APT41 is a threat group that researchers have assessed as Chinese state-sponsored espionage group that also conducts financially-motivated operations. Active since at least 2012, APT41 has been observed targeting various industries, including but not limited to healthcare, telecom, technology, finance, education, retail and video game industries in 14 countries.[1] Notable behaviors include using a wide range of malware and tools to complete mission objectives. APT41 overlaps at least partially with public reporting on groups including BARIUM and Winnti Group.[2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1197 | BITS任务 |
APT41 used BITSAdmin to download and install payloads.[8][4] |
|
| Enterprise | T1014 | Rootkit | ||
| Enterprise | T1047 | Windows管理规范 |
APT41 used WMI in several ways, including for execution of commands via WMIEXEC as well as for persistence via PowerSploit.[2][3] APT41 has executed files through Windows Management Instrumentation (WMI).[9] |
|
| Enterprise | T1595 | .002 | 主动扫描: Vulnerability Scanning |
APT41 used the Acunetix SQL injection vulnerability scanner in target reconnaissance operations, as well as the JexBoss tool to identify vulnerabilities in Java applications.[10] |
| .003 | 主动扫描: Wordlist Scanning |
APT41 leverages various tools and frameworks to brute-force directories on web servers.[10] |
||
| Enterprise | T1546 | .008 | 事件触发执行: Accessibility Features | |
| Enterprise | T1213 | .003 | 从信息存储库获取数据: Code Repositories |
APT41 cloned victim user Git repositories during intrusions.[10] |
| Enterprise | T1555 | 从密码存储中获取凭证 |
APT41 has obtained information about accounts, lists of employees, and plaintext and hashed passwords from databases.[10] |
|
| .003 | Credentials from Web Browsers |
APT41 used BrowserGhost, a tool designed to obtain credentials from browsers, to retrieve information from password stores.[10] |
||
| Enterprise | T1005 | 从本地系统获取数据 |
APT41 has uploaded files and data from a compromised host.[3] During C0017, APT41 collected information related to compromised machines as well as Personal Identifiable Information (PII) from victim networks.[7] |
|
| Enterprise | T1090 | 代理 |
APT41 used a tool called CLASSFON to covertly proxy network communications.[2] During C0017, APT41 used the Cloudflare CDN to proxy C2 traffic.[7] |
|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
APT41 has created services to appear as benign system tools.[3] APT41 DUST disguised DUSTPAN as a legitimate Windows binary such as During C0017, APT41 used |
| .005 | 伪装: Match Legitimate Name or Location |
APT41 attempted to masquerade their files as popular anti-virus software.[2][3] During C0017, APT41 used file names beginning with USERS, SYSUSER, and SYSLOG for DEADEYE, and changed KEYPLUG file extensions from .vmp to .upx likely to avoid hunting detections.[7] |
||
| Enterprise | T1656 | 伪装 |
APT41 impersonated an employee at a video game developer company to send phishing emails.[1] |
|
| Enterprise | T1550 | .002 | 使用备用认证材料: Pass the Hash |
APT41 uses tools such as Mimikatz to enable lateral movement via captured password hashes.[10] |
| Enterprise | T1195 | .002 | 供应链破坏: Compromise Software Supply Chain |
APT41 gained access to production environments where they could inject malicious code into legitimate, signed files and widely distribute them to end users.[2] |
| Enterprise | T1112 | 修改注册表 |
APT41 used a malware variant called GOODLUCK to modify the registry in order to steal credentials.[2][3] |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
APT41 modified legitimate Windows services to install malware backdoors.[2][3] APT41 created the StorSyncSvc service to provide persistence for Cobalt Strike.[8] APT41 DUST used Windows Services with names such as |
| Enterprise | T1136 | .001 | 创建账户: Local Account | |
| Enterprise | T1190 | 利用公开应用程序漏洞 |
APT41 exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central through unsafe deserialization, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gateway devices.[8] APT41 leveraged vulnerabilities such as ProxyLogon exploitation or SQL injection for initial access.[10] APT41 exploited CVE-2021-26855 against a vulnerable Microsoft Exchange Server to gain initial access to the victim network.[9] During C0017, APT41 exploited CVE-2021-44207 in the USAHerds application and CVE-2021-44228 in Log4j, as well as other .NET deserialization, SQL injection, and directory traversal vulnerabilities to gain initial access.[7] |
|
| Enterprise | T1573 | .002 | 加密通道: Asymmetric Cryptography |
APT41 DUST used HTTPS for command and control.[6] |
| Enterprise | T1568 | .002 | 动态解析: Domain Generation Algorithms | |
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking |
APT41 has used search order hijacking to execute malicious payloads, such as Winnti for Windows.[4] APT41 DUST involved the use of DLL search order hijacking to execute DUSTTRAP.[6] |
| .002 | 劫持执行流: DLL Side-Loading |
APT41 used legitimate executables to perform DLL side-loading of their malware.[2] APT41 DUST used DLL side-loading to execute DUSTTRAP via an AhnLab uninstaller.[6] |
||
| .006 | 劫持执行流: Dynamic Linker Hijacking | |||
| Enterprise | T1140 | 反混淆/解码文件或信息 |
During C0017, APT41 used the DUSTPAN loader to decrypt embedded payloads.[7] |
|
| Enterprise | T1037 | 启动或登录初始化脚本 |
APT41 used a hidden shell script in |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
APT41 created and modified startup files for persistence.[2][3] APT41 added a registry key in |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
APT41 leveraged PowerShell to deploy malware families in victims’ environments.[2][8] |
| .003 | 命令与脚本解释器: Windows Command Shell |
APT41 used During C0017, APT41 used |
||
| .004 | 命令与脚本解释器: Unix Shell |
APT41 used Linux shell commands for system survey and information gathering prior to exploitation of vulnerabilities such as CVE-2019-19871.[8] |
||
| .007 | 命令与脚本解释器: JavaScript |
During C0017, APT41 deployed JScript web shells on compromised systems.[7] |
||
| Enterprise | T1008 | 回退信道 |
APT41 used the Steam community page as a fallback mechanism for C2.[2] |
|
| Enterprise | T1484 | .001 | 域或租户策略修改: Group Policy Modification |
APT41 used scheduled tasks created via Group Policy Objects (GPOs) to deploy ransomware.[1] |
| Enterprise | T1133 | 外部远程服务 |
APT41 compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service.[2] |
|
| Enterprise | T1104 | 多阶段信道 |
APT41 used the storescyncsvc.dll BEACON backdoor to download a secondary backdoor.[8] |
|
| Enterprise | T1562 | .006 | 妨碍防御: Indicator Blocking |
APT41 developed a custom injector that enables an Event Tracing for Windows (ETW) bypass, making malicious processes invisible to Windows logging.[10] |
| Enterprise | T1203 | 客户端执行漏洞利用 |
APT41 leveraged the follow exploits in their operations: CVE-2012-0158, CVE-2015-1641, CVE-2017-0199, CVE-2017-11882, and CVE-2019-3396.[2] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
APT41 used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits.[8] APT41 DUST used HTTPS for command and control.[6] During C0017, APT41 ran |
| .002 | 应用层协议: File Transfer Protocols |
APT41 used exploit payloads that initiate download via ftp.[8] |
||
| .004 | 应用层协议: DNS | |||
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
APT41 created a RAR archive of targeted files for exfiltration.[2] Additionally, APT41 used the makecab.exe utility to both download tools, such as NATBypass, to the victim network and to archive a file for exfiltration.[9] APT41 DUST used |
| .003 | 归档收集数据: Archive via Custom Method |
During C0017, APT41 hex-encoded PII data prior to exfiltration.[7] |
||
| Enterprise | T1480 | .001 | 执行保护: Environmental Keying |
APT41 has encrypted payloads using the Data Protection API (DPAPI), which relies on keys tied to specific user accounts on specific machines. APT41 has also environmentally keyed second stage malware with an RC5 key derived in part from the infected system's volume serial number.[11] |
| Enterprise | T1594 | 搜索受害者拥有的网站 |
APT41 DUST involved access of external victim websites for target development.[6] |
|
| Enterprise | T1596 | .005 | 搜索开放技术数据库: Scan Databases |
APT41 uses the Chinese website fofa.su, similar to the Shodan scanning service, for passive scanning of victims.[10] APT41 DUST used internet scan data for target development.[6] |
| Enterprise | T1593 | .002 | 搜索开放网站/域: Search Engines |
APT41 DUST involved use of search engines to research victim servers.[6] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
APT41 has used hashdump, Mimikatz, Procdump, and the Windows Credential Editor to dump password hashes from memory and authenticate to other user accounts.[2][3][9] |
| .002 | 操作系统凭证转储: Security Account Manager |
APT41 extracted user account data from the Security Account Managerr (SAM), making a copy of this database from the registry using the During C0017, APT41 copied the |
||
| .003 | 操作系统凭证转储: NTDS |
APT41 used ntdsutil to obtain a copy of the victim environment |
||
| Enterprise | T1030 | 数据传输大小限制 |
APT41 transfers post-exploitation files dividing the payload into fixed-size chunks to evade detection.[10] |
|
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
APT41 DUST involved exporting data from Oracle databases to local CSV files prior to exfiltration.[6] During C0017, APT41 copied the local |
| Enterprise | T1486 | 数据加密以实现影响 |
APT41 used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user.[2] APT41 also used Microsoft Bitlocker to encrypt workstations and Jetico’s BestCrypt to encrypt servers.[9] |
|
| Enterprise | T1001 | .003 | 数据混淆: Protocol or Service Impersonation |
During C0017, APT41 frequently configured the URL endpoints of their stealthy passive backdoor LOWKEY.PASSIVE to masquerade as normal web application traffic on an infected server.[7] |
| Enterprise | T1083 | 文件和目录发现 |
APT41 has executed |
|
| Enterprise | T1110 | 暴力破解 |
APT41 performed password brute-force attacks on the local admin account.[2] |
|
| Enterprise | T1048 | .003 | 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol |
During C0017, APT41 exfiltrated victim data via DNS lookups by encoding and prepending it as subdomains to the attacker-controlled domain.[7] |
| Enterprise | T1078 | 有效账户 |
APT41 used compromised credentials to log on to other systems.[2][4] |
|
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
APT41 DUST involved use of web shells such as ANTSWORD and BLUEBEAM for persistence.[6] During C0017, APT41 deployed JScript web shells through the creation of malicious ViewState objects.[7] |
| Enterprise | T1069 | 权限组发现 |
APT41 used |
|
| Enterprise | T1012 | 查询注册表 |
APT41 queried registry values to determine items such as configured RDP ports and network configurations.[10] |
|
| Enterprise | T1570 | 横向工具传输 |
APT41 uses remote shares to move and remotely execute payloads during lateral movemement.[10] |
|
| Enterprise | T1027 | 混淆文件或信息 |
APT41 used VMProtected binaries in multiple intrusions.[8] During C0017, APT41 broke malicious binaries, including DEADEYE and KEYPLUG, into multiple sections on disk to evade detection.[7] |
|
| .002 | Software Packing |
APT41 uses packers such as Themida to obfuscate malicious files.[10] During C0017, APT41 used VMProtect to slow the reverse engineering of malicious binaries.[7] |
||
| .013 | Encrypted/Encoded File |
APT41 DUST used encrypted payloads decrypted and executed in memory.[6] |
||
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs |
APT41 attempted to remove evidence of some of its activity by clearing Windows security and system events.[2] |
| .003 | 移除指标: Clear Command History |
APT41 attempted to remove evidence of some of its activity by deleting Bash histories.[2] |
||
| .004 | 移除指标: File Deletion |
APT41 deleted files from the system.[2][10] APT41 DUST deleted various artifacts from victim systems following use.[6] |
||
| Enterprise | T1218 | .001 | 系统二进制代理执行: Compiled HTML File | |
| .011 | 系统二进制代理执行: Rundll32 | |||
| Enterprise | T1082 | 系统信息发现 |
APT41 uses multiple built-in commands such as During C0017, APT41 issued |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
APT41 has executed During C0017, APT41 used |
|
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
APT41 used svchost.exe and Net to execute a system service installed to launch a Cobalt Strike BEACON loader.[8][3] APT41 DUST used Windows services to execute DUSTPAN.[6] |
| Enterprise | T1049 | 系统网络连接发现 |
APT41 has enumerated IP addresses of network resources and used the |
|
| Enterprise | T1016 | 系统网络配置发现 |
APT41 collected MAC addresses from victim machines.[2][3] During C0017, APT41 used |
|
| Enterprise | T1135 | 网络共享发现 |
APT41 used the |
|
| Enterprise | T1102 | .001 | 网络服务: Dead Drop Resolver |
APT41 used legitimate websites for C2 through dead drop resolvers (DDR), including GitHub, Pastebin, and Microsoft TechNet.[2] During C0017, APT41 used dead drop resolvers on two separate tech community forums for their KEYPLUG Windows-version backdoor; notably APT41 updated the community forum posts frequently with new dead drop resolvers during the campaign.[7] |
| Enterprise | T1046 | 网络服务发现 |
APT41 used a malware variant called WIDETONE to conduct port scans on specified subnets.[2] |
|
| Enterprise | T1599 | 网络边界桥接 |
APT41 used |
|
| Enterprise | T1119 | 自动化收集 |
APT41 DUST used tools such as SQLULDR2 and PINEGROVE to gather local system and database information.[6] |
|
| Enterprise | T1583 | .007 | 获取基础设施: Serverless |
APT41 DUST used infrastructure hosted behind Cloudflare or utilized Cloudflare Workers for command and control.[6] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
APT41 has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor.[2] For C0017, APT41 obtained publicly available tools such as YSoSerial.NET, ConfuserEx, and BadPotato.[7] |
| .003 | 获取能力: Code Signing Certificates |
APT41 DUST used stolen code signing certificates to sign DUSTTRAP malware and components.[6] |
||
| Enterprise | T1134 | 访问令牌操控 |
During C0017, APT41 used a ConfuserEx obfuscated BADPOTATO exploit to abuse named-pipe impersonation for local |
|
| Enterprise | T1087 | .001 | 账号发现: Local Account |
APT41 used built-in |
| .002 | 账号发现: Domain Account |
APT41 used built-in |
||
| Enterprise | T1586 | .003 | 账号妥协: Cloud Accounts |
APT41 DUST used compromised Google Workspace accounts for command and control.[6] |
| Enterprise | T1098 | .007 | 账号操控: Additional Local or Domain Groups |
APT41 has added user accounts to the User and Admin groups.[2] |
| Enterprise | T1496 | .001 | 资源劫持: Compute Hijacking |
APT41 deployed a Monero cryptocurrency mining tool in a victim’s environment.[2][1] |
| Enterprise | T1105 | 输入工具传输 |
APT41 used certutil to download additional files.[8][4][3] APT41 downloaded post-exploitation tools such as Cobalt Strike via command shell following initial access.[10] APT41 has uploaded Procdump and NATBypass to a staging directory and has used these tools in follow-on activities.[9] APT41 DUST involved execution of During C0017, APT41 downloaded malicious payloads onto compromised systems.[7] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
APT41 used a keylogger called GEARSHIFT on a target system.[2] |
| Enterprise | T1055 | 进程注入 |
APT41 malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process.[2] |
|
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
APT41 used RDP for lateral movement.[2][4] APT41 used NATBypass to expose local RDP ports on compromised systems to the Internet.[9] |
| .002 | 远程服务: SMB/Windows Admin Shares |
APT41 has transferred implant files using Windows Admin Shares and the Server Message Block (SMB) protocol, then executes files through Windows Management Instrumentation (WMI).[4][9] |
||
| Enterprise | T1018 | 远程系统发现 |
APT41 has used MiPing to discover active systems in the victim network.[9] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
During C0017, APT41 used its Cloudflare services C2 channels for data exfiltration.[7] |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
APT41 DUST exfiltrated collected information to OneDrive.[6] |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims.[2] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
APT41 used a compromised account to create a scheduled task on a system.[2][4] During C0017, APT41 used the following Windows scheduled tasks for DEADEYE dropper persistence on US state government networks: |
| Enterprise | T1542 | .003 | 预操作系统引导: Bootkit |
APT41 deployed Master Boot Record bootkits on Windows systems to hide their malware and maintain persistence on victim systems.[2] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
APT41 leveraged code-signing certificates to sign malware when targeting both gaming and non-gaming organizations.[2][3] APT41 DUST used stolen code signing certificates for DUSTTRAP malware and subsequent payloads.[6] |