Daggerfly
Associated Group Descriptions |
|
Name | Description |
---|---|
Evasive Panda | (Citation: Symantec Daggerfly 2023)(Citation: ESET EvasivePanda 2024) |
BRONZE HIGHLAND | (Citation: Symantec Daggerfly 2023)(Citation: ESET EvasivePanda 2024) |
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Daggerfly uses HTTP for command and control communication.(Citation: ESET EvasivePanda 2024) |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Daggerfly used PowerShell to download and execute remote-hosted files on victim systems.(Citation: Symantec Daggerfly 2023) |
Enterprise | T1584 | .004 | Compromise Infrastructure: Server |
Daggerfly compromised web servers hosting updates for software as part of a supply chain intrusion.(Citation: ESET EvasivePanda 2024) |
Enterprise | T1136 | .001 | Create Account: Local Account |
Daggerfly created a local account on victim machines to maintain access.(Citation: Symantec Daggerfly 2023) |
Enterprise | T1587 | .002 | Develop Capabilities: Code Signing Certificates |
Daggerfly created code signing certificates to sign malicious macOS files.(Citation: ESET EvasivePanda 2024) |
Enterprise | T1574 | .002 | Hijack Execution Flow: DLL Side-Loading |
Daggerfly has used legitimate software to side-load PlugX loaders onto victim systems.(Citation: Symantec Daggerfly 2023) Daggerfly is also linked to multiple other instances of side-loading for initial loading activity.(Citation: ESET EvasivePanda 2024) |
Enterprise | T1036 | .003 | Masquerading: Rename System Utilities |
Daggerfly used a renamed version of rundll32.exe, such as "dbengin.exe" located in the `ProgramData\Microsoft\PlayReady` directory, to proxy malicious DLL execution.(Citation: Symantec Daggerfly 2023) |
Enterprise | T1003 | .002 | OS Credential Dumping: Security Account Manager |
Daggerfly used Reg to dump the Security Account Manager (SAM) hive from victim machines for follow-on credential extraction.(Citation: Symantec Daggerfly 2023) |
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
Daggerfly has attempted to use scheduled tasks for persistence in victim environments.(Citation: ESET EvasivePanda 2024) |
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
Daggerfly has used signed, but not notarized, malicious files for execution in macOS environments.(Citation: ESET EvasivePanda 2024) |
Enterprise | T1195 | .002 | Supply Chain Compromise: Compromise Software Supply Chain |
Daggerfly is associated with several supply chain compromises using malicious updates to compromise victims.(Citation: ESET EvasivePanda 2023)(Citation: ESET EvasivePanda 2024) |
Enterprise | T1218 | .011 | System Binary Proxy Execution: Rundll32 |
Daggerfly proxied execution of malicious DLLs through a renamed rundll32.exe binary.(Citation: Symantec Daggerfly 2023) |
Enterprise | T1204 | .001 | User Execution: Malicious Link |
Daggerfly has used strategic website compromise to deliver a malicious link requiring user interaction.(Citation: ESET EvasivePanda 2024) |
References
- Threat Hunter Team. (2023, April 20). Daggerfly: APT Actor Targets Telecoms Company in Africa. Retrieved July 25, 2024.
- Ahn Ho, Facundo Muñoz, & Marc-Etienne M.Léveillé. (2024, March 7). Evasive Panda leverages Monlam Festival to target Tibetans. Retrieved July 25, 2024.
- Facundo Muñoz. (2023, April 26). Evasive Panda APT group delivers malware via updates for popular Chinese software. Retrieved July 25, 2024.
- Threat Hunter Team. (2024, July 23). Daggerfly: Espionage Group Makes Major Update to Toolset. Retrieved July 25, 2024.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.