Aquatic Panda
Associated Group Descriptions |
|
Name | Description |
---|---|
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1595 | .002 | Active Scanning: Vulnerability Scanning |
Aquatic Panda has used publicly accessible DNS logging services to identify servers vulnerable to Log4j (CVE 2021-44228).(Citation: CrowdStrike AQUATIC PANDA December 2021) |
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
Aquatic Panda has used several publicly available tools, including WinRAR and 7zip, to compress collected files and memory dumps prior to exfiltration.(Citation: CrowdStrike AQUATIC PANDA December 2021)(Citation: Crowdstrike HuntReport 2022) |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Aquatic Panda has downloaded additional scripts and executed Base64 encoded commands in PowerShell.(Citation: CrowdStrike AQUATIC PANDA December 2021) |
.003 | Command and Scripting Interpreter: Windows Command Shell |
Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to |
||
.004 | Command and Scripting Interpreter: Unix Shell |
Aquatic Panda used malicious shell scripts in Linux environments following access via SSH to install Linux versions of Winnti malware.(Citation: Crowdstrike HuntReport 2022) |
||
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
Aquatic Panda created new Windows services for persistence that masqueraded as legitimate Windows services via name change.(Citation: Crowdstrike HuntReport 2022) |
Enterprise | T1574 | .001 | Hijack Execution Flow: DLL Search Order Hijacking |
Aquatic Panda has used DLL search-order hijacking to load `exe`, `dll`, and `dat` files into memory.(Citation: CrowdStrike AQUATIC PANDA December 2021) Aquatic Panda loaded a malicious DLL into the legitimate Windows Security Health Service executable ( |
.006 | Hijack Execution Flow: Dynamic Linker Hijacking |
Aquatic Panda modified the |
||
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Aquatic Panda has attempted to stop endpoint detection and response (EDR) tools on compromised systems.(Citation: CrowdStrike AQUATIC PANDA December 2021) |
Enterprise | T1070 | .001 | Indicator Removal: Clear Windows Event Logs |
Aquatic Panda clears Windows Event Logs following activity to evade defenses.(Citation: Crowdstrike HuntReport 2022) |
.003 | Indicator Removal: Clear Command History |
Aquatic Panda cleared command history in Linux environments to remove traces of activity after operations.(Citation: Crowdstrike HuntReport 2022) |
||
.004 | Indicator Removal: File Deletion |
Aquatic Panda has deleted malicious executables from compromised machines.(Citation: CrowdStrike AQUATIC PANDA December 2021)(Citation: Crowdstrike HuntReport 2022) |
||
Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
Aquatic Panda created new, malicious services using names such as |
.005 | Masquerading: Match Legitimate Name or Location |
Aquatic Panda renamed or moved malicious binaries to legitimate locations to evade defenses and blend into victim environments.(Citation: Crowdstrike HuntReport 2022) |
||
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
Aquatic Panda has attempted to harvest credentials through LSASS memory dumping.(Citation: CrowdStrike AQUATIC PANDA December 2021) |
Enterprise | T1027 | .010 | Obfuscated Files or Information: Command Obfuscation |
Aquatic Panda has encoded PowerShell commands in Base64.(Citation: CrowdStrike AQUATIC PANDA December 2021) |
Enterprise | T1588 | .001 | Obtain Capabilities: Malware |
Aquatic Panda has acquired and used njRAT in its operations.(Citation: CrowdStrike AQUATIC PANDA December 2021) |
.002 | Obtain Capabilities: Tool |
Aquatic Panda has acquired and used Cobalt Strike in its operations.(Citation: CrowdStrike AQUATIC PANDA December 2021) |
||
Enterprise | T1021 | .001 | Remote Services: Remote Desktop Protocol |
Aquatic Panda leveraged stolen credentials to move laterally via RDP in victim environments.(Citation: Crowdstrike HuntReport 2022) |
.002 | Remote Services: SMB/Windows Admin Shares |
Aquatic Panda used remote shares to enable lateral movement in victim environments.(Citation: Crowdstrike HuntReport 2022) |
||
.004 | Remote Services: SSH |
Aquatic Panda used SSH with captured user credentials to move laterally in victim environments.(Citation: Crowdstrike HuntReport 2022) |
||
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
Aquatic Panda has attempted to discover third party endpoint detection and response (EDR) tools on compromised systems.(Citation: CrowdStrike AQUATIC PANDA December 2021) |
Enterprise | T1218 | .011 | System Binary Proxy Execution: Rundll32 |
Aquatic Panda used rundll32.exe to proxy execution of a malicious DLL file identified as a keylogging binary.(Citation: Crowdstrike HuntReport 2022) |
Enterprise | T1550 | .002 | Use Alternate Authentication Material: Pass the Hash |
Aquatic Panda used a registry edit to enable a Windows feature called |
Enterprise | T1078 | .002 | Valid Accounts: Domain Accounts |
Aquatic Panda used multiple mechanisms to capture valid user accounts for victim domains to enable lateral movement and access to additional hosts in victim environments.(Citation: Crowdstrike HuntReport 2022) |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.