Lancefly APTグループ、カスタムバックドアで政府や航空部門などの組織を標的に

The article presents a large list of SHA-256 file hashes, described as a “File hash, simple list” related to LanceFly APT activity. It links to a Symantec Enterprise Blog post about LanceFly targeting government and aerospace sectors. #LanceFly #Symantec

Keypoints

  • The piece centers on a long list of file hashes (SHA-256), labeled as a simple hash collection.
  • Hashes are presented as potential indicators of compromise associated with LanceFly APT activity.
  • The article’s context implies interest in government and aerospace targets, as suggested by the article title and URL.
  • The content does not describe infection chains, tools, or techniques beyond the hash artifacts.
  • Source material references a Symantec Enterprise Blog post about LanceFly, lending credibility to the attribution.
  • Overall, this is an IOC-focused artifact dump rather than a narrative analysis of operations.

MITRE Techniques

  • No explicit MITRE ATT&CK techniques are described in the article; it provides only a list of IOCs (file hashes) related to LanceFly.

Indicators of Compromise

  • [File hash] context – 13df2d19f6d2719beeff3b882df1d3c9131a292cf097b27a0ffca5f45e139581, 8f64c25ba85f8b77cfba3701bebde119f610afef6d9a5965a3ed51a4a4b9dead, and many others

Read more: https://symantec-enterprise-blogs.security.com/blogs/japanese/lancefly-aptkurufukasutamuhatsukutoatezhengfuyahangkongbumennatonozuzhiwobiaodeni