Mustang Panda is a China-based cyber espionage threat actor that was first observed in 2017 but may have been conducting operations since at least 2014. Mustang Panda has targeted government entities, nonprofits, religious, and other non-governmental organizations in the U.S., Europe, Mongolia, Myanmar, Pakistan, and Vietnam, among others.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Mustang Panda has executed PowerShell scripts via WMI.[2][3] |
|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence.[3] |
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Mustang Panda has used names like |
| .007 | 伪装: Double File Extension |
Mustang Panda has used an additional filename extension to hide the true file type.[1][2] |
||
| Enterprise | T1598 | .003 | 信息钓鱼: Spearphishing Link |
Mustang Panda has delivered web bugs to profile their intended targets.[6] |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Mustang Panda has encrypted C2 communications with RC4.[5] |
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
Mustang Panda has used a legitimately signed executable to execute a malicious payload within a DLL file.[2][5][4] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Mustang Panda has created the registry key |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Mustang Panda has used malicious PowerShell scripts to enable execution.[1][2] |
| .003 | 命令与脚本解释器: Windows Command Shell |
Mustang Panda has executed HTA files via cmd.exe, and used batch scripts for collection.[2][7] |
||
| .005 | 命令与脚本解释器: Visual Basic |
Mustang Panda has embedded VBScript components in LNK files to download additional files and automate collection.[1][2][3] |
||
| Enterprise | T1203 | 客户端执行漏洞利用 |
Mustang Panda has exploited CVE-2017-0199 in Microsoft Word to execute code.[1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Mustang Panda has communicated with its C2 via HTTP POST requests.[2][3][5][8] |
| Enterprise | T1585 | .002 | 建立账户: Email Accounts |
Mustang Panda has leveraged the legitimate email marketing service SMTP2Go for phishing campaigns.[6] |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Mustang Panda has used RAR to create password-protected archives of collected documents prior to exfiltration.[3][7] |
| .003 | 归档收集数据: Archive via Custom Method |
Mustang Panda has encrypted documents with RC4 prior to exfiltration.[7] |
||
| Enterprise | T1003 | .003 | 操作系统凭证转储: NTDS |
Mustang Panda has used vssadmin to create a volume shadow copy and retrieve the NTDS.dit file. Mustang Panda has also used |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Mustang Panda has stored collected credential files in |
| Enterprise | T1083 | 文件和目录发现 |
Mustang Panda has searched the entire target system for DOC, DOCX, PPT, PPTX, XLS, XLSX, and PDF files.[7] |
|
| Enterprise | T1608 | 暂存能力 |
Mustang Panda has used servers under their control to validate tracking pixels sent to phishing victims.[6] |
|
| .001 | Upload Malware |
Mustang Panda has hosted malicious payloads on DropBox including PlugX.[6] |
||
| Enterprise | T1027 | 混淆文件或信息 |
Mustang Panda has delivered initial payloads hidden using archives and encoding measures.[1][2][3][5][4][6] |
|
| .001 | Binary Padding |
Mustang Panda has used junk code within their DLL files to hinder analysis.[7] |
||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Mustang Panda has sent malicious links including links directing victims to a Google Drive folder.[1][8][6] |
| .002 | 用户执行: Malicious File |
Mustang Panda has sent malicious files requiring direct victim interaction to execute.[1][2][7][5][9][6] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Mustang Panda will delete their tools and files, and kill processes after their objectives are reached.[3] |
| Enterprise | T1218 | .004 | 系统二进制代理执行: InstallUtil |
Mustang Panda has used |
| .005 | 系统二进制代理执行: Mshta |
Mustang Panda has used mshta.exe to launch collection scripts.[3] |
||
| Enterprise | T1082 | 系统信息发现 |
Mustang Panda has gathered system information using |
|
| Enterprise | T1049 | 系统网络连接发现 |
Mustang Panda has used |
|
| Enterprise | T1016 | 系统网络配置发现 |
Mustang Panda has used |
|
| Enterprise | T1102 | 网络服务 |
Mustang Panda has used DropBox URLs to deliver variants of PlugX.[6] |
|
| Enterprise | T1119 | 自动化收集 |
Mustang Panda used custom batch scripts to collect files automatically from a targeted system.[3] |
|
| Enterprise | T1583 | .001 | 获取基础设施: Domains |
Mustang Panda have acquired C2 domains prior to operations.[3][5][8] |
| Enterprise | T1518 | 软件发现 |
Mustang Panda has searched the victim system for the |
|
| Enterprise | T1105 | 输入工具传输 |
Mustang Panda has downloaded additional executables following the initial infection stage.[5] |
|
| Enterprise | T1057 | 进程发现 |
Mustang Panda has used |
|
| Enterprise | T1219 | 远程访问软件 |
Mustang Panda has installed TeamViewer on targeted systems.[3] |
|
| Enterprise | T1091 | 通过可移动媒体复制 |
Mustang Panda has used a customized PlugX variant which could spread through USB connections.[7] |
|
| Enterprise | T1052 | .001 | 通过物理介质渗出: Exfiltration over USB |
Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks.[7] |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Mustang Panda has used spearphishing attachments to deliver initial access payloads.[5][4][9] |
| .002 | 钓鱼: Spearphishing Link |
Mustang Panda has delivered malicious links to their intended targets.[8] |
||
| Enterprise | T1564 | .001 | 隐藏伪装: Hidden Files and Directories |
Mustang Panda's PlugX variant has created a hidden folder on USB drives named |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Mustang Panda has created a scheduled task to execute additional malicious software, as well as maintain persistence.[2][3][8] |