SlideShare a Scribd company logo
T
                                                                                              AF
                         App e n di x G (D igi ta l ):
                                     IO C s




                                                                                   R
 The portion of this appendix that includes the Indicators of Compromise (IOCs) is digital and can be found at http://




                                                                         D
 www.mandiant.com/apt1.


 APT1 Indicators and Using Redline™             ED
 With the release of Mandiant’s report, APT1: Exposing One of China’s Cyber Espionage Units, we are providing a set of
 APT1 IOCs in the digital portion of Appendix G to help detect malware described in Appendix C: The Malware Arsenal.
 IOCs can be used in investigations to find unknown evils or for detection of already known threats. The IOCs included
 in Appendix G fit the latter; however, keep in mind that APT1 does update their tools, and there are certainly malware
 variants and new families of malware that will not be detected with this set of IOCs. To find out more about the report or
 the digital appendices (to include downloading the set of APT1 IOCs in Appendix G: IOCs) go to http://www.mandiant.
                O
 com/apt1.

 IOCs can be used in conjunction with Redline, Mandiant’s free host-based investigative tool, or with Mandiant
 Intelligent Response® (MIR), Mandiant’s commercial host-based investigative tool. Mandiant’s customers who have
               G

 licensed MIR can simply import a zip file of the IOCs into their controllers. For those without MIR, Redline can be
 downloaded from Mandiant’s web site at http://www.mandiant.com/resources/download/redline.

 Remember to always test new IOCs before using them in a production environment.
              R



 What Are IOCs?
 BA




 Mandiant has developed an open, extendable standard for defining and sharing threat information in a machine-
 readable format. Going well beyond static signature analysis, IOCs combine over 500 types of forensic evidence with
 grouping and logical operators to provide advanced threat detection capability.

 If you are not familiar with IOCs, go to the OpenIOC site for a description at http://openioc.org.
EM




 Mandiant APT1	                                               70	                                       www.mandiant.com
What Is Redline?
 Redline is Mandiant’s free tool for investigating hosts for signs of malicious activity through memory and file analysis,




                                                                                                T
 and subsequently developing a threat assessment profile. Redline provides several benefits including the following:




                                                                                              AF
 Rapid Triage
 When confronted with a potentially compromised host, responders must first assess whether the system has active
 malware. Without installing software or disrupting the current state of the host, Redline thoroughly audits all currently-
 running processes and drivers on the system for a quick analysis; for a detailed analysis, it also collects the entire
 file structure, network state, and system memory. Redline will also compare any MD5 value it collects, analyzes, and
 visualizes against an MD5 whitelist. Users can further analyze and view imported audit data using Redline’s Timeline




                                                                                   R
 functionality, which includes capabilities to narrow and filter results around a given timeframe with the TimeWrinkles™
 and TimeCrunches™ features.




                                                                        D
 Reveals Hidden Malware
 The Redline Portable Agent can collect and analyze a complete memory image, working below the level at which
 kernel rootkits and other malware-hiding techniques operate. Many hiding techniques become extremely obvious when
 examined at the physical memory level, making memory analysis a powerful tool for finding malware. It also reveals
                                               ED
 “memory only” malware that is not present on disk.


 Guided Analysis
 Mandiant’s Redline tool streamlines memory analysis by providing a proven workflow for analyzing malware based on
 relative priority. This takes the guesswork out of task and time allocation, allowing investigators to provide a focused
                O
 response to the threats that matter most.

 Redline calculates a “Malware Risk Index” that highlights processes more likely to be worth investigating, and
 encourages users to follow investigative steps that suggest how to start. As users review more audits from clean and
               G

 compromised systems, they build up the experience to recognize malicious activity more quickly.

 As you investigate a system, here’s how Redline will help you focus your attention on the most productive data:
              R



 Investigative Steps
 Redline can collect a daunting amount of raw information. Its investigative steps help provide a starting place by
 BA




 highlighting specific data and providing views that are most commonly productive in identifying malicious processes.
 Unless you are pursuing a specific “lead”, we recommend working through the steps in order, examining the
 information for entries that don’t match your expectations.

 The key to becoming an effective investigator is to review Redline data from a variety of “clean” and “compromised”
 systems. Over time, your sense of which entries are normal and which are of concern will develop quickly as you view
 more data.
EM




 Mandiant APT1	                                              71	                                          www.mandiant.com
Malware Risk Index Scoring
 Redline analyzes each process and memory section using a variety of rules and techniques to calculate a “Malware
 Risk Index” for each process. This score is a helpful guide to identifying those processes that are more likely to be




                                                                                                T
 worth investigating. Processes at the highest risk of being compromised by malware are highlighted with a red badge.
 Those with some risk factors have a grey badge, and low-risk processes have no badge.




                                                                                              AF
 The MRI is not an absolute indication of malware. During an investigation you can refine the MRI scoring by adjusting
 specific hits (identifying false positives and false negatives) for each process, adding your own hits, and generally
 tuning the results.


 IOCs




                                                                                   R
 Redline provides the option of performing IOC analysis in addition to MRI scoring. Supplied a set of IOCs, the Redline
 Portable Agent will be automatically configured to gather the data required to perform a subsequent IOC analysis; after
 the analysis is run, IOC hit results are available for further investigation.




                                                                        D
 In addition, Redline provides the ability to create an IOC Collector. This feature enables the collection of data types
 required for matching a set of IOCs.


 Works with MIR
                                                ED
 Combined with MIR, Redline is a powerful tool for accelerated live response. Here’s a typical case:
 »»   IDS or other system detects suspicious activity on a host

 »»   From MIR, an investigator launches a remote live response script

 »»   The MIR Agent running on the host captures and analyzes memory locally, streaming back a small XML audit that
                O
      downloads in minutes rather than hours

 »»   From MIR, the user can open the audit directly in Redline
               G

 »»   Using Redline, the investigator quickly identifies a malicious process, and writes an IOC describing the forensic
      attributes found in Redline

 »»   Using MIR and MCIC, the investigator is quickly able to sweep for that IOC and discover all other systems on the
              R


      network with the same (or similar) malware running
 BA
EM




 Mandiant APT1	                                              72	                                          www.mandiant.com
Have MIR Customers had Access to these IOCs Before?
 These IOCs are new! However, much of the detection capability in this set of indicators has already been available to




                                                                                                  T
 our MIR customers. The IOCs may look different though as a result of improvements in creation and testing. Mandiant
 started 2013 with a focus on taking better advantage of our threat intelligence. We plan to continue to improve the
 synthesis of our threat intelligence and our IOCs by improving our breadth, IOC creation process, IOC management




                                                                                                AF
 process, and IOC testing. The majority of these indicators, or modified versions of them, will be integrated into the next
 IOC release.


 What Is the FAMILY Designator in This Set of IOCs?




                                                                                     R
 We are using a new IOC designator in these IOCs called “(FAMILY).” Mandiant’s Threat Intelligence Unit tracks
 malware by common features seen in groups of binaries. We call those groupings of binaries “families.” The IOCs
 included in this appendix are representatives of families of malware used by APT1. The new designator follows the
 family name in the “Name” field of the IOC, and the presence of (FAMILY) implies that that IOC applies to the whole




                                                                          D
 family, not just one sample.


 Why Do These IOCs Look Somewhat Different Than Other IOCs I Have Seen From
                                                 ED
 Mandiant?
 In many cases we have combined information that previously would have been in several indicators into a single
 indicator. Additionally, we have removed certain types of intelligence, since they are being released in separate
 appendices (such as FQDNs and IPs).

 Additionally, some IOCs in this set are using file permutation blocks to catch variants of malware that might not be
                O
 detected otherwise.


 What Is a File Permutation block?
               G

 It is a different way to structure lists of File Item attributes to look for an entire family of malware versus only one or two
 pieces. For more information on this topic or most any other IOC questions go to https://forums.mandiant.com.
              R



 Will You Update These IOCs?
 BA




 It is likely that we will make some changes to the IOCs in Appendix G as we get feedback. If updated, the updates will
 be available in the same location as the report http://www.mandiant.com/apt1.


 Will You Be Releasing More IOCs Like This?
 Currently, there are no plans for additional public releases of this magnitude.
EM




 Mandiant APT1	                                                73	                                           www.mandiant.com

More Related Content

PPTX
DELDroid: Determination & Enforcement of Least Privilege Architecture in AnDroid
PDF
Agisa towards automatic generation of infection signatures
PDF
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
PDF
TriggerScope: Towards Detecting Logic Bombs in Android Applications
PDF
Owasp Ireland - The State of Software Security
PDF
Basic survey on malware analysis, tools and techniques
PPTX
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
PDF
GlassRAT-final
DELDroid: Determination & Enforcement of Least Privilege Architecture in AnDroid
Agisa towards automatic generation of infection signatures
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
TriggerScope: Towards Detecting Logic Bombs in Android Applications
Owasp Ireland - The State of Software Security
Basic survey on malware analysis, tools and techniques
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
GlassRAT-final

What's hot (19)

PPTX
Droid echo
PPTX
Attacking Proprietary Android Vendor Customizations
PPT
Malware analysis on android using supervised machine learning techniques
PDF
A Comparison Study of Open Source Penetration Testing Tools
PDF
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
PDF
Hii assessing the_effectiveness_of_antivirus_solutions
PDF
Cyber Defense Forensic Analyst - Real World Hands-on Examples
PDF
Regin: Top-tier espionage tool enables stealthy surveillance
PDF
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
PPTX
Android malware analysis
PDF
IRJET - Heuristic Approach to Intrusion Detection System
PDF
43 automatic
PDF
Penetration Security Testing
PDF
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
PDF
I haz you and pwn your maal whitepaper
PDF
Maximize Computer Security With Limited Ressources
PDF
Splunk for Security
PPTX
Functional Safety and Security process alignment
PDF
IDS - Fact, Challenges and Future
Droid echo
Attacking Proprietary Android Vendor Customizations
Malware analysis on android using supervised machine learning techniques
A Comparison Study of Open Source Penetration Testing Tools
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Hii assessing the_effectiveness_of_antivirus_solutions
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Regin: Top-tier espionage tool enables stealthy surveillance
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
Android malware analysis
IRJET - Heuristic Approach to Intrusion Detection System
43 automatic
Penetration Security Testing
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
I haz you and pwn your maal whitepaper
Maximize Computer Security With Limited Ressources
Splunk for Security
Functional Safety and Security process alignment
IDS - Fact, Challenges and Future
Ad

Similar to Appendix g iocs readme (20)

PDF
soctool.pdf
PDF
openioc_scan - IOC scanner for memory forensics
PDF
Ceis 9 padeep kumar_final_paper
PDF
Practical Incident Response - Work Guide
PDF
Symantec Ubiquity
PDF
Hermit Crab Presentation
PPTX
IOCs for modern threat landscape-slideshare
PPTX
Anomalies Detection: Windows OS - Part 1
PPTX
Anomalies Detection: Windows OS - Part 1
PPTX
The Internal Signs of Compromise
PDF
100 Security Operation Center Tools.pdf
PDF
SOC-BlueTEam.pdf
PDF
lastline-breach-detection-platform-datasheet
PDF
Fighting Malware Without Antivirus
PPT
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
PDF
Volatile IOCs for Fast Incident Response
PDF
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin
PDF
Level Up Your Security with Threat Intelligence
PPTX
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
PPTX
Indicators of compromise: From malware analysis to eradication
soctool.pdf
openioc_scan - IOC scanner for memory forensics
Ceis 9 padeep kumar_final_paper
Practical Incident Response - Work Guide
Symantec Ubiquity
Hermit Crab Presentation
IOCs for modern threat landscape-slideshare
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
The Internal Signs of Compromise
100 Security Operation Center Tools.pdf
SOC-BlueTEam.pdf
lastline-breach-detection-platform-datasheet
Fighting Malware Without Antivirus
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
Volatile IOCs for Fast Incident Response
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin
Level Up Your Security with Threat Intelligence
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
Indicators of compromise: From malware analysis to eradication
Ad

More from Yury Chemerkin (20)

PDF
YURY_CHEMERKIN__NullCon_2013_Conference.pdf
PDF
YURY_CHEMERKIN__ITA_2013_Proceedings.pdf
PDF
YURY_CHEMERKIN__I-Society-2013_Proceedings.pdf
PDF
YURY_CHEMERKIN__CYBER_CRIME_FORUM_2012.pdf
PDF
YURY_CHEMERKIN__CONFidence_2013_Conference.pdf
PDF
Security_Compliance_Challenges_On_Clouds.pdf
PDF
DefCamp_2017_Conference_Chemerkin_Yury_-_full.pdf
PDF
YURY_CHEMERKIN__ICITST_2012_Conference.pdf
PDF
YURY_CHEMERKIN__AthCon_2013._Conference.pdf
PDF
YURY_CHEMERKIN_InfoSecurityRussia_2012.pdf.pdf
PDF
YURY_CHEMERKIN__ICITST-2012_Proceedings.pdf
PDF
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
PDF
OWASP_Russia_2016_-_Yury_Chemerkin_--_run.pdf
PDF
DefCamp_2015_Conference_Chemerkin_Yury.pdf
PDF
InfoSecurityRussia-_2014_Conferences.pdf
PDF
YURY_CHEMERKIN_NotaCon_2014_Conference.pdf
PDF
YURY_CHEMERKIN_HackMiami_2014_Conference.pdf
PDF
Mobile_Security_Challenges_On_Compliance.pdf
PDF
Mobile_Security_From_The_BYOD_Viewpoint.pdf
PDF
INFOSEC_UAB_2016_Conference_Chemerkin_Yury.pdf
YURY_CHEMERKIN__NullCon_2013_Conference.pdf
YURY_CHEMERKIN__ITA_2013_Proceedings.pdf
YURY_CHEMERKIN__I-Society-2013_Proceedings.pdf
YURY_CHEMERKIN__CYBER_CRIME_FORUM_2012.pdf
YURY_CHEMERKIN__CONFidence_2013_Conference.pdf
Security_Compliance_Challenges_On_Clouds.pdf
DefCamp_2017_Conference_Chemerkin_Yury_-_full.pdf
YURY_CHEMERKIN__ICITST_2012_Conference.pdf
YURY_CHEMERKIN__AthCon_2013._Conference.pdf
YURY_CHEMERKIN_InfoSecurityRussia_2012.pdf.pdf
YURY_CHEMERKIN__ICITST-2012_Proceedings.pdf
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
OWASP_Russia_2016_-_Yury_Chemerkin_--_run.pdf
DefCamp_2015_Conference_Chemerkin_Yury.pdf
InfoSecurityRussia-_2014_Conferences.pdf
YURY_CHEMERKIN_NotaCon_2014_Conference.pdf
YURY_CHEMERKIN_HackMiami_2014_Conference.pdf
Mobile_Security_Challenges_On_Compliance.pdf
Mobile_Security_From_The_BYOD_Viewpoint.pdf
INFOSEC_UAB_2016_Conference_Chemerkin_Yury.pdf

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Approach and Philosophy of On baking technology
PPTX
Machine Learning_overview_presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
NewMind AI Weekly Chronicles - August'25-Week II
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
sap open course for s4hana steps from ECC to s4
Approach and Philosophy of On baking technology
Machine Learning_overview_presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Presentation on Artificial Intelligence
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Appendix g iocs readme

  • 1. T AF App e n di x G (D igi ta l ): IO C s R The portion of this appendix that includes the Indicators of Compromise (IOCs) is digital and can be found at http:// D www.mandiant.com/apt1. APT1 Indicators and Using Redline™ ED With the release of Mandiant’s report, APT1: Exposing One of China’s Cyber Espionage Units, we are providing a set of APT1 IOCs in the digital portion of Appendix G to help detect malware described in Appendix C: The Malware Arsenal. IOCs can be used in investigations to find unknown evils or for detection of already known threats. The IOCs included in Appendix G fit the latter; however, keep in mind that APT1 does update their tools, and there are certainly malware variants and new families of malware that will not be detected with this set of IOCs. To find out more about the report or the digital appendices (to include downloading the set of APT1 IOCs in Appendix G: IOCs) go to http://www.mandiant. O com/apt1. IOCs can be used in conjunction with Redline, Mandiant’s free host-based investigative tool, or with Mandiant Intelligent Response® (MIR), Mandiant’s commercial host-based investigative tool. Mandiant’s customers who have G licensed MIR can simply import a zip file of the IOCs into their controllers. For those without MIR, Redline can be downloaded from Mandiant’s web site at http://www.mandiant.com/resources/download/redline. Remember to always test new IOCs before using them in a production environment. R What Are IOCs? BA Mandiant has developed an open, extendable standard for defining and sharing threat information in a machine- readable format. Going well beyond static signature analysis, IOCs combine over 500 types of forensic evidence with grouping and logical operators to provide advanced threat detection capability. If you are not familiar with IOCs, go to the OpenIOC site for a description at http://openioc.org. EM Mandiant APT1 70 www.mandiant.com
  • 2. What Is Redline? Redline is Mandiant’s free tool for investigating hosts for signs of malicious activity through memory and file analysis, T and subsequently developing a threat assessment profile. Redline provides several benefits including the following: AF Rapid Triage When confronted with a potentially compromised host, responders must first assess whether the system has active malware. Without installing software or disrupting the current state of the host, Redline thoroughly audits all currently- running processes and drivers on the system for a quick analysis; for a detailed analysis, it also collects the entire file structure, network state, and system memory. Redline will also compare any MD5 value it collects, analyzes, and visualizes against an MD5 whitelist. Users can further analyze and view imported audit data using Redline’s Timeline R functionality, which includes capabilities to narrow and filter results around a given timeframe with the TimeWrinkles™ and TimeCrunches™ features. D Reveals Hidden Malware The Redline Portable Agent can collect and analyze a complete memory image, working below the level at which kernel rootkits and other malware-hiding techniques operate. Many hiding techniques become extremely obvious when examined at the physical memory level, making memory analysis a powerful tool for finding malware. It also reveals ED “memory only” malware that is not present on disk. Guided Analysis Mandiant’s Redline tool streamlines memory analysis by providing a proven workflow for analyzing malware based on relative priority. This takes the guesswork out of task and time allocation, allowing investigators to provide a focused O response to the threats that matter most. Redline calculates a “Malware Risk Index” that highlights processes more likely to be worth investigating, and encourages users to follow investigative steps that suggest how to start. As users review more audits from clean and G compromised systems, they build up the experience to recognize malicious activity more quickly. As you investigate a system, here’s how Redline will help you focus your attention on the most productive data: R Investigative Steps Redline can collect a daunting amount of raw information. Its investigative steps help provide a starting place by BA highlighting specific data and providing views that are most commonly productive in identifying malicious processes. Unless you are pursuing a specific “lead”, we recommend working through the steps in order, examining the information for entries that don’t match your expectations. The key to becoming an effective investigator is to review Redline data from a variety of “clean” and “compromised” systems. Over time, your sense of which entries are normal and which are of concern will develop quickly as you view more data. EM Mandiant APT1 71 www.mandiant.com
  • 3. Malware Risk Index Scoring Redline analyzes each process and memory section using a variety of rules and techniques to calculate a “Malware Risk Index” for each process. This score is a helpful guide to identifying those processes that are more likely to be T worth investigating. Processes at the highest risk of being compromised by malware are highlighted with a red badge. Those with some risk factors have a grey badge, and low-risk processes have no badge. AF The MRI is not an absolute indication of malware. During an investigation you can refine the MRI scoring by adjusting specific hits (identifying false positives and false negatives) for each process, adding your own hits, and generally tuning the results. IOCs R Redline provides the option of performing IOC analysis in addition to MRI scoring. Supplied a set of IOCs, the Redline Portable Agent will be automatically configured to gather the data required to perform a subsequent IOC analysis; after the analysis is run, IOC hit results are available for further investigation. D In addition, Redline provides the ability to create an IOC Collector. This feature enables the collection of data types required for matching a set of IOCs. Works with MIR ED Combined with MIR, Redline is a powerful tool for accelerated live response. Here’s a typical case: »» IDS or other system detects suspicious activity on a host »» From MIR, an investigator launches a remote live response script »» The MIR Agent running on the host captures and analyzes memory locally, streaming back a small XML audit that O downloads in minutes rather than hours »» From MIR, the user can open the audit directly in Redline G »» Using Redline, the investigator quickly identifies a malicious process, and writes an IOC describing the forensic attributes found in Redline »» Using MIR and MCIC, the investigator is quickly able to sweep for that IOC and discover all other systems on the R network with the same (or similar) malware running BA EM Mandiant APT1 72 www.mandiant.com
  • 4. Have MIR Customers had Access to these IOCs Before? These IOCs are new! However, much of the detection capability in this set of indicators has already been available to T our MIR customers. The IOCs may look different though as a result of improvements in creation and testing. Mandiant started 2013 with a focus on taking better advantage of our threat intelligence. We plan to continue to improve the synthesis of our threat intelligence and our IOCs by improving our breadth, IOC creation process, IOC management AF process, and IOC testing. The majority of these indicators, or modified versions of them, will be integrated into the next IOC release. What Is the FAMILY Designator in This Set of IOCs? R We are using a new IOC designator in these IOCs called “(FAMILY).” Mandiant’s Threat Intelligence Unit tracks malware by common features seen in groups of binaries. We call those groupings of binaries “families.” The IOCs included in this appendix are representatives of families of malware used by APT1. The new designator follows the family name in the “Name” field of the IOC, and the presence of (FAMILY) implies that that IOC applies to the whole D family, not just one sample. Why Do These IOCs Look Somewhat Different Than Other IOCs I Have Seen From ED Mandiant? In many cases we have combined information that previously would have been in several indicators into a single indicator. Additionally, we have removed certain types of intelligence, since they are being released in separate appendices (such as FQDNs and IPs). Additionally, some IOCs in this set are using file permutation blocks to catch variants of malware that might not be O detected otherwise. What Is a File Permutation block? G It is a different way to structure lists of File Item attributes to look for an entire family of malware versus only one or two pieces. For more information on this topic or most any other IOC questions go to https://forums.mandiant.com. R Will You Update These IOCs? BA It is likely that we will make some changes to the IOCs in Appendix G as we get feedback. If updated, the updates will be available in the same location as the report http://www.mandiant.com/apt1. Will You Be Releasing More IOCs Like This? Currently, there are no plans for additional public releases of this magnitude. EM Mandiant APT1 73 www.mandiant.com