Chimera
Chimera is a suspected China-based threat group, targeting the semiconductor industry in Taiwan since at least 2018.[1]
Techniques Used
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .002 | Account Discovery: Domain Account |
Chimera has has used |
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
Chimera has used modified RAR software to archive data with a password.[1] |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Chimera has used PowerShell scripts to execute malicious payloads.[1] |
Enterprise | T1133 | External Remote Services |
Chimera has used legitimate credentials to login to an external VPN.[1] |
|
Enterprise | T1105 | Ingress Tool Transfer |
Chimera has remotely copied tools and malware onto targeted systems.[1] |
|
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Chimera has renamed malware to GoogleUpdate.exe, impersonating legitimate Google filenames.[1] |
Enterprise | T1556 | .001 | Modify Authentication Process: Domain Controller Authentication |
Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential.[1] |
Enterprise | T1106 | Native API |
Chimera has used direct Windows system calls by leveraging Dumpert.[1] |
|
Enterprise | T1027 | Obfuscated Files or Information | ||
Enterprise | T1003 | .003 | OS Credential Dumping: NTDS |
Chimera has gathered the SYSTEM registry and ntds.dit files from target systems.[1] |
Enterprise | T1021 | .001 | Remote Services: Remote Desktop Protocol | |
.002 | Remote Services: SMB/Windows Admin Shares | |||
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
Chimera has used scheduled tasks to invoke Cobalt Strike and maintain persistence.[1] |
Enterprise | T1078 | Valid Accounts |
Chimera has used a valid account to maintain persistence via scheduled task.[1] |
|
Enterprise | T1102 | Web Service |
Chimera has used Google Cloud's appspot service to host C2 servers.[1] |
|
Enterprise | T1047 | Windows Management Instrumentation |