Aquatic Panda is a suspected China-based threat group with a dual mission of intelligence collection and industrial espionage. Active since at least May 2020, Aquatic Panda has primarily targeted entities in the telecommunications, technology, and government sectors.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1595 | .002 | Active Scanning: Vulnerability Scanning |
Aquatic Panda has used publicly accessible DNS logging services to identify servers vulnerable to Log4j (CVE 2021-44228).[1] |
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
Aquatic Panda has used WinRAR to compress memory dumps prior to exfiltration.[1] |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Aquatic Panda has downloaded additional scripts and executed Base64 encoded commands in PowerShell.[1] |
.003 | Command and Scripting Interpreter: Windows Command Shell |
Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to |
||
Enterprise | T1574 | .001 | Hijack Execution Flow: DLL Search Order Hijacking |
Aquatic Panda has used DLL search-order hijacking to load |
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Aquatic Panda has attempted to stop endpoint detection and response (EDR) tools on compromised systems.[1] |
Enterprise | T1070 | .004 | Indicator Removal on Host: File Deletion |
Aquatic Panda has deleted malicious executables from compromised machines.[1] |
Enterprise | T1105 | Ingress Tool Transfer |
Aquatic Panda has downloaded additional malware onto compromised hosts.[1] |
|
Enterprise | T1027 | Obfuscated Files or Information |
Aquatic Panda has encoded commands in Base64.[1] |
|
Enterprise | T1588 | .001 | Obtain Capabilities: Malware |
Aquatic Panda has acquired and used njRAT in its operations.[1] |
.002 | Obtain Capabilities: Tool |
Aquatic Panda has acquired and used Cobalt Strike in its operations.[1] |
||
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
Aquatic Panda has attempted to harvest credentials through LSASS memory dumping.[1] |
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
Aquatic Panda has attempted to discover third party endpoint detection and response (EDR) tools on compromised systems.[1] |
Enterprise | T1082 | System Information Discovery |
Aquatic Panda has used native OS commands to understand privilege levels and system details.[1] |
|
Enterprise | T1007 | System Service Discovery |
Aquatic Panda has attempted to discover services for third party EDR products.[1] |