#SharpPanda

Just Another Blue TeamerLeeArchinal@ioc.exchange
2023-06-13

The threat actor #SharpPanda is the focus of this #readoftheday by ThreatMon | Advanced Threat Intelligence Platform. This time they were targeting G20 members with a sophisticated phishing emails that deploy a downloader. Enjoy and Happy Hunting!

Link in comment!

***Switching things up a bit this time: Take a look at the MITRE ATT&CK Tactic of Discovery and let me know what commands and information you can see from the article. [Hint: Look for the memory]***

TA0001 - Initial Access
T1566.001 - Phishing: Spearphishing Attachment

TA0002 - Execution
T1204.002 - User Execution: Malicious File

TA0003 - Persistence
T1053.005 - Scheduled Task/Job: Scheduled Task

TA0007 - Discovery
T1082 - System Information Discovery
T1518.001 - Software Discovery: Security Software Discovery

TA0005 - Defense Evasion
T1027 - Obfuscated Files or Information

#CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting

gtbarrygtbarry
2023-03-30

New malware variant has “radio silence” mode to evade detection

The Sharp Panda cyber-espionage hacking group is targeting high-profile government entities in Vietnam, Thailand, and Indonesia with a new version of the ‘Soul’ malware framework

bleepingcomputer.com/news/secu

2023-03-09

This is a very detailed analysis on the #SharpPanda #APT group's use of the #Soul #malware framework, used to recently target Southeast Asian government entities.
#DFIR

Check Point Report: research.checkpoint.com/2023/p

Andrea Fortuna :verified:andreafortuna@mastodon.uno
2023-03-09

Chinese threat actor #SharpPanda has targeted high-profile government agencies in Southeast Asia with a #cyberespionage campaign using a new version of the Soul modular framework. andreafortuna.org/2023/03/08/s

2023-03-07

📢 Be warned: A Chinese APT group #SharpPanda is using SoulSearcher loader against government entities.

Read: hackread.com/sharp-panda-china

#Security #Malware #China #CyberAttack #InfoSec

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst