Mofang

Mofang is a likely China-based cyber espionage group, named for its frequent practice of imitating a victim's infrastructure. This adversary has been observed since at least May 2012 conducting focused attacks against government and critical infrastructure in Myanmar, as well as several other countries and sectors including military, automobile, and weapons industries.[1]

ID: G0103
Version: 1.1
Created: 12 May 2020
Last Modified: 11 April 2024

Techniques Used

Domain ID Name Use
Enterprise T1027 .013 Obfuscated Files or Information: Encrypted/Encoded File

Mofang has compressed the ShimRat executable within malicious email attachments. Mofang has also encrypted payloads before they are downloaded to victims.[1]

Enterprise T1566 .001 Phishing: Spearphishing Attachment

Mofang delivered spearphishing emails with malicious documents, PDFs, or Excel files attached.[1]

.002 Phishing: Spearphishing Link

Mofang delivered spearphishing emails with malicious links included.[1]

Enterprise T1204 .001 User Execution: Malicious Link

Mofang's spearphishing emails required a user to click the link to connect to a compromised website.[1]

.002 User Execution: Malicious File

Mofang's malicious spearphishing attachments required a user to open the file after receiving.[1]

Software

References