Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

APT1

APT1 is a Chinese threat group that has been attributed to the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department, commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398. (Citation: Mandiant APT1)
ID: G0006
Associated Groups: Comment Panda, Comment Crew, Comment Group
Version: 1.4
Created: 31 May 2017
Last Modified: 25 Apr 2025

Associated Group Descriptions

Name Description
Comment Panda (Citation: CrowdStrike Putter Panda)
Comment Crew (Citation: Mandiant APT1)
Comment Group (Citation: Mandiant APT1)

Techniques Used

Domain ID Name Use
Enterprise T1087 .001 Account Discovery: Local Account

APT1 used the commands net localgroup,net user, and net group to find accounts on the system.(Citation: Mandiant APT1)

Enterprise T1583 .001 Acquire Infrastructure: Domains

APT1 has registered hundreds of domains for use in operations.(Citation: Mandiant APT1)

Enterprise T1560 .001 Archive Collected Data: Archive via Utility

APT1 has used RAR to compress files before moving them outside of the victim network.(Citation: Mandiant APT1)

Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.(Citation: Mandiant APT1)

Enterprise T1584 .001 Compromise Infrastructure: Domains

APT1 hijacked FQDNs associated with legitimate websites hosted by hop points.(Citation: Mandiant APT1)

Enterprise T1114 .001 Email Collection: Local Email Collection

APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.(Citation: Mandiant APT1)

.002 Email Collection: Remote Email Collection

APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived.(Citation: Mandiant APT1)

Enterprise T1585 .002 Establish Accounts: Email Accounts

APT1 has created email accounts for later use in social engineering, phishing, and when registering domains.(Citation: Mandiant APT1)

Enterprise T1036 .005 Masquerading: Match Legitimate Resource Name or Location

The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used by APT1 as a name for malware.(Citation: Mandiant APT1)(Citation: Mandiant APT1 Appendix)

Enterprise T1003 .001 OS Credential Dumping: LSASS Memory

APT1 has been known to use credential dumping using Mimikatz.(Citation: Mandiant APT1)

Enterprise T1588 .001 Obtain Capabilities: Malware

APT1 used publicly available malware for privilege escalation.(Citation: Mandiant APT1)

.002 Obtain Capabilities: Tool

APT1 has used various open-source tools for privilege escalation purposes.(Citation: Mandiant APT1)

Enterprise T1566 .001 Phishing: Spearphishing Attachment

APT1 has sent spearphishing emails containing malicious attachments.(Citation: Mandiant APT1)

.002 Phishing: Spearphishing Link

APT1 has sent spearphishing emails containing hyperlinks to malicious files.(Citation: Mandiant APT1)

Enterprise T1021 .001 Remote Services: Remote Desktop Protocol

The APT1 group is known to have used RDP during operations.(Citation: FireEye PLA)

Enterprise T1550 .002 Use Alternate Authentication Material: Pass the Hash

The APT1 group is known to have used pass the hash.(Citation: Mandiant APT1)

Software

ID Name References Techniques
S0039 Net (Citation: Mandiant APT1) (Citation: Microsoft Net Utility) (Citation: Savill 1999) Domain Account, Local Account, Domain Groups, System Service Discovery, Network Share Discovery, Additional Local or Domain Groups, SMB/Windows Admin Shares, Local Account, Domain Account, System Network Connections Discovery, Local Groups, Network Share Connection Removal, Password Policy Discovery, Remote System Discovery, Service Execution, System Time Discovery
S0109 WEBC2 (Citation: Mandiant APT1 Appendix) (Citation: Mandiant APT1) DLL, Windows Command Shell, Ingress Tool Transfer
S0100 ipconfig (Citation: Mandiant APT1) (Citation: TechNet Ipconfig) System Network Configuration Discovery
S0057 Tasklist (Citation: Mandiant APT1) (Citation: Microsoft Tasklist) System Service Discovery, Process Discovery, Security Software Discovery
S0121 Lslsass (Citation: Mandiant APT1) LSASS Memory
S0123 xCmd (Citation: Mandiant APT1 Appendix) (Citation: xCmd) Service Execution
S0025 CALENDAR (Citation: Mandiant APT1) Bidirectional Communication, Windows Command Shell
S0006 pwdump (Citation: Mandiant APT1) (Citation: Wikipedia pwdump) Security Account Manager
S0122 Pass-The-Hash Toolkit (Citation: Mandiant APT1) Pass the Hash
S0002 Mimikatz (Citation: Adsecurity Mimikatz Guide) (Citation: Deply Mimikatz) (Citation: Mandiant APT1) Security Account Manager, LSA Secrets, Credentials from Password Stores, Security Support Provider, Rogue Domain Controller, Credentials from Web Browsers, Private Keys, LSASS Memory, Golden Ticket, Pass the Ticket, Steal or Forge Authentication Certificates, Account Manipulation, SID-History Injection, Silver Ticket, Windows Credential Manager, Pass the Hash, DCSync
S0008 gsecdump (Citation: Mandiant APT1) (Citation: TrueSec Gsecdump) Security Account Manager, LSA Secrets
S0012 PoisonIvy (Citation: Breut) (Citation: Darkmoon) (Citation: FireEye Poison Ivy) (Citation: Mandiant APT1) (Citation: Novetta-Axiom) (Citation: Poison Ivy) (Citation: Symantec Darkmoon Aug 2005) (Citation: Symantec Darkmoon Sept 2014) (Citation: Symantec Elderwood Sept 2012) Keylogging, Rootkit, Local Data Staging, Active Setup, Symmetric Cryptography, Windows Service, Data from Local System, Mutual Exclusion, Application Window Discovery, Modify Registry, Registry Run Keys / Startup Folder, Obfuscated Files or Information, Uncommonly Used Port, Windows Command Shell, Ingress Tool Transfer, Dynamic-link Library Injection
S0345 Seasalt (Citation: Mandiant APT1 Appendix) (Citation: McAfee Oceansalt Oct 2018) Encrypted/Encoded File, Windows Service, File and Directory Discovery, Masquerade Task or Service, Process Discovery, Registry Run Keys / Startup Folder, Windows Command Shell, File Deletion, Web Protocols, Ingress Tool Transfer, Custom Command and Control Protocol
S0017 BISCUIT (Citation: Mandiant APT1 Appendix) (Citation: Mandiant APT1) Screen Capture, System Owner/User Discovery, Keylogging, System Information Discovery, Process Discovery, Asymmetric Cryptography, Windows Command Shell, Ingress Tool Transfer, Fallback Channels, System Time Discovery, Custom Command and Control Protocol
S0119 Cachedump (Citation: Mandiant APT1) Cached Domain Credentials
S0026 GLOOXMAIL (Citation: Mandiant APT1) Publish/Subscribe Protocols, Bidirectional Communication
S0029 PsExec (Citation: Mandiant APT1) (Citation: Russinovich Sysinternals) (Citation: SANS PsExec) Windows Service, SMB/Windows Admin Shares, Domain Account, Lateral Tool Transfer, Service Execution

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.