APT1

APT1 is a Chinese threat group that has been attributed to the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department, commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398. [1]

ID: G0006
Associated Groups: Comment Crew, Comment Group, Comment Panda
Version: 1.4
Created: 31 May 2017
Last Modified: 26 May 2021

Associated Group Descriptions

Name Description
Comment Crew

[1]

Comment Group

[1]

Comment Panda

[2]

Techniques Used

Domain ID Name Use
Enterprise T1005 从本地系统获取数据

APT1 has collected files from a local victim.[1]

Enterprise T1036 .005 伪装: Match Legitimate Name or Location

The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used by APT1 as a name for malware.[1][3]

Enterprise T1550 .002 使用备用认证材料: Pass the Hash

The APT1 group is known to have used pass the hash.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.[1]

Enterprise T1584 .001 基础设施妥协: Domains

APT1 hijacked FQDNs associated with legitimate websites hosted by hop points.[1]

Enterprise T1585 .002 建立账户: Email Accounts

APT1 has created email accounts for later use in social engineering, phishing, and when registering domains.[1]

Enterprise T1560 .001 归档收集数据: Archive via Utility

APT1 has used RAR to compress files before moving them outside of the victim network.[1]

Enterprise T1003 .001 操作系统凭证转储: LSASS Memory

APT1 has been known to use credential dumping using Mimikatz.[1]

Enterprise T1114 .001 电子邮件收集: Local Email Collection

APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.[1]

.002 电子邮件收集: Remote Email Collection

APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived.[1]

Enterprise T1007 系统服务发现

APT1 used the commands net start and tasklist to get a listing of the services on the system.[1]

Enterprise T1049 系统网络连接发现

APT1 used the net use command to get a listing on network connections.[1]

Enterprise T1016 系统网络配置发现

APT1 used the ipconfig /all command to gather network configuration information.[1]

Enterprise T1135 网络共享发现

APT1 listed connected network shares.[1]

Enterprise T1119 自动化收集

APT1 used a batch script to perform a series of discovery techniques and saves it to a text file.[1]

Enterprise T1583 .001 获取基础设施: Domains

APT1 has registered hundreds of domains for use in operations.[1]

Enterprise T1588 .001 获取能力: Malware

APT1 used publicly available malware for privilege escalation.[1]

.002 获取能力: Tool

APT1 has used various open-source tools for privilege escalation purposes.[1]

Enterprise T1087 .001 账号发现: Local Account

APT1 used the commands net localgroup,net user, and net group to find accounts on the system.[1]

Enterprise T1057 进程发现

APT1 gathered a list of running processes on the system using tasklist /v.[1]

Enterprise T1021 .001 远程服务: Remote Desktop Protocol

The APT1 group is known to have used RDP during operations.[4]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

APT1 has sent spearphishing emails containing malicious attachments.[1]

.002 钓鱼: Spearphishing Link

APT1 has sent spearphishing emails containing hyperlinks to malicious files.[1]

Software

ID Name References Techniques
S0017 BISCUIT [1] 加密通道: Asymmetric Cryptography, 命令与脚本解释器: Windows Command Shell, 回退信道, 屏幕捕获, 系统信息发现, 系统所有者/用户发现, 系统时间发现, 输入工具传输, 输入捕获: Keylogging, 进程发现
S0119 Cachedump [1] 操作系统凭证转储: Cached Domain Credentials
S0025 CALENDAR [1] 命令与脚本解释器: Windows Command Shell, 网络服务: Bidirectional Communication
S0026 GLOOXMAIL [1] 应用层协议: Publish/Subscribe Protocols, 网络服务: Bidirectional Communication
S0008 gsecdump [1] 操作系统凭证转储: Security Account Manager, 操作系统凭证转储: LSA Secrets
S0100 ipconfig [1] 系统网络配置发现
S0121 Lslsass [1] 操作系统凭证转储: LSASS Memory
S0002 Mimikatz [1] 从密码存储中获取凭证, 从密码存储中获取凭证: Credentials from Web Browsers, 从密码存储中获取凭证: Windows Credential Manager, 伪造域控制器, 使用备用认证材料: Pass the Hash, 使用备用认证材料: Pass the Ticket, 启动或登录自动启动执行: Security Support Provider, 操作系统凭证转储: DCSync, 操作系统凭证转储: Security Account Manager, 操作系统凭证转储: LSASS Memory, 操作系统凭证转储: LSA Secrets, 未加密凭证: Private Keys, 窃取或伪造Kerberos票据: Golden Ticket, 窃取或伪造Kerberos票据: Silver Ticket, 窃取或伪造身份认证证书, 访问令牌操控: SID-History Injection, 账号操控
S0039 Net [1] 创建账户: Local Account, 创建账户: Domain Account, 密码策略发现, 权限组发现: Domain Groups, 权限组发现: Local Groups, 移除指标: Network Share Connection Removal, 系统时间发现, 系统服务: Service Execution, 系统服务发现, 系统网络连接发现, 网络共享发现, 账号发现: Domain Account, 账号发现: Local Account, 账号操控: Additional Local or Domain Groups, 远程服务: SMB/Windows Admin Shares, 远程系统发现
S0122 Pass-The-Hash Toolkit [1] 使用备用认证材料: Pass the Hash
S0012 PoisonIvy [1] Rootkit, 从本地系统获取数据, 修改注册表, 创建或修改系统进程: Windows Service, 加密通道: Symmetric Cryptography, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 启动或登录自动启动执行: Active Setup, 命令与脚本解释器: Windows Command Shell, 应用窗口发现, 执行保护: Mutual Exclusion, 数据分段: Local Data Staging, 混淆文件或信息, 输入工具传输, 输入捕获: Keylogging, 进程注入: Dynamic-link Library Injection
S0029 PsExec [1] 创建或修改系统进程: Windows Service, 创建账户: Domain Account, 横向工具传输, 系统服务: Service Execution, 远程服务: SMB/Windows Admin Shares
S0006 pwdump [1] 操作系统凭证转储: Security Account Manager
S0345 Seasalt [3][5] 伪装: Masquerade Task or Service, 创建或修改系统进程: Windows Service, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 命令与脚本解释器: Windows Command Shell, 应用层协议: Web Protocols, 文件和目录发现, 混淆文件或信息: Encrypted/Encoded File, 移除指标: File Deletion, 输入工具传输, 进程发现
S0057 Tasklist [1] 系统服务发现, 软件发现: Security Software Discovery, 进程发现
S0109 WEBC2 [1] 劫持执行流: DLL Search Order Hijacking, 命令与脚本解释器: Windows Command Shell, 输入工具传输
S0123 xCmd [3] 系统服务: Service Execution

References