Daggerfly is a People's Republic of China-linked APT entity active since at least 2012. Daggerfly has targeted individuals, government and NGO entities, and telecommunication companies in Asia and Africa. Daggerfly is associated with exclusive use of MgBot malware and is noted for several potential supply chain infection campaigns.[1][2][3][4]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .003 | 伪装: Rename System Utilities |
Daggerfly used a renamed version of rundll32.exe, such as "dbengin.exe" located in the |
| Enterprise | T1195 | .002 | 供应链破坏: Compromise Software Supply Chain |
Daggerfly is associated with several supply chain compromises using malicious updates to compromise victims.[2][4] |
| Enterprise | T1136 | .001 | 创建账户: Local Account |
Daggerfly created a local account on victim machines to maintain access.[1] |
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
Daggerfly has used legitimate software to side-load PlugX loaders onto victim systems.[1] Daggerfly is also linked to multiple other instances of side-loading for initial loading activity.[4] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Daggerfly used PowerShell to download and execute remote-hosted files on victim systems.[1] |
| Enterprise | T1584 | .004 | 基础设施妥协: Server |
Daggerfly compromised web servers hosting updates for software as part of a supply chain intrusion.[4] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Daggerfly uses HTTP for command and control communication.[4] |
| Enterprise | T1587 | .002 | 开发能力: Code Signing Certificates |
Daggerfly created code signing certificates to sign malicious macOS files.[4] |
| Enterprise | T1003 | .002 | 操作系统凭证转储: Security Account Manager |
Daggerfly used Reg to dump the Security Account Manager (SAM) hive from victim machines for follow-on credential extraction.[1] |
| Enterprise | T1012 | 查询注册表 |
Daggerfly used Reg to dump the Security Account Manager (SAM), System, and Security Windows registry hives from victim machines.[1] |
|
| Enterprise | T1189 | 浏览器攻击 |
Daggerfly has used strategic website compromise for initial access against victims.[4] |
|
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Daggerfly has used strategic website compromise to deliver a malicious link requiring user interaction.[4] |
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
Daggerfly proxied execution of malicious DLLs through a renamed rundll32.exe binary.[1] |
| Enterprise | T1082 | 系统信息发现 |
Daggerfly utilizes victim machine operating system information to create custom User Agent strings for subsequent command and control communication.[4] |
|
| Enterprise | T1105 | 输入工具传输 |
Daggerfly has used PowerShell and BITSAdmin to retrieve follow-on payloads from external locations for execution on victim machines.[1] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Daggerfly has attempted to use scheduled tasks for persistence in victim environments.[4] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
Daggerfly has used signed, but not notarized, malicious files for execution in macOS environments.[4] |