Also known as: Double Dragon, BARIUM, Brass Typhoon, Wicked Panda, Winnti, LEAD, Red Kelpie, Earth Baku
T1195.002
T1574.001
T1574.002
T1071.001
T1588.002
T1583.001
T1053.005
T1055.001
T1055.012
T1057
T1070.004
T1112
T1135
T1204.002
T1518.001
T1543.003
T1546.003
T1550.002
T1560.001
T1562.001
T1569.002
Exploit Public-Facing Application
Exploit vulnerabilities in internet-facing applications to gain access.
External Remote Services
Abuse remote services like VPNs or RDP to gain access to the network.
Drive-by Compromise
Gain access through a user visiting a compromised website during normal browsing.
Spearphishing Attachment
Send targeted emails with malicious file attachments to gain initial access.
Process Injection
Inject code into running processes to evade defenses and elevate privileges.
Obfuscated Files or Information
Encrypt, encode, or obfuscate payloads and data to evade detection.
Deobfuscate/Decode Files or Information
Decode or deobfuscate data and files that were previously hidden or encrypted.
Modular backdoor platform that was initially deployed via supply chain attack on NetSarang software. Features plugin-based architecture with encrypted C2 using custom DNS tunneling.
Signature rootkit-enabled backdoor shared across multiple Chinese APT groups. Provides persistent access with kernel-level capabilities for hiding processes and network connections.
Modular backdoor loaded via DLL side-loading. Supports keylogging, screen capture, file management, and loading additional plugins from C2 servers.
Versatile RAT shared across Chinese APT groups. Uses DLL side-loading for execution and supports HTTP/DNS/TCP C2 with encrypted communications.
Cross-platform (Windows/Linux) backdoor using WebSocket and custom TCP protocols for C2. Used in attacks against telecommunications and government sectors.
Downloader/launcher that deploys secondary payloads. Uses living-off-the-land binaries and DLL side-loading to maintain stealth during initial compromise.
In-memory dropper that loads encrypted payloads directly into process memory. Used in conjunction with DUSTTRAP for multi-stage deployment.
Passive backdoor for Linux servers that listens on existing network sockets. Extremely difficult to detect as it doesn't create new network connections.
Extensively used for post-exploitation in both espionage and financially motivated operations. Custom loaders deployed via supply chain or spear-phishing vectors.
Lightweight web shell (4KB) providing remote command execution on compromised web servers. Used for initial foothold maintenance and file management.
Used for credential extraction and Kerberos ticket manipulation during lateral movement phases in both espionage and cybercrime operations.
Python framework used for SMB relay attacks, remote execution via wmiexec/smbexec, and credential extraction via secretsdump.
Used for reconnaissance, downloading secondary payloads, disabling security controls, and executing in-memory malware to avoid disk-based detection.
Windows utility abused for downloading payloads from C2 servers and decoding Base64-encoded malware during multi-stage infection chains.
Compromised CCleaner v5.33 build environment in 2017 to distribute ShadowPad backdoor to 2.27 million users. One of the largest software supply chain attacks.
FreeBSD backdoor discovered targeting Citrix ADC/Gateway appliances. Demonstrates APT41's capability to target non-Windows network infrastructure.
Backdoor delivering Cobalt Strike BEACON payloads
Modular backdoor with support for proxy and file operations
Backdoor with kernel driver component for persistence
SMS interception tool targeting telecom infrastructure
Backdoor deployed through compromised software supply chains
UEFI firmware bootkit for stealth and persistence
| Type | Value |
|---|---|
| domain | ns1[.]clofrfrede[.]com |
| domain | infestexe[.]com |
| ip | 103[.]230[.]15[.]130 |
| ip | 149[.]28[.]78[.]89 |
| hash | 7966c2c546b71e800cddd2a6d3a8b0e1 |
| Domain / Host | Status |
|---|---|
ns1[.]clofrfrede[.]comShadowPad C2 infrastructure | offline |
infestexe[.]comCROSSWALK/DEADEYE C2 domain | offline |
103[.]230[.]15[.]130KeyPlug Linux backdoor C2 server | active |
149[.]28[.]78[.]89Infrastructure used in telecom targeting | offline |
thetavaluemetrics[.]com | active |
www[.]googleapis[.]com | ip_changed |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
MITRE ATT&CK - APT41
https://attack.mitre.org/groups/G0096/
Mandiant - APT41: A Dual Espionage and Cyber Crime Operation
https://www.mandiant.com/resources/apt41-dual-espionage-and-cyber-crime-operation
U.S. DOJ - Seven International Cyber Defendants Charged
https://www.justice.gov/opa/pr/seven-international-cyber-defendants-including-apt41-actors-charged
KEYPLUG Backdoor: APT41's Pivotal Tool for Cyber Espionage
https://www.group-ib.com/blog/apt41-keyplug/
APT41: A Dual Espionage and Cyber Crime Operation
https://www.mandiant.com/resources/blog/apt41-dual-espionage-and-cyber-crime-operation
Chinese APT41 Hackers Target Android Devices with WyrmSpy, DragonEgg Spyware
https://thehackernews.com/2023/07/chinese-apt41-hackers-target-android.html
MoonBounce: the dark side of UEFI firmware
https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/
Double Dragon APT41, a dual espionage and cyber crime operation
https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html