Leviathan

Leviathan is a Chinese state-sponsored cyber espionage group that has been attributed to the Ministry of State Security's (MSS) Hainan State Security Department and an affiliated front company.[1] Active since at least 2009, Leviathan has targeted the following sectors: academia, aerospace/aviation, biomedical, defense industrial base, government, healthcare, manufacturing, maritime, and transportation across the US, Canada, Europe, the Middle East, and Southeast Asia.[1][2][3]

ID: G0065
Associated Groups: MUDCARP, Kryptonite Panda, Gadolinium, BRONZE MOHAWK, TEMP.Jumper, APT40, TEMP.Periscope, Gingham Typhoon
Contributors: Valerii Marchuk, Cybersecurity Help s.r.o.
Version: 4.0
Created: 18 April 2018
Last Modified: 08 January 2024

Associated Group Descriptions

Name Description
MUDCARP

[1][4]

Kryptonite Panda

[1][5]

Gadolinium

[1][6]

BRONZE MOHAWK

[1][7]

TEMP.Jumper

Leviathan was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.[1][8]

APT40

FireEye reporting on TEMP.Periscope (which was combined into APT40) indicated TEMP.Periscope was reported upon as Leviathan.[1][2][3][8]

TEMP.Periscope

Leviathan was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.[1][3][8]

Gingham Typhoon

[9]

Techniques Used

Domain ID Name Use
Enterprise T1197 BITS任务

Leviathan has used BITSAdmin to download additional tools.[3]

Enterprise T1047 Windows管理规范

Leviathan has used WMI for execution.[2]

Enterprise T1546 .003 事件触发执行: Windows Management Instrumentation Event Subscription

Leviathan has used WMI for persistence.[3]

Enterprise T1090 .003 代理: Multi-hop Proxy

Leviathan has used multi-hop proxies to disguise the source of their malicious traffic.[1]

Enterprise T1534 内部鱼叉式钓鱼

Leviathan has conducted internal spearphishing within the victim's environment for lateral movement.[1]

Enterprise T1572 协议隧道

Leviathan has used protocol tunneling to further conceal C2 communications and infrastructure.[1]

Enterprise T1140 反混淆/解码文件或信息

Leviathan has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors.[2]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.[2][3]

.009 启动或登录自动启动执行: Shortcut Modification

Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.[2][3]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

Leviathan has used PowerShell for execution.[2][3][1][4]

.005 命令与脚本解释器: Visual Basic

Leviathan has used VBScript.[2]

Enterprise T1133 外部远程服务

Leviathan has used external remote services such as virtual private networks (VPN) to gain initial access.[1]

Enterprise T1203 客户端执行漏洞利用

Leviathan has exploited multiple Microsoft Office and .NET vulnerabilities for execution, including CVE-2017-0199, CVE-2017-8759, and CVE-2017-11882.[2][3][1][4]

Enterprise T1585 .001 建立账户: Social Media Accounts

Leviathan has created new social media accounts for targeting efforts.[1]

.002 建立账户: Email Accounts

Leviathan has created new email accounts for targeting efforts.[1]

Enterprise T1560 归档收集数据

Leviathan has archived victim's data prior to exfiltration.[1]

Enterprise T1003 操作系统凭证转储

Leviathan has used publicly available tools to dump password hashes, including HOMEFRY.[8]

.001 LSASS Memory

Leviathan has used publicly available tools to dump password hashes, including ProcDump and WCE.[8]

Enterprise T1589 .001 收集受害者身份信息: Credentials

Leviathan has collected compromised credentials to use for targeting efforts.[1]

Enterprise T1074 .001 数据分段: Local Data Staging

Leviathan has used C:\Windows\Debug and C:\Perflogs as staging directories.[3][1]

.002 数据分段: Remote Data Staging

Leviathan has staged data remotely prior to exfiltration.[1]

Enterprise T1078 有效账户

Leviathan has obtained valid accounts to gain initial access.[1][4]

Enterprise T1505 .003 服务器软件组件: Web Shell

Leviathan relies on web shells for an initial foothold as well as persistence into the victim's systems.[8][1]

Enterprise T1189 浏览器攻击

Leviathan has infected victims using watering holes.[1]

Enterprise T1027 .001 混淆文件或信息: Binary Padding

Leviathan has inserted garbage characters into code, presumably to avoid anti-virus detection.[2]

.003 混淆文件或信息: Steganography

Leviathan has used steganography to hide stolen data inside other files stored on Github.[1]

.013 混淆文件或信息: Encrypted/Encoded File

Leviathan has obfuscated code using base64 and gzip compression.[2]

Enterprise T1204 .001 用户执行: Malicious Link

Leviathan has sent spearphishing email links attempting to get a user to click.[2][1]

.002 用户执行: Malicious File

Leviathan has sent spearphishing attachments attempting to get a user to click.[2][1]

Enterprise T1218 .010 系统二进制代理执行: Regsvr32

Leviathan has used regsvr32 for execution.[2]

Enterprise T1102 .003 网络服务: One-Way Communication

Leviathan has received C2 instructions from user profiles created on legitimate websites such as Github and TechNet.[3]

Enterprise T1583 .001 获取基础设施: Domains

Leviathan has established domains that impersonate legitimate entities to use for targeting efforts. [1][4]

Enterprise T1586 .001 账号妥协: Social Media Accounts

Leviathan has compromised social media accounts to conduct social engineering attacks.[1]

.002 账号妥协: Email Accounts

Leviathan has compromised email accounts to conduct social engineering attacks.[1]

Enterprise T1105 输入工具传输

Leviathan has downloaded additional scripts and files from adversary-controlled servers.[2][3]

Enterprise T1055 .001 进程注入: Dynamic-link Library Injection

Leviathan has utilized techniques like reflective DLL loading to write a DLL into memory and load a shell that provides backdoor access to the victim.[4]

Enterprise T1559 .002 进程间通信: Dynamic Data Exchange

Leviathan has utilized OLE as a method to insert malicious content inside various phishing documents. [4]

Enterprise T1021 .001 远程服务: Remote Desktop Protocol

Leviathan has targeted RDP credentials and used it to move through the victim environment.[8]

.004 远程服务: SSH

Leviathan used ssh for internal reconnaissance.[8]

Enterprise T1041 通过C2信道渗出

Leviathan has exfiltrated data over its C2 channel.[1]

Enterprise T1567 .002 通过网络服务渗出: Exfiltration to Cloud Storage

Leviathan has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox.[2][3]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

Leviathan has sent spearphishing emails with malicious attachments, including .rtf, .doc, and .xls files.[2][1]

.002 钓鱼: Spearphishing Link

Leviathan has sent spearphishing emails with links, often using a fraudulent lookalike domain and stolen branding.[2][1]

Enterprise T1553 .002 颠覆信任控制: Code Signing

Leviathan has used stolen code signing certificates to sign malware.[3][8]

Software

ID Name References Techniques
S0110 at [8] 预定任务/作业: At
S0642 BADFLICK [3][4] 从本地系统获取数据, 反混淆/解码文件或信息, 归档收集数据: Archive via Library, 文件和目录发现, 用户执行: Malicious File, 系统信息发现, 系统网络配置发现, 虚拟化/沙盒规避: Time Based Evasion, 输入工具传输, 钓鱼: Spearphishing Attachment
S0190 BITSAdmin [3] BITS任务, 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol, 横向工具传输, 输入工具传输
S0069 BLACKCOFFEE [3] 命令与脚本解释器: Windows Command Shell, 多阶段信道, 文件和目录发现, 移除指标: File Deletion, 网络服务: Dead Drop Resolver, 网络服务: Bidirectional Communication, 进程发现
S0020 China Chopper [3][1][4] 从本地系统获取数据, 命令与脚本解释器: Windows Command Shell, 应用层协议: Web Protocols, 文件和目录发现, 暴力破解: Password Guessing, 服务器软件组件: Web Shell, 混淆文件或信息: Software Packing, 移除指标: Timestomp, 网络服务发现, 输入工具传输
S0154 Cobalt Strike [2][3][1] BITS任务, Windows管理规范, 从本地系统获取数据, 代理: Domain Fronting, 代理: Internal Proxy, 使用备用认证材料: Pass the Hash, 修改注册表, 创建或修改系统进程: Windows Service, 办公应用启动: Office Template Macros, 加密通道: Asymmetric Cryptography, 加密通道: Symmetric Cryptography, 协议隧道, 反射性代码加载, 反混淆/解码文件或信息, 命令与脚本解释器: JavaScript, 命令与脚本解释器: Visual Basic, 命令与脚本解释器: PowerShell, 命令与脚本解释器: Python, 命令与脚本解释器: Windows Command Shell, 妨碍防御: Disable or Modify Tools, 客户端执行漏洞利用, 屏幕捕获, 应用层协议: DNS, 应用层协议: Web Protocols, 应用层协议: File Transfer Protocols, 操作系统凭证转储: LSASS Memory, 操作系统凭证转储: Security Account Manager, 数据传输大小限制, 数据混淆: Protocol or Service Impersonation, 数据编码: Standard Encoding, 文件和目录发现, 有效账户: Domain Accounts, 有效账户: Local Accounts, 本机API, 权限提升漏洞利用, 权限组发现: Domain Groups, 权限组发现: Local Groups, 查询注册表, 浏览器会话劫持, 混淆文件或信息: Indicator Removal from Tools, 混淆文件或信息, 滥用权限提升控制机制: Sudo and Sudo Caching, 滥用权限提升控制机制: Bypass User Account Control, 移除指标: Timestomp, 系统二进制代理执行: Rundll32, 系统服务: Service Execution, 系统服务发现, 系统网络连接发现, 系统网络配置发现, 网络共享发现, 网络服务发现, 访问令牌操控: Parent PID Spoofing, 访问令牌操控: Token Impersonation/Theft, 访问令牌操控: Make and Impersonate Token, 账号发现: Domain Account, 软件发现, 输入工具传输, 输入捕获: Keylogging, 进程发现, 进程注入: Dynamic-link Library Injection, 进程注入: Process Hollowing, 进程注入, 远程服务: Remote Desktop Protocol, 远程服务: SSH, 远程服务: Windows Remote Management, 远程服务: SMB/Windows Admin Shares, 远程服务: Distributed Component Object Model, 远程系统发现, 隐藏伪装: Process Argument Spoofing, 非应用层协议, 预定传输, 颠覆信任控制: Code Signing
S0021 Derusbi [3][1] 加密通道: Symmetric Cryptography, 命令与脚本解释器: Unix Shell, 回退信道, 屏幕捕获, 文件和目录发现, 查询注册表, 移除指标: Timestomp, 移除指标: File Deletion, 系统二进制代理执行: Regsvr32, 系统信息发现, 系统所有者/用户发现, 视频捕获, 输入捕获: Keylogging, 进程发现, 进程注入: Dynamic-link Library Injection, 非应用层协议, 非标准端口, 音频捕获
S0363 Empire [1] Windows管理规范, 中间人攻击: LLMNR/NBT-NS Poisoning and SMB Relay, 事件触发执行: Accessibility Features, 从密码存储中获取凭证: Credentials from Web Browsers, 使用备用认证材料: Pass the Hash, 创建或修改系统进程: Windows Service, 创建账户: Local Account, 创建账户: Domain Account, 剪贴板数据, 加密通道: Asymmetric Cryptography, 劫持执行流: Path Interception by Unquoted Path, 劫持执行流: Path Interception by Search Order Hijacking, 劫持执行流: Path Interception by PATH Environment Variable, 劫持执行流: Dylib Hijacking, 劫持执行流: DLL Search Order Hijacking, 可信开发者工具代理执行: MSBuild, 启动或登录自动启动执行: Security Support Provider, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 启动或登录自动启动执行: Shortcut Modification, 命令与脚本解释器: PowerShell, 命令与脚本解释器: Windows Command Shell, 命令与脚本解释器, 域信任发现, 域或租户策略修改: Group Policy Modification, 屏幕捕获, 应用层协议: Web Protocols, 归档收集数据, 操作系统凭证转储: LSASS Memory, 文件和目录发现, 未加密凭证: Credentials In Files, 未加密凭证: Private Keys, 本机API, 权限提升漏洞利用, 浏览器信息发现, 混淆文件或信息: Command Obfuscation, 滥用权限提升控制机制: Bypass User Account Control, 电子邮件收集: Local Email Collection, 移除指标: Timestomp, 窃取或伪造Kerberos票据: Kerberoasting, 窃取或伪造Kerberos票据: Golden Ticket, 窃取或伪造Kerberos票据: Silver Ticket, 系统信息发现, 系统所有者/用户发现, 系统服务: Service Execution, 系统网络连接发现, 系统网络配置发现, 组策略发现, 网络共享发现, 网络嗅探, 网络服务: Bidirectional Communication, 网络服务发现, 自动化收集, 自动化渗出, 视频捕获, 访问令牌操控: SID-History Injection, 访问令牌操控, 访问令牌操控: Create Process with Token, 账号发现: Domain Account, 账号发现: Local Account, 软件发现: Security Software Discovery, 输入工具传输, 输入捕获: Keylogging, 输入捕获: Credential API Hooking, 进程发现, 进程注入, 远程服务: Distributed Component Object Model, 远程服务: SSH, 远程服务漏洞利用, 通过C2信道渗出, 通过网络服务渗出: Exfiltration to Code Repository, 通过网络服务渗出: Exfiltration to Cloud Storage, 预定任务/作业: Scheduled Task
S0032 gh0st RAT [1] 修改注册表, 共享模块, 创建或修改系统进程: Windows Service, 加密通道: Symmetric Cryptography, 加密通道, 动态解析: Fast Flux DNS, 劫持执行流: DLL Side-Loading, 反混淆/解码文件或信息, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 命令与脚本解释器, 屏幕捕获, 数据编码: Standard Encoding, 本机API, 查询注册表, 移除指标: Clear Windows Event Logs, 移除指标: File Deletion, 系统二进制代理执行: Rundll32, 系统信息发现, 系统服务: Service Execution, 输入工具传输, 输入捕获: Keylogging, 进程发现, 进程注入, 非应用层协议
S0232 HOMEFRY [3] 命令与脚本解释器: Windows Command Shell, 操作系统凭证转储, 混淆文件或信息: Encrypted/Encoded File
S0233 MURKYTOP [3][1] 命令与脚本解释器: Windows Command Shell, 权限组发现, 移除指标: File Deletion, 系统信息发现, 网络共享发现, 网络服务发现, 账号发现: Local Account, 远程系统发现, 预定任务/作业: At
S0228 NanHaiShu [2][1] 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 命令与脚本解释器: JavaScript, 命令与脚本解释器: Visual Basic, 妨碍防御: Disable or Modify Tools, 应用层协议: DNS, 混淆文件或信息: Encrypted/Encoded File, 移除指标: File Deletion, 系统二进制代理执行: Mshta, 系统信息发现, 系统所有者/用户发现, 系统网络配置发现, 输入工具传输
S0039 Net [8] 创建账户: Local Account, 创建账户: Domain Account, 密码策略发现, 权限组发现: Domain Groups, 权限组发现: Local Groups, 移除指标: Network Share Connection Removal, 系统时间发现, 系统服务: Service Execution, 系统服务发现, 系统网络连接发现, 网络共享发现, 账号发现: Domain Account, 账号发现: Local Account, 账号操控: Additional Local or Domain Groups, 远程服务: SMB/Windows Admin Shares, 远程系统发现
S0229 Orz [2][1][4] 修改注册表, 命令与脚本解释器: Windows Command Shell, 文件和目录发现, 混淆文件或信息, 移除指标, 系统二进制代理执行: Regsvr32, 系统信息发现, 系统网络配置发现, 网络服务: Bidirectional Communication, 软件发现, 输入工具传输, 进程发现, 进程注入: Process Hollowing
S0194 PowerSploit [1] Windows管理规范, 从密码存储中获取凭证: Windows Credential Manager, 从本地系统获取数据, 创建或修改系统进程: Windows Service, 劫持执行流: Path Interception by PATH Environment Variable, 劫持执行流: Path Interception by Unquoted Path, 劫持执行流: DLL Search Order Hijacking, 劫持执行流: Path Interception by Search Order Hijacking, 反射性代码加载, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 启动或登录自动启动执行: Security Support Provider, 命令与脚本解释器: PowerShell, 域信任发现, 屏幕捕获, 操作系统凭证转储: LSASS Memory, 未加密凭证: Credentials in Registry, 未加密凭证: Group Policy Preferences, 查询注册表, 混淆文件或信息: Indicator Removal from Tools, 混淆文件或信息: Command Obfuscation, 窃取或伪造Kerberos票据: Kerberoasting, 访问令牌操控, 账号发现: Local Account, 输入捕获: Keylogging, 进程发现, 进程注入: Dynamic-link Library Injection, 音频捕获, 预定任务/作业: Scheduled Task
S0183 Tor [1] 代理: Multi-hop Proxy, 加密通道: Asymmetric Cryptography
S0005 Windows Credential Editor [8] 操作系统凭证转储: LSASS Memory

References