📃Title: Grayfly: Chinese Threat Actor Uses Newly-discovered Sidewalk Malware
📅Date: 2021-09-09
🔗References:

Description

Recent campaigns involved exploits against Exchange and MySQL servers. Group has heavy focus on telecoms sector. A recently discovered backdoor, Sidewalk, has been linked to the China-linked Grayfly espionage group. The malware has been deployed in recent Grayfly campaigns against a number of organizations in Taiwan, Vietnam, the United States, and Mexico

🔖Rectifyq Taxonomies:

🔖MISP Galaxies:

  • target-information=“Thailand”
  • target-information=“Singapore”
  • target-information=“Indonesia”
  • target-information=“Chile”
  • target-information=“United Kingdom”
  • target-information=“Australia”
  • target-information=“Pakistan”
  • target-information=“Malaysia”
  • target-information=“Hong Kong”
  • target-information=“Japan”
  • target-information=“South Korea”
  • target-information=“Mexico”
  • target-information=“India”
  • target-information=“United States”
  • target-information=“Vietnam”
  • target-information=“Taiwan”
  • producer Symantec
  • threat-actor APT41
  • malpedia=“MimiKatz”
  • malpedia=“SideWalk (Windows)”
  • sector=“Telecoms”
  • mitre-attack-pattern=[‘T1003’, ‘T1049’, ‘T1059’, ‘T1068’, ‘T1505’, ‘T1059.001’, ‘T1027’]

MISP event uuid: a58cbce5-e0fa-4016-9bff-031c1997cda8

Indicator of Compromise (IoCs)

type,value,comment
sha256, 25a7c1f94822dc61211de253ff0a5805a0eb83921126732a0d52b1f1967cf079, 'Sidewalk loader No sample in VT\r\nLast check:23/02/2025'
sha256, b3eb783b017da32e33d19670b39eae0b11de8e983891dd4feb873d6e9333608d, 'Mimikatz No sample in VT\r\nLast check:23/02/2025'

Full IOCs available in Rectifyq's MISP```