use This Software
| ID | Name | References |
|---|---|---|
| G1048 | UNC3886 | 1 |
| G0096 | APT41 | 1 |