| Name | Description |
|---|---|
| APT15 | |
| Mirage | |
| Vixen Panda | |
| GREF | |
| Playful Dragon | |
| RoyalAPT | |
| NICKEL | |
| Nylon Typhoon |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1213 | .002 | 从信息存储库获取数据: Sharepoint |
Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember.[2] |
| Enterprise | T1005 | 从本地系统获取数据 |
Ke3chang gathered information and files from local directories for exfiltration.[1][4] |
|
| Enterprise | T1036 | .002 | 伪装: Right-to-Left Override |
Ke3chang has used the right-to-left override character in spearphishing attachment names to trick targets into executing .scr and .exe files.[1] |
| .005 | 伪装: Match Legitimate Name or Location |
Ke3chang has dropped their malware into legitimate installed software paths including: |
||
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Ke3chang backdoor RoyalDNS established persistence through adding a service called |
| Enterprise | T1190 | 利用公开应用程序漏洞 |
Ke3chang has compromised networks by exploiting Internet-facing applications, including vulnerable Microsoft Exchange and SharePoint servers.[4] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Ke3chang has deobfuscated Base64-encoded shellcode strings prior to loading them.[4] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Several Ke3chang backdoors achieved persistence by adding a Run key.[2] |
| Enterprise | T1059 | 命令与脚本解释器 |
Malware used by Ke3chang can run commands on the command-line interface.[1][2] |
|
| .003 | Windows Command Shell |
Ke3chang has used batch scripts in its malware to install persistence mechanisms.[2] |
||
| Enterprise | T1133 | 外部远程服务 |
Ke3chang has gained access through VPNs including with compromised accounts and stolen VPN certificates.[2][4] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Ke3chang malware including RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer (IE) by using the COM interface IWebBrowser2.[2][4] |
| .004 | 应用层协议: DNS | |||
| Enterprise | T1587 | .001 | 开发能力: Malware |
Ke3chang has developed custom malware that allowed them to maintain persistence on victim networks.[4] |
| Enterprise | T1560 | 归档收集数据 |
The Ke3chang group has been known to compress data before exfiltration.[1] |
|
| .001 | Archive via Utility |
Ke3chang is known to use 7Zip and RAR with passwords to encrypt data prior to exfiltration.[1][4] |
||
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Ke3chang has dumped credentials, including by using Mimikatz.[1][2][4] |
| .002 | 操作系统凭证转储: Security Account Manager |
Ke3chang has dumped credentials, including by using gsecdump.[1][2] |
||
| .003 | 操作系统凭证转储: NTDS |
Ke3chang has used NTDSDump and other password dumping tools to gather credentials.[4] |
||
| .004 | 操作系统凭证转储: LSA Secrets |
Ke3chang has dumped credentials, including by using gsecdump.[1][2] |
||
| Enterprise | T1083 | 文件和目录发现 |
Ke3chang uses command-line interaction to search files and directories.[1][4] |
|
| Enterprise | T1078 | 有效账户 |
Ke3chang has used credential dumpers or stealers to obtain legitimate credentials, which they used to gain access to victim accounts.[4] |
|
| .004 | Cloud Accounts |
Ke3chang has used compromised credentials to sign into victims’ Microsoft 365 accounts.[4] |
||
| Enterprise | T1069 | .002 | 权限组发现: Domain Groups |
Ke3chang performs discovery of permission groups |
| Enterprise | T1027 | 混淆文件或信息 | ||
| Enterprise | T1114 | .002 | 电子邮件收集: Remote Email Collection |
Ke3chang has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes.[2][4] |
| Enterprise | T1558 | .001 | 窃取或伪造Kerberos票据: Golden Ticket |
Ke3chang has used Mimikatz to generate Kerberos golden tickets.[2] |
| Enterprise | T1614 | .001 | 系统位置发现: System Language Discovery |
Ke3chang has used implants to collect the system language ID of a compromised machine.[4] |
| Enterprise | T1082 | 系统信息发现 |
Ke3chang performs operating system information discovery using |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Ke3chang has used implants capable of collecting the signed-in username.[4] |
|
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
Ke3chang has used a tool known as RemoteExec (similar to PsExec) to remotely execute batch scripts and binaries.[2] |
| Enterprise | T1007 | 系统服务发现 |
Ke3chang performs service discovery using |
|
| Enterprise | T1049 | 系统网络连接发现 |
Ke3chang performs local network connection discovery using |
|
| Enterprise | T1016 | 系统网络配置发现 |
Ke3chang has performed local network configuration discovery using |
|
| Enterprise | T1119 | 自动化收集 |
Ke3chang has performed frequent and scheduled data collection from victim networks.[4] |
|
| Enterprise | T1020 | 自动化渗出 |
Ke3chang has performed frequent and scheduled data exfiltration from compromised networks.[4] |
|
| Enterprise | T1588 | .002 | 获取能力: Tool | |
| Enterprise | T1087 | .001 | 账号发现: Local Account |
Ke3chang performs account discovery using commands such as |
| .002 | 账号发现: Domain Account |
Ke3chang performs account discovery using commands such as |
||
| Enterprise | T1105 | 输入工具传输 |
Ke3chang has used tools to download files to compromised machines.[4] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1057 | 进程发现 |
Ke3chang performs process discovery using |
|
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares |
Ke3chang actors have been known to copy files to the network shares of other computers to move laterally.[1][2] |
| Enterprise | T1018 | 远程系统发现 |
Ke3chang has used network scanning and enumeration tools, including Ping.[2] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Ke3chang transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations.[1] |
|