MirrorFace is a People's Republic of China (PRC)-aligned cyberespionage actor believed to be a subgroup under the menuPass umbrella based on targeting, tools, and infrastructure overlaps. MirrorFace has been active since at least 2019, at first exclusively targeting Japanese organizations across the media, defense, diplomatic, financial, manufacturing, and academic sectors. Subsequent MirrorFace operations included targets in Central Europe and featured use of LODEINFO, HiddenFace, and UPPERCUT malware.[1][2][3][4][5][6]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1087 | .002 | Account Discovery: Domain Account |
MirrorFace has used native Windows tools to obtain domain user information.[5] |
| Enterprise | T1071 | .002 | Application Layer Protocol: File Transfer Protocols |
MirrorFace has used the the PuTTY suite Secure Copy Protocol (SCP) client for file transfer.[3] |
| Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
MirrorFace has used rar.exe and the Makecab utility to archive files of interest prior to exfiltration.[3][5][4] |
| Enterprise | T1217 | Browser Information Discovery |
During Operation AkaiRyū, MirrorFace exported Chrome web data including contact information, keywords, autofill data, and stored credit card information.[7] |
|
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
During Operation AkaiRyū, MirrorFace used PowerShell in execution chains to drop additional files such as embedded CAB files.[8][7] |
| .003 | Command and Scripting Interpreter: Windows Command Shell |
MirrorFace has used During Operation AkaiRyū, MirrorFace used |
||
| .005 | Command and Scripting Interpreter: Visual Basic |
MirrorFace has used remote templates with VBA code in malware infection chains.[9] During Operation AkaiRyū, MirrorFace used Word templates containing VBA code for malware execution.[7] |
||
| Enterprise | T1586 | .002 | Compromise Accounts: Email Accounts |
During Operation AkaiRyū, MirrorFace used compromised accounts to send spearphishing emails.[8] |
| Enterprise | T1005 | Data from Local System |
MirrorFace gathered data and files of interest from victim's systems.[5] |
|
| Enterprise | T1074 | .002 | Data Staged: Remote Data Staging |
MirrorFace has gathered data and files of interest on a single victim machine.[5] |
| Enterprise | T1587 | .001 | Develop Capabilities: Malware |
MirrorFace has created and continued to develop custom strains of malware including LODEINFO.[3] During Operation AkaiRyū, MirrorFace used custom malware, as well as customized variants of publicly available tools.[7] |
| Enterprise | T1686 | .003 | Disable or Modify System Firewall: Windows Host Firewall |
MirrorFace can modify the system firewall to allow communication to certain ports.[4] |
| Enterprise | T1685 | Disable or Modify Tools |
MirrorFace has disabled Windows Defender in compromised environments.[4] |
|
| .005 | Clear Windows Event Logs |
MirrorFace has deleted Windows event logs.[4] During Operation AkaiRyū, MirrorFace cleared Windows event logs post compromise.[7] |
||
| Enterprise | T1482 | Domain Trust Discovery |
MirrorFace has run |
|
| Enterprise | T1114 | .001 | Email Collection: Local Email Collection |
MirrorFace has exfiltrated stored emails from compromised hosts.[3] |
| Enterprise | T1585 | .002 | Establish Accounts: Email Accounts |
During Operation AkaiRyū, MirrorFace used free email providers such as Gmail for spearphishing.[8][7] |
| .003 | Establish Accounts: Cloud Accounts |
During Operation AkaiRyū, MirrorFace established OneDrive accounts to host malicious payloads.[7] |
||
| Enterprise | T1048 | .002 | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
MirrorFace has used Secure File Transfer Protocol (SFTP) for file exfiltration.[4] |
| Enterprise | T1190 | Exploit Public-Facing Application |
MirrorFace has exploited vulnerabilities in Fortigate and Array AG devices for initial access.[4] |
|
| Enterprise | T1083 | File and Directory Discovery |
MirrorFace has run commands to check the content of folders on compromised hosts and has specifically targeted files with .doc, .ppt, .xls, .jtd, .eml, .xps, and .pdf extensions.[3][5][4] During Operation AkaiRyū, MirrorFace enumerated file system details in compromised environments.[8] |
|
| Enterprise | T1591 | Gather Victim Org Information |
MirrorFace has placed specific content in phishing emails to target members of particular political parties.[3] |
|
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL |
MirrorFace has used legitimate EXE files to load malicious DLLs via sideloading.[1][3][9][5] |
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
MirrorFace has deleted directories containing malware and archives with files collected from the victim environment.[3][5][6][4] During Operation AkaiRyū, MirrorFace deleted delivered tools and files from compromised hosts.[7] |
| Enterprise | T1036 | .008 | Masquerading: Masquerade File Type |
MirrorFace has crafted malware payloads to appear as Privacy-Enhanced Mail (PEM) files.[9] During Operation AkaiRyū, MirrorFace disguised LNK and SFX (self-extracting) files as Word documents to lure victims into opening malicious files.[8][7] |
| Enterprise | T1556 | .002 | Modify Authentication Process: Password Filter DLL |
MirrorFace has used a tool named MRSAStealer as a password filter to collect credentials on password changes.[3] |
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
MirrorFace has used Base64 encoded shellcode in infection chains to evade detection.[9] |
| Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
MirrorFace has used tools including the Secure Copy Protocol (SCP) client from PuTTY and Cobalt Strike.[3][5][4] During Operation AkaiRyū, MirrorFace deployed multiple publicly available tools including PuTTY, FRP, and Rubeus.[7] |
| Enterprise | T1137 | .001 | Office Application Startup: Office Template Macros |
During Operation AkaiRyū, MirrorFace loaded malicious Word templates containing VBA code leading to installation of UPPERCUT.[7] |
| Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
MirrorFace has dumped LSASS memory for credential access.[4] |
| .002 | OS Credential Dumping: Security Account Manager |
MirrorFace has used vssadmin to copy registry hives including SAM.[5][4] |
||
| .003 | OS Credential Dumping: NTDS |
MirrorFace has dumped NTDS.dit through volume shadow copies.[5][4] |
||
| Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
MirrorFace has sent spearphishing emails with malicious attachments to deliver malware payloads.[1][3][9] During Operation AkaiRyū, MirrorFace distributed crafted spearphishing emails containing malicious attachments.[7][8] |
| .002 | Phishing: Spearphishing Link |
MirrorFace has embedded OneDrive URLs in emails leading to malicious file installation.[6] During Operation AkaiRyū, MirrorFace sent spearphishing emails with malicious OneDrive links.[8] |
||
| Enterprise | T1057 | Process Discovery |
MirrorFace has used Tasklist on compromised hosts for discovery.[4] |
|
| Enterprise | T1090 | Proxy |
MirrorFace has used the GO Simple Tunnel (GOST) proxy tool.[4] |
|
| Enterprise | T1219 | .001 | Remote Access Tools: IDE Tunneling |
During Operation AkaiRyū, MirrorFace abused the remote tunnels of Visual Studio Code (VS Code) to deliver malware.[7] |
| Enterprise | T1021 | .001 | Remote Services: Remote Desktop Protocol |
MirrorFace has used RDP to exfiltrate files of interest.[5] |
| .002 | Remote Services: SMB/Windows Admin Shares |
MirrorFace has used SMB to copy malware between systems in compromised environments.[5][4] |
||
| Enterprise | T1018 | Remote System Discovery |
MirrorFace has used Ping for system discovery.[4] |
|
| Enterprise | T1684 | .001 | Social Engineering: Impersonation |
MirrorFace has sent targeted emails purporting to be from a Japanese political party’s PR department.[3] |
| Enterprise | T1608 | .005 | Stage Capabilities: Link Target |
During Operation AkaiRyū, MirrorFace used links to direct victims to malicious files hosted on OneDrive.[8][7] |
| Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
MirrorFace has abused a known Microsoft digital signature verification issues to append encrypted data to digital signatures that still appear to be validly signed.[3] During Operation AkaiRyū, MirrorFace abused a signed McAfee executable to load UPPERCUT.[7] |
| Enterprise | T1082 | System Information Discovery |
MirrorFace has employed malicious macros and native Windows tools such as csvde.exe, nltest.exe and quser.exe for discovery.[9][5][4] During Operation AkaiRyū, MirrorFace collected system information.[8] |
|
| Enterprise | T1614 | .001 | System Location Discovery: System Language Discovery |
MirrorFace has deployed shellcode to check for Japanese Microsoft Office settings.[9] |
| Enterprise | T1016 | System Network Configuration Discovery |
MirrorFace has used ipconfig for reconnaissance.[4] During Operation AkaiRyū, MirrorFace used Arp and |
|
| Enterprise | T1033 | System Owner/User Discovery |
MirrorFace has used Windows native tools to enumerate user information.[5] |
|
| Enterprise | T1007 | System Service Discovery |
MirrorFace has used Tasklist for discovery post compromise.[4] |
|
| Enterprise | T1221 | Template Injection |
MirrorFace has used remote template injection to retrieve malicious payloads from the C2.[9] |
|
| Enterprise | T1127 | .001 | Trusted Developer Utilities Proxy Execution: MSBuild |
During Operation AkaiRyū, MirrorFace used MSBuild to compile and execute its FaceXInjector injection tool.[7] |
| Enterprise | T1204 | .001 | User Execution: Malicious Link |
During Operation AkaiRyū, MirrorFace lured users into executing malicious payloads with links to resources hosted on OneDrive.[8][7] |
| .002 | User Execution: Malicious File |
MirrorFace has lured victims into opening crafted Word, Excel, and SFX files for execution.[1][3][9][6] During Operation AkaiRyū, MirrorFace lured victims into executing malicious payloads by opening email attachments.[7] |
||
| Enterprise | T1047 | Windows Management Instrumentation |
MirrorFace has leveraged WMIC on targeted systems post compromise.[4] During Operation AkaiRyū, MirrorFace used WMI to proxy execution of UPPERCUT.[7] |
|