GALLIUM is a group that has been active since at least 2012, primarily targeting high-profile telecommunications networks. GALLIUM has been identified in some reporting as likely a Chinese state-sponsored group, based in part on tools used and TTPs commonly associated with Chinese threat actors.[1][2]
Name | Description |
---|---|
Operation Soft Cell |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1583 | .004 | Acquire Infrastructure: Server |
GALLIUM has used Taiwan-based servers that appear to be exclusive to GALLIUM.[2] |
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
GALLIUM used WinRAR to compress and encrypt stolen data prior to exfiltration.[1][2] |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
GALLIUM used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines.[1] |
.003 | Command and Scripting Interpreter: Windows Command Shell |
GALLIUM used the Windows command shell to execute commands.[1] |
||
Enterprise | T1136 | .002 | Create Account: Domain Account |
GALLIUM created high-privileged domain user accounts to maintain access to victim networks.[1][2] |
Enterprise | T1005 | Data from Local System |
GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.[1] |
|
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
GALLIUM compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration.[1] |
Enterprise | T1041 | Exfiltration Over C2 Channel |
GALLIUM used Web shells and HTRAN for C2 and to exfiltrate data.[1] |
|
Enterprise | T1190 | Exploit Public-Facing Application |
GALLIUM exploited a publicly-facing servers including Wildfly/JBoss servers to gain access to the network.[1][2] |
|
Enterprise | T1133 | External Remote Services |
GALLIUM has used VPN services, including SoftEther VPN, to access and maintain persistence in victim environments.[1][2] |
|
Enterprise | T1574 | .002 | Hijack Execution Flow: DLL Side-Loading |
GALLIUM used DLL side-loading to covertly load PoisonIvy into memory on the victim machine.[1] |
Enterprise | T1105 | Ingress Tool Transfer |
GALLIUM dropped additional tools to victims during their operation, including portqry.exe, a renamed cmd.exe file, winrar, and HTRAN.[1][2] |
|
Enterprise | T1570 | Lateral Tool Transfer |
GALLIUM has used PsExec to move laterally between hosts in the target network.[2] |
|
Enterprise | T1036 | .003 | Masquerading: Rename System Utilities | |
Enterprise | T1027 | Obfuscated Files or Information |
GALLIUM used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection.[1] |
|
.002 | Software Packing |
GALLIUM packed some payloads using different types of packers, both known and custom.[1] |
||
.005 | Indicator Removal from Tools |
GALLIUM ensured each payload had a unique hash, including by using different types of packers.[1] |
||
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
GALLIUM has used a variety of widely-available tools, which in some cases they modified to add functionality and/or subvert antimalware solutions.[2] |
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
GALLIUM used a modified version of Mimikatz along with a PowerShell-based Mimikatz to dump credentials on the victim machines.[1][2] |
.002 | OS Credential Dumping: Security Account Manager |
GALLIUM used |
||
Enterprise | T1090 | .002 | Proxy: External Proxy |
GALLIUM used a modified version of HTRAN to redirect connections between networks.[1] |
Enterprise | T1018 | Remote System Discovery |
GALLIUM used a modified version of NBTscan to identify available NetBIOS name servers over the network as well as |
|
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
GALLIUM established persistence for PoisonIvy by created a scheduled task.[1] |
Enterprise | T1505 | .003 | Server Software Component: Web Shell |
GALLIUM used Web shells to persist in victim environments and assist in execution and exfiltration.[1][2] |
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
GALLIUM has used stolen certificates to sign its tools including those from Whizzimo LLC.[2] |
Enterprise | T1016 | System Network Configuration Discovery |
GALLIUM used |
|
Enterprise | T1049 | System Network Connections Discovery |
GALLIUM used |
|
Enterprise | T1033 | System Owner/User Discovery |
GALLIUM used |
|
Enterprise | T1550 | .002 | Use Alternate Authentication Material: Pass the Hash |
GALLIUM used dumped hashes to authenticate to other machines via pass the hash.[1] |
Enterprise | T1078 | Valid Accounts |
GALLIUM leveraged valid accounts to maintain access to a victim network.[1] |
|
Enterprise | T1047 | Windows Management Instrumentation |
GALLIUM used WMI for execution to assist in lateral movement as well as for installing tools across multiple assets.[1] |