China Chopper is a Web Shell hosted on Web servers to provide access back into an enterprise network that does not rely on an infected system calling back to a remote command and control server.  It has been used by several threat groups.  
|Enterprise||T1110||Brute Force||China Chopper's server component can perform brute force password guessing against authentication portals. |
|Enterprise||T1059||Command-Line Interface||China Chopper's server component is capable of opening a command terminal.   |
|Enterprise||T1005||Data from Local System||China Chopper's server component can upload local files.   |
|Enterprise||T1083||File and Directory Discovery||China Chopper's server component can list directory contents. |
|Enterprise||T1046||Network Service Scanning||China Chopper's server component can spider authentication portals. |
|Enterprise||T1105||Remote File Copy||China Chopper's server component can download remote files.   |
|Enterprise||T1064||Scripting||China Chopper's server component is a text based payload available in a variety of scripting languages. |
|Enterprise||T1045||Software Packing||China Chopper's client component is packed with UPX. |
|Enterprise||T1071||Standard Application Layer Protocol||China Chopper's server component executes code sent via HTTP POST commands. |
|Enterprise||T1099||Timestomp||China Chopper's server component can change the timestamp of files.   |
|Enterprise||T1100||Web Shell||China Chopper's server component is a Web Shell payload. |
Groups That Use This Software
|G0027||Threat Group-3390||   |
- Lee, T., Hanzlik, D., Ahl, I. (2013, August 7). Breaking Down the China Chopper Web Shell - Part I. Retrieved March 27, 2015.
- Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018.
- FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
- Counter Threat Unit Research Team. (2017, June 27). BRONZE UNION Cyberespionage Persists Despite Disclosures. Retrieved July 13, 2017.
- The Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), CERT New Zealand, the UK National Cyber Security Centre (UK NCSC) and the US National Cybersecurity and Communications Integration Center (NCCIC). (2018, October 11). Joint report on publicly available hacking tools. Retrieved March 11, 2019.
- Pantazopoulos, N., Henry T. (2018, May 18). Emissary Panda – A potential new malicious tool. Retrieved June 25, 2018.
- Falcone, R. and Lancaster, T.. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.
- Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019.