APT 12, Numbered Panda

Description

(CrowdStrike) Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. Screen saver files, which are binary executables and PDF documents, are common Numbered Panda weaponization tactics. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. This effectively helps Numbered Panda bypass egress filtering implemented to prevent unauthorized communications on some enterprises. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to.

Names

NameName-Giver
APT 12Mandiant
Numbered PandaCrowdStrike
CTG-8223SecureWorks
Bronze GlobeSecureWorks
BeeBusFireEye
Calc TeamSymantec
DynCALCSymantec
DNSCalcSymantec
Group 22Talos
Crimson IronThreatConnect
Hexagon TyphoonMicrosoft

Country

State-sponsored

Motivation

  • Information theft and espionage

First Seen

2009

Observed Sectors

Observed Countries

Tools

Operations

Information

Mitre Attack

Other Information

Uuid

a85ba864-0a13-4337-bd57-8df380b7b4fa

Last Card Change

2025-06-28