Deep Panda is a suspected Chinese threat group known to target many industries, including government, defense, financial, and telecommunications. [1] The intrusion into healthcare company Anthem has been attributed to Deep Panda. [2] This group is also known as Shell Crew, WebMasters, KungFu Kittens, and PinkPanther. [3] Deep Panda also appears to be known as Black Vine based on the attribution of both group names to the Anthem intrusion. [4] Some analysts track Deep Panda and APT19 as the same group, but it is unclear from open source information if the groups are the same. [5]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
The Deep Panda group is known to utilize WMI for lateral movement.[1] |
|
| Enterprise | T1546 | .008 | 事件触发执行: Accessibility Features |
Deep Panda has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions.[3] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Deep Panda has used PowerShell scripts to download and execute programs in memory, without writing to disk.[1] |
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
Deep Panda uses Web shells on publicly accessible Web servers to access victim networks.[6] |
| Enterprise | T1027 | .005 | 混淆文件或信息: Indicator Removal from Tools |
Deep Panda has updated and modified its malware, resulting in different hash values that evade detection.[4] |
| Enterprise | T1218 | .010 | 系统二进制代理执行: Regsvr32 |
Deep Panda has used regsvr32.exe to execute a server variant of Derusbi in victim networks.[3] |
| Enterprise | T1057 | 进程发现 |
Deep Panda uses the Microsoft Tasklist utility to list processes running on systems.[1] |
|
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares |
Deep Panda uses net.exe to connect to network shares using |
| Enterprise | T1018 | 远程系统发现 |
Deep Panda has used ping to identify other machines of interest.[1] |
|
| Enterprise | T1564 | .003 | 隐藏伪装: Hidden Window |
Deep Panda has used |