LuminousMoth is a Chinese-speaking cyber espionage group that has been active since at least October 2020. LuminousMoth has targeted high-profile organizations, including government entities, in Myanmar, the Philippines, Thailand, and other parts of Southeast Asia. Some security researchers have concluded there is a connection between LuminousMoth and Mustang Panda based on similar targeting and TTPs, as well as network infrastructure overlaps.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1557 | .002 | 中间人攻击: ARP Cache Poisoning |
LuminousMoth has used ARP spoofing to redirect a compromised machine to an actor-controlled website.[2] |
| Enterprise | T1005 | 从本地系统获取数据 |
LuminousMoth has collected files and data from compromised machines.[1][2] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
LuminousMoth has disguised their exfiltration malware as |
| Enterprise | T1112 | 修改注册表 |
LuminousMoth has used malware that adds Registry keys for persistence.[1][2] |
|
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
LuminousMoth has used legitimate executables such as |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
LuminousMoth has used malicious DLLs that setup persistence in the Registry Key |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
LuminousMoth has used HTTP for C2.[1] |
| Enterprise | T1587 | .001 | 开发能力: Malware |
LuminousMoth has used unique malware for information theft and exfiltration.[1][2] |
| Enterprise | T1560 | 归档收集数据 |
LuminousMoth has manually archived stolen files from victim machines before exfiltration.[2] |
|
| Enterprise | T1030 | 数据传输大小限制 |
LuminousMoth has split archived files into multiple parts to bypass a 5MB limit.[2] |
|
| Enterprise | T1083 | 文件和目录发现 |
LuminousMoth has used malware that scans for files in the Documents, Desktop, and Download folders and in other drives.[1][2] |
|
| Enterprise | T1608 | .001 | 暂存能力: Upload Malware |
LuminousMoth has hosted malicious payloads on Dropbox.[1] |
| .004 | 暂存能力: Drive-by Target |
LuminousMoth has redirected compromised machines to an actor-controlled webpage through HTML injection.[2] |
||
| .005 | 暂存能力: Link Target |
LuminousMoth has created a link to a Dropbox file that has been used in their spear-phishing operations.[1] |
||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
LuminousMoth has lured victims into clicking malicious Dropbox download links delivered through spearphishing.[1] |
| Enterprise | T1539 | 窃取Web会话Cookie |
LuminousMoth has used an unnamed post-exploitation tool to steal cookies from the Chrome browser.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
LuminousMoth has used a malicious DLL to collect the username from compromised hosts.[2] |
|
| Enterprise | T1588 | .001 | 获取能力: Malware |
LuminousMoth has obtained and used malware such as Cobalt Strike.[1][2] |
| .002 | 获取能力: Tool |
LuminousMoth has obtained an ARP spoofing tool from GitHub.[2] |
||
| .004 | 获取能力: Digital Certificates |
LuminousMoth has used a valid digital certificate for some of their malware.[1] |
||
| Enterprise | T1105 | 输入工具传输 |
LuminousMoth has downloaded additional malware and tools onto a compromised host.[1][2] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
LuminousMoth has used malware that exfiltrates stolen data to its C2 server.[1] |
|
| Enterprise | T1091 | 通过可移动媒体复制 |
LuminousMoth has used malicious DLLs to spread malware to connected removable USB drives on infected machines.[1][2] |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
LuminousMoth has exfiltrated data to Google Drive.[2] |
| Enterprise | T1566 | .002 | 钓鱼: Spearphishing Link |
LuminousMoth has sent spearphishing emails containing a malicious Dropbox download link.[1] |
| Enterprise | T1564 | .001 | 隐藏伪装: Hidden Files and Directories |
LuminousMoth has used malware to store malicious binaries in hidden directories on victim's USB drives.[1] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
LuminousMoth has created scheduled tasks to establish persistence for their tools.[2] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
LuminousMoth has signed their malware with a valid digital signature.[1] |