id
stringlengths
14
15
text
stringlengths
96
2.14k
source
stringlengths
6
21
4d1ab63e9fd8-0
admin@338 - G0018 Created: 2017-05-31T21:31:53.579Z Modified: 2020-03-18T19:54:59.120Z Contributors: Tatsuya Daitoku, Cyber Defense Institute, Inc. Aliases admin@338 Description admin@338 is a China-based cyber threat group. It has previously used newsworthy events as lures to deliver malware and has primarily targeted organizations involved in financial, economic, and trade policy, typically using publicly available RATs such as PoisonIvy, as well as some non-public backdoors. (Citation: FireEye admin@338) Techniques Used admin@338 has sent emails with malicious Microsoft Office documents attached.(Citation: FireEye admin@338)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| admin@338 has attempted to get victims to launch malicious Microsoft Word attachments delivered via spearphishing emails.(Citation: FireEye admin@338)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| admin@338 has exploited client software vulnerabilities for execution, such as Microsoft Word CVE-2012-0158.(Citation: FireEye admin@338)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery| admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to display network connections: admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about files and directories: admin@338 actors used the following command after exploiting a machine with LOWBALL malware to acquire information about local networks: admin@338 actors used the following commands after exploiting a machine with LOWBALL malware to obtain information about the OS: admin@338 actors used the following command to rename one of their tools to a benign file name: admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts:
4d1ab63e9fd8-1
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: LOWBALL malware, admin@338 actors created a file containing a list of commands to be executed on the compromised computer.(Citation: FireEye admin@338)|
ea46a61de809-0
Ajax Security Team - G0130 Created: 2021-04-14T13:17:43.941Z Modified: 2021-12-17T19:27:27.246Z Contributors: Aliases Ajax Security Team,Operation Woolen-Goldfish,AjaxTM,Rocket Kitten,Flying Kitten,Operation Saffron Rose Description Ajax Security Team is a group that has been active since at least 2010 and believed to be operating out of Iran. By 2014 Ajax Security Team transitioned from website defacement operations to malware-based cyber espionage campaigns targeting the US defense industrial base and Iranian users of anti-censorship technologies.(Citation: FireEye Operation Saffron Rose 2013) Techniques Used Ajax Security Team has used FireMalv custom-developed malware, which collected passwords from the Firefox browser storage.(Citation: Check Point Rocket Kitten)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging| Ajax Security Team has used CWoolger and MPK, custom-developed malware, which recorded all keystrokes on an infected system.(Citation: Check Point Rocket Kitten)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1566.003|Spearphishing via Service| Ajax Security Team has used various social media channels to spearphish victims.(Citation: FireEye Operation Saffron Rose 2013)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Ajax Security Team has used personalized spearphishing attachments.(Citation: Check Point Rocket Kitten)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| Ajax Security Team has used Wrapper/Gholee, custom-developed malware, which downloaded additional malware to the infected system.(Citation: Check Point Rocket Kitten)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| Ajax Security Team has lured victims into executing malicious files.(Citation: FireEye Operation Saffron Rose 2013)|
Ajax_Security_Team.md
e8998f804553-0
ALLANITE - G1000 Created: 2017-05-31T21:31:57.307Z Modified: 2022-05-24T19:26:10.721Z Contributors: Dragos Threat Intelligence Aliases ALLANITE,Palmetto Fusion Description ALLANITE is a suspected Russian cyber espionage group, that has primarily targeted the electric utility sector within the United States and United Kingdom. The group's tactics and techniques are reportedly similar to Dragonfly, although ALLANITEs technical capabilities have not exhibited disruptive or destructive abilities. It has been suggested that the group maintains a presence in ICS for the purpose of gaining understanding of processes and to maintain persistence. (Citation: Dragos) Techniques Used |Matrix|Domain|Platform|Technique ID|Technique Name|Use| | :---| :---| :---| :---| :---| :---| |mitre-attack|ics-attack|Control Server,Data Historian,Engineering Workstation,Field Controller/RTU/PLC/IED,Human-Machine Interface,Input/Output Server,Safety Instrumented System/Protection Relay|T0859|Valid Accounts|ALLANITE utilized credentials collected through phishing and watering hole attacks. (Citation: Dragos)| |mitre-attack|ics-attack|Engineering Workstation,Human-Machine Interface,Control Server,Data Historian|T0865|Spearphishing Attachment|ALLANITE utilized spear phishing to gain access into energy sector environments. (Citation: Jeff Jones May 2018)| |mitre-attack|ics-attack|Human-Machine Interface|T0852|Screen Capture|ALLANITE has been identified to collect and distribute screenshots of ICS systems such as HMIs. (Citation: Dragos) (Citation: ICS-CERT October 2017)| |mitre-attack|ics-attack|None|T0817|Drive-by Compromise|ALLANITE leverages watering hole attacks to gain access into electric utilities. (Citation: Eduard Kovacs May 2018)|
ALLANITE.md
2fcf3d5df109-0
Andariel - G0138 Created: 2021-09-29T15:10:19.236Z Modified: 2022-11-30T22:51:40.270Z Contributors: Kyoung-ju Kwak (S2W) Aliases Andariel,Silent Chollima Description Andariel is a North Korean state-sponsored threat group that has been active since at least 2009. Andariel has primarily focused its operations--which have included destructive attacks--against South Korean government agencies, military organizations, and a variety of domestic companies; they have also conducted cyber financial operations against ATMs, banks, and cryptocurrency exchanges. Andariel's notable activity includes Operation Black Mine, Operation GoldenAxe, and Campaign Rifle.(Citation: FSI Andariel Campaign Rifle July 2017)(Citation: IssueMakersLab Andariel GoldenAxe May 2017)(Citation: AhnLab Andariel Subgroup of Lazarus June 2018)(Citation: TrendMicro New Andariel Tactics July 2018)(Citation: CrowdStrike Silent Chollima Adversary September 2021) Andariel is considered a sub-set of Lazarus Group, and has been attributed to North Korea's Reconnaissance General Bureau.(Citation: Treasury North Korean Cyber Groups September 2019) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups. Techniques Used Andariel has limited its watering hole attacks to specific IP address ranges.(Citation: AhnLab Andariel Subgroup of Lazarus June 2018)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| Andariel has used watering hole attacks, often with zero-day exploits, to gain initial access to victims within a specific IP range.(Citation: AhnLab Andariel Subgroup of Lazarus June 2018)(Citation: TrendMicro New Andariel Tactics July 2018)| |mitre-attack|enterprise-attack|PRE|T1592.002|Software|
Andariel.md
2fcf3d5df109-1
Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.(Citation: TrendMicro New Andariel Tactics July 2018)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery| Andariel has used the Andariel has attempted to lure victims into enabling malicious macros within email attachments.(Citation: AhnLab Andariel Subgroup of Lazarus June 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1057|Process Discovery| Andariel has used Andariel has downloaded additional tools and malware onto compromised hosts.(Citation: AhnLab Andariel Subgroup of Lazarus June 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.003|Steganography| Andariel has hidden malicious executables within PNG files.(Citation: MalwareBytes Lazarus-Andariel Conceals Code April 2021)(Citation: Kaspersky Andariel Ransomware June 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1005|Data from Local System| Andariel has collected large numbers of files from compromised network systems for later extraction.(Citation: FSI Andariel Campaign Rifle July 2017)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Andariel has conducted spearphishing campaigns that included malicious Word or Excel attachments.(Citation: AhnLab Andariel Subgroup of Lazarus June 2018)(Citation: MalwareBytes Lazarus-Andariel Conceals Code April 2021)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution|
Andariel.md
2fcf3d5df109-2
Andariel has exploited numerous ActiveX vulnerabilities, including zero-days.(Citation: FSI Andariel Campaign Rifle July 2017)(Citation: IssueMakersLab Andariel GoldenAxe May 2017)(Citation: TrendMicro New Andariel Tactics July 2018)| |mitre-attack|enterprise-attack|PRE|T1588.001|Malware| Andariel has used a variety of publicly-available remote access Trojans (RATs) for its operations.(Citation: FSI Andariel Campaign Rifle July 2017)|
Andariel.md
d5aac32d9620-0
Aoqin Dragon - G1007 Created: 2022-07-14T14:32:47.582Z Modified: 2022-10-24T18:50:40.179Z Contributors: Hiroki Nagahama, NEC Corporation,Pooja Natarajan, NEC Corporation India,Manikantan Srinivasan, NEC Corporation India Aliases Aoqin Dragon Description Aoqin Dragon is a suspected Chinese cyber espionage threat group that has been active since at least 2013. Aoqin Dragon has primarily targeted government, education, and telecommunication organizations in Australia, Cambodia, Hong Kong, Singapore, and Vietnam. Security researchers noted a potential association between Aoqin Dragon and UNC94, based on malware, infrastructure, and targets.(Citation: SentinelOne Aoqin Dragon June 2022) Techniques Used Aoqin Dragon has used a dropper that employs a worm infection strategy using a removable device to breach a secure network environment.(Citation: SentinelOne Aoqin Dragon June 2022)| |mitre-attack|enterprise-attack|PRE|T1587.001|Malware| Aoqin Dragon has used custom malware, including Mongall and Heyoka Backdoor, in their operations.(Citation: SentinelOne Aoqin Dragon June 2022)| |mitre-attack|enterprise-attack|PRE|T1588.002|Tool| Aoqin Dragon obtained the Heyoka open source exfiltration tool and subsequently modified it for their operations.(Citation: SentinelOne Aoqin Dragon June 2022)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1027.002|Software Packing| Aoqin Dragon has used the Themida packer to obfuscate malicious payloads.(Citation: SentinelOne Aoqin Dragon June 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1570|Lateral Tool Transfer| Aoqin Dragon has spread malware in target networks by copying modules to folders masquerading as removable devices.(Citation: SentinelOne Aoqin Dragon June 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery|
Aoqin_Dragon.md
d5aac32d9620-1
Aoqin Dragon has run scripts to identify file formats including Microsoft Word.(Citation: SentinelOne Aoqin Dragon June 2022)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| Aoqin Dragon has exploited CVE-2012-0158 and CVE-2010-3333 for execution against targeted systems.(Citation: SentinelOne Aoqin Dragon June 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| Aoqin Dragon has used fake icons including antivirus and external drives to disguise malicious payloads.(Citation: SentinelOne Aoqin Dragon June 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| Aoqin Dragon has lured victims into opening weaponized documents, fake external drives, and fake antivirus to execute malicious payloads.(Citation: SentinelOne Aoqin Dragon June 2022)|
Aoqin_Dragon.md
3ca68da0260e-0
APT-C-36 - G0099 Created: 2020-05-05T18:53:08.166Z Modified: 2021-05-26T20:17:53.085Z Contributors: Jose Luis Sánchez Martinez Aliases APT-C-36,Blind Eagle Description APT-C-36 is a suspected South America espionage group that has been active since at least 2018. The group mainly targets Colombian government institutions as well as important corporations in the financial sector, petroleum industry, and professional manufacturing.(Citation: QiAnXin APT-C-36 Feb2019) Techniques Used APT-C-36 obtained and used a modified variant of Imminent Monitor.(Citation: QiAnXin APT-C-36 Feb2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT-C-36 has downloaded binary data from a specified domain after the malicious document is opened.(Citation: QiAnXin APT-C-36 Feb2019)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic| APT-C-36 has embedded a VBScript within a malicious Word document which is executed upon the document opening.(Citation: QiAnXin APT-C-36 Feb2019)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1036.004|Masquerade Task or Service| APT-C-36 has disguised its scheduled tasks as those used by Google.(Citation: QiAnXin APT-C-36 Feb2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1571|Non-Standard Port| APT-C-36 has used port 4050 for C2 communications.(Citation: QiAnXin APT-C-36 Feb2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|
APT-C-36.md
3ca68da0260e-1
APT-C-36 has prompted victims to accept macros in order to execute the subsequent payload.(Citation: QiAnXin APT-C-36 Feb2019)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| APT-C-36 has used a macro function to set scheduled tasks, disguised as those used by Google.(Citation: QiAnXin APT-C-36 Feb2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| APT-C-36 has used ConfuserEx to obfuscate its variant of Imminent Monitor, compressed payload and RAT packages, and password protected encrypted email attachments to avoid detection.(Citation: QiAnXin APT-C-36 Feb2019)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway.(Citation: QiAnXin APT-C-36 Feb2019) |
APT-C-36.md
21b840153633-0
APT1 - G0006 Created: 2017-05-31T21:31:47.955Z Modified: 2021-05-26T12:23:48.842Z Contributors: Aliases APT1,Comment Crew,Comment Group,Comment Panda Description APT1 is a Chinese threat group that has been attributed to the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department, commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398. (Citation: Mandiant APT1) Techniques Used APT1 has used various open-source tools for privilege escalation purposes.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|PRE|T1588.001|Malware| APT1 used publicly available malware for privilege escalation.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|PRE|T1585.002|Email Accounts| APT1 has created email accounts for later use in social engineering, phishing, and when registering domains.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT1 has sent spearphishing emails containing malicious attachments.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| APT1 has sent spearphishing emails containing hyperlinks to malicious files.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|PRE|T1584.001|Domains| APT1 hijacked FQDNs associated with legitimate websites hosted by hop points.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|PRE|T1583.001|Domains| APT1 has registered hundreds of domains for use in operations.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Office 365,Windows,Google Workspace|T1114.002|Remote Email Collection|
APT1.md
21b840153633-1
APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1057|Process Discovery| APT1 gathered a list of running processes on the system using APT1 listed connected network shares.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1016|System Network Configuration Discovery| APT1 used the APT1 used a batch script to perform a series of discovery techniques and saves it to a text file.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1087.001|Local Account| APT1 used the commands APT1 used the APT1 used the commands APT1 has collected files from a local victim.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560.001|Archive via Utility| APT1 has used RAR to compress files before moving them outside of the victim network.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Windows|T1003.001|LSASS Memory| APT1 has been known to use credential dumping using Mimikatz.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location|The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used by APT1 as a name for malware.(Citation: Mandiant APT1)(Citation: Mandiant APT1 Appendix)| |mitre-attack|enterprise-attack|Windows|T1114.001|Local Email Collection|
APT1.md
21b840153633-2
APT1 as a name for malware.(Citation: Mandiant APT1)(Citation: Mandiant APT1 Appendix)| |mitre-attack|enterprise-attack|Windows|T1114.001|Local Email Collection| APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.(Citation: Mandiant APT1)| |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol|The APT1 group is known to have used RDP during operations.(Citation: FireEye PLA)| |mitre-attack|enterprise-attack|Windows|T1550.002|Pass the Hash|The APT1 group is known to have used pass the hash.(Citation: Mandiant APT1)|
APT1.md
1343ecd1650d-0
APT12 - G0005 Created: 2017-05-31T21:31:47.537Z Modified: 2020-03-30T18:44:59.268Z Contributors: Aliases APT12,IXESHE,DynCalc,Numbered Panda,DNSCALC Description APT12 is a threat group that has been attributed to China. The group has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments.(Citation: Meyers Numbered Panda) Techniques Used APT12 has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port.(Citation: Meyers Numbered Panda)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102.002|Bidirectional Communication| APT12 has used blogs and WordPress for C2 infrastructure.(Citation: Meyers Numbered Panda)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT12 has sent emails with malicious Microsoft Office documents and PDFs attached.(Citation: Moran 2014)(Citation: Trend Micro IXESHE 2012)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| APT12 has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities (CVE-2009-3129, CVE-2012-0158) and vulnerabilities in Adobe Reader and Flash (CVE-2009-4324, CVE-2009-0927, CVE-2011-0609, CVE-2011-0611).(Citation: Moran 2014)(Citation: Trend Micro IXESHE 2012)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| APT12 has attempted to get victims to open malicious Microsoft Word and PDF attachment sent via spearphishing.(Citation: Moran 2014)(Citation: Trend Micro IXESHE 2012)|
APT12.md
6f26f710f3db-0
APT16 - G0023 Created: 2017-05-31T21:31:56.270Z Modified: 2022-07-26T23:33:26.354Z Contributors: Aliases APT16 Description APT16 is a China-based threat group that has launched spearphishing campaigns targeting Japanese and Taiwanese organizations. (Citation: FireEye EPS Awakens Part 2) Techniques Used |Matrix|Domain|Platform|Technique ID|Technique Name|Use| | :---| :---| :---| :---| :---| :---| |mitre-attack|enterprise-attack|PRE|T1584.004|Server|APT16 has compromised otherwise legitimate sites as staging servers for second-stage payloads.(Citation: FireEye EPS Awakens Part 2)|
APT16.md
474f375003fe-0
APT17 - G0025 Created: 2017-05-31T21:31:57.307Z Modified: 2020-10-13T22:33:14.018Z Contributors: Aliases APT17,Deputy Dog Description APT17 is a China-based threat group that has conducted network intrusions against U.S. government entities, the defense industry, law firms, information technology companies, mining companies, and non-government organizations. (Citation: FireEye APT17) Techniques Used |Matrix|Domain|Platform|Technique ID|Technique Name|Use| | :---| :---| :---| :---| :---| :---| |mitre-attack|enterprise-attack|PRE|T1585|Establish Accounts|APT17 has created and cultivated profile pages in Microsoft TechNet. To make profile pages appear more legitimate, APT17 has created biographical sections and posted in forum threads.(Citation: FireEye APT17)| |mitre-attack|enterprise-attack|PRE|T1583.006|Web Services|APT17 has created profile pages in Microsoft TechNet that were used as C2 infrastructure.(Citation: FireEye APT17)|
APT17.md
46ea6a774e7e-0
APT18 - G0026 Created: 2017-05-31T21:31:57.733Z Modified: 2020-03-30T18:46:16.853Z Contributors: Aliases APT18,TG-0416,Dynamite Panda,Threat Group-0416 Description APT18 is a threat group that has operated since at least 2009 and has targeted a range of industries, including technology, manufacturing, human rights groups, government, and medical. (Citation: Dell Lateral Movement) Techniques Used APT18 uses DNS for C2 communications.(Citation: PaloAlto DNS Requests May 2016)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| APT18 establishes persistence via the APT18 obfuscates strings in the payload.(Citation: PaloAlto DNS Requests May 2016)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| APT18 uses cmd.exe to execute commands on the victim’s machine.(Citation: PaloAlto DNS Requests May 2016)(Citation: Anomali Evasive Maneuvers July 2015)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT18 can upload a file to the victim’s machine.(Citation: PaloAlto DNS Requests May 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| APT18 can list files information for specific directories.(Citation: PaloAlto DNS Requests May 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| APT18 uses HTTP for C2 communications.(Citation: PaloAlto DNS Requests May 2016)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery|
APT18.md
46ea6a774e7e-1
APT18 can collect system information from the victim’s machine.(Citation: PaloAlto DNS Requests May 2016)| |mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| APT18 actors leverage legitimate credentials to log into external remote services.(Citation: RSA2017 Detect and Respond Adair)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1053.002|At| APT18 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network.(Citation: Dell Lateral Movement)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| APT18 actors leverage legitimate credentials to log into external remote services.(Citation: RSA2017 Detect and Respond Adair)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| APT18 actors deleted tools and batch files from victim systems.(Citation: Dell Lateral Movement)|
APT18.md
725bde59d993-0
APT19 - G0073 Created: 2018-10-17T00:14:20.652Z Modified: 2023-03-21T20:44:02.443Z Contributors: FS-ISAC,Darren Spruell Aliases APT19,Codoso,C0d0so0,Codoso Team,Sunshop Group Description APT19 is a Chinese-based threat group that has targeted a variety of industries, including defense, finance, energy, pharmaceutical, telecommunications, high tech, education, manufacturing, and legal services. In 2017, a phishing campaign was used to target seven law and investment firms. (Citation: FireEye APT19) Some analysts track APT19 and Deep Panda as the same group, but it is unclear from open source information if the groups are the same. (Citation: ICIT China's Espionage Jul 2016) (Citation: FireEye APT Groups) (Citation: Unit 42 C0d0so0 Jan 2016) Techniques Used APT19 used Base64 to obfuscate executed commands.(Citation: FireEye APT19)| |mitre-attack|enterprise-attack|PRE|T1588.002|Tool| APT19 has obtained and used publicly-available tools like Empire.(Citation: NCSC Joint Report Public Tools)(Citation: FireEye APT19)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1564.003|Hidden Window| APT19 used PowerShell windows by setting the WindowStyle parameter to hidden. (Citation: FireEye APT19)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| APT19 attempted to get users to launch malicious attachments delivered via spearphishing emails.(Citation: FireEye APT19)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| APT19 used PowerShell commands to execute payloads.(Citation: FireEye APT19)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery|
APT19.md
725bde59d993-1
APT19 used PowerShell commands to execute payloads.(Citation: FireEye APT19)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery| APT19 used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username.(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|Windows|T1574.002|DLL Side-Loading| APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| APT19 used HTTP for C2 communications. APT19 also used an HTTP malware variant to communicate over HTTP for C2.(Citation: FireEye APT19)(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|Windows|T1543.003|Windows Service|An APT19 Port 22 malware variant registers itself as a service.(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder|An APT19 HTTP malware variant establishes persistence by setting the Registry key APT19 collected system architecture information. APT19 used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine.(Citation: FireEye APT19)(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1016|System Network Configuration Discovery|
APT19.md
725bde59d993-2
APT19 used an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim’s machine.(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network,Office 365,Azure AD,IaaS,Google Workspace|T1059|Command and Scripting Interpreter| APT19 downloaded and launched code within a SCT file.(Citation: FireEye APT19)| |mitre-attack|enterprise-attack|Windows|T1218.010|Regsvr32| APT19 used Regsvr32 to bypass application control techniques.(Citation: FireEye APT19)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1132.001|Standard Encoding|An APT19 HTTP malware variant used Base64 to encode communications to the C2 server.(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| APT19 used Base64 to obfuscate payloads.(Citation: FireEye APT19)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| APT19 performed a watering hole attack on forbes.com in 2014 to compromise targets.(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|Windows|T1218.011|Rundll32| APT19 configured its payload to inject into the rundll32.exe.(Citation: FireEye APT19)| |mitre-attack|enterprise-attack|Windows|T1112|Modify Registry| APT19 uses a Port 22 malware variant to modify several Registry keys.(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1140|Deobfuscate/Decode Files or Information|An
APT19.md
725bde59d993-3
APT19 HTTP malware variant decrypts strings using single-byte XOR keys.(Citation: Unit 42 C0d0so0 Jan 2016)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.(Citation: FireEye APT19)|
APT19.md
869c6bc17ece-0
APT28 - G0007 Created: 2017-05-31T21:31:48.664Z Modified: 2023-03-26T17:51:20.401Z Contributors: Sébastien Ruel, CGI,Drew Church, Splunk,Emily Ratliff, IBM,Richard Gold, Digital Shadows Aliases APT28,IRON TWILIGHT,SNAKEMACKEREL,Swallowtail,Group 74,Sednit,Sofacy,Pawn Storm,Fancy Bear,STRONTIUM,Tsar Team,Threat Group-4127,TG-4127 Description APT28 is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: FireEye APT28 January 2017)(Citation: GRIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018)(Citation: ESET Zebrocy May 2019)
APT28.md
869c6bc17ece-1
APT28 reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. (Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with APT28 for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as Sandworm Team. Techniques Used APT28 has used newly-created Blogspot pages for credential harvesting operations.(Citation: Google TAG Ukraine Threat Landscape March 2022)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1598.003|Spearphishing Link| APT28 has conducted credential phishing campaigns with embedded links to attacker-controlled domains.(Citation: Google TAG Ukraine Threat Landscape March 2022)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1586.002|Email Accounts| APT28 has used compromised email accounts to send credential phishing emails.(Citation: Google TAG Ukraine Threat Landscape March 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| APT28 has compromised targets via strategic web compromise utilizing custom exploit kits.(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location|
APT28.md
869c6bc17ece-2
APT28 has changed extensions on files containing exfiltrated data to make them appear benign, and renamed a web shell instance to appear as a legitimate OWA page.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Containers|T1036|Masquerading| APT28 has renamed the WinRAR utility to avoid detection.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| APT28 has used Tor and a variety of commercial VPN services to route brute force authentication attempts.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1030|Data Transfer Size Limits| APT28 has split archived exfiltration files into chunks smaller than 1MB.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1048.002|Exfiltration Over Asymmetric Encrypted Non-C2 Protocol| APT28 has exfiltrated archives of collected data previously staged on a target's OWA server via HTTPS.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,Windows,macOS,SaaS,Office 365,Google Workspace,IaaS|T1213|Data from Information Repositories| APT28 has collected files from various information repositories.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows,IaaS,Linux,macOS|T1074.002|Remote Data Staging|
APT28.md
869c6bc17ece-3
APT28 has staged archives of collected data on a target's Outlook Web Access (OWA) server.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1560.001|Archive via Utility| APT28 has used a variety of utilities, including WinRAR, to archive collected data with password protection.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1039|Data from Network Shared Drive| APT28 has collected files from network shared drives.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1003.003|NTDS| APT28 has used the ntdsutil.exe utility to export the Active Directory database for credential access.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1021.002|SMB/Windows Admin Shares| APT28 has mapped network drives using Net and administrator credentials.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Office 365,Google Workspace|T1098.002|Additional Email Delegate Permissions| APT28 has used a Powershell cmdlet to grant the APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell| APT28 has used a modified and obfuscated version of the reGeorg web shell to maintain persistence on a target's Outlook Web Access (OWA) server.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1588.002|Tool|
APT28.md
869c6bc17ece-4
APT28 has obtained and used open-source tools like Koadic, Mimikatz, and Responder.(Citation: Palo Alto Sofacy 06-2018)(Citation: Securelist Sofacy Feb 2018)(Citation: FireEye APT28 Hospitality Aug 2017)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1204.001|Malicious Link| APT28 has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.(Citation: US District Court Indictment GRU Oct 2018)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1589.001|Credentials| APT28 has harvested user's login credentials.(Citation: Microsoft Targeting Elections September 2020)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1598|Phishing for Information| APT28 has used spearphishing to compromise credentials.(Citation: Microsoft Targeting Elections September 2020)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1567|Exfiltration Over Web Service| APT28 can exfiltrate data over Google Drive.(Citation: TrendMicro Pawn Storm Dec 2020) | |mitre-attack|enterprise-attack,mobile-attack|PRE|T1595.002|Vulnerability Scanning| APT28 has performed large-scale scans in an attempt to find vulnerable servers.(Citation: TrendMicro Pawn Storm 2019)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Network|T1090.003|Multi-hop Proxy| APT28 has routed traffic over Tor and VPN servers to obfuscate their activities.(Citation: TrendMicro Pawn Storm Dec 2020)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1547.001|Registry Run Keys / Startup Folder|
APT28.md
869c6bc17ece-5
APT28 has deployed malware that has copied itself to the startup directory for persistence.(Citation: TrendMicro Pawn Storm Dec 2020)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1102.002|Bidirectional Communication| APT28 has used Google Drive for C2.(Citation: TrendMicro Pawn Storm Dec 2020)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1110|Brute Force| APT28 can perform brute force attacks to obtain credentials.(Citation: TrendMicro Pawn Storm 2019)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Microsoft Targeting Elections September 2020)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1583.001|Domains| APT28 registered domains imitating NATO, OSCE security websites, Caucasus information resources, and other organizations.(Citation: FireEye APT28)(Citation: US District Court Indictment GRU Oct 2018)(Citation: Google TAG Ukraine Threat Landscape March 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers|T1498|Network Denial of Service|In 2016, APT28 conducted a distributed denial of service (DDoS) attack against the World Anti-Doping Agency.(Citation: US District Court Indictment GRU Oct 2018)| |mitre-attack|enterprise-attack,mobile-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application|
APT28.md
869c6bc17ece-6
APT28 has used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144, to gain execution on vulnerable Microsoft Exchange; they have also conducted SQL injection attacks against external websites.(Citation: US District Court Indictment GRU Oct 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1110.001|Password Guessing| APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days.(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020) APT28 has also used a Kubernetes cluster to conduct distributed, large-scale password guessing attacks.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers|T1110.003|Password Spraying| APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks.(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: Microsoft Targeting Elections September 2020) APT28 has also used a Kubernetes cluster to conduct distributed, large-scale password spray attacks.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Linux,macOS|T1003|OS Credential Dumping| APT28 regularly deploys both publicly available (ex:
APT28.md
869c6bc17ece-7
APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims.(Citation: ESET Sednit Part 2)(Citation: DOJ GRU Indictment Jul 2018)(Citation: US District Court Indictment GRU Oct 2018) | |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1071.001|Web Protocols|Later implants used by APT28, such as CHOPSTICK, use a blend of HTTP, HTTPS, and other legitimate channels for C2, depending on module configuration.(Citation: FireEye APT28)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|macOS,Windows,Linux|T1564.003|Hidden Window| APT28 has used the WindowStyle parameter to conceal PowerShell windows.(Citation: Palo Alto Sofacy 06-2018) (Citation: McAfee APT28 DDE1 Nov 2017)| |mitre-attack|enterprise-attack,mobile-attack|SaaS,Office 365,Azure AD,Google Workspace,Containers|T1528|Steal Application Access Token| APT28 has used several malicious applications to steal user OAuth access tokens including applications masquerading as "Google Defender" "Google Email Protection," and "Google Scanner" for Gmail users. They also targeted Yahoo users with applications masquerading as "Delivery Service" and "McAfee Email Protection".(Citation: Trend Micro Pawn Storm OAuth 2017)| |mitre-attack|enterprise-attack,mobile-attack|Office 365,SaaS,Google Workspace,Containers,IaaS,Azure AD|T1550.001|Application Access Token| APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts, including Gmail and Yahoo Mail.(Citation: Trend Micro Pawn Storm OAuth 2017)| |mitre-attack|enterprise-attack,mobile-attack|Linux,Windows,macOS|T1573.001|Symmetric Cryptography|
APT28.md
869c6bc17ece-8
APT28 installed a Delphi backdoor that used a custom algorithm for C2 communications.(Citation: ESET Zebrocy May 2019)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1221|Template Injection| APT28 used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro. (Citation: Unit42 Sofacy Dec 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| APT28 has exploited Microsoft Office vulnerability CVE-2017-0262 for execution.(Citation: Securelist Sofacy Feb 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1014|Rootkit| APT28 has used a UEFI (Unified Extensible Firmware Interface) rootkit known as LoJax.(Citation: Symantec APT28 Oct 2018)(Citation: ESET LoJax Sept 2018)| |mitre-attack|enterprise-attack,mobile-attack|Office 365,Windows,Google Workspace|T1114.002|Remote Email Collection| APT28 has collected emails from victim Microsoft Exchange servers.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1059.001|PowerShell| APT28 downloads and executes PowerShell scripts and performs PowerShell commands.(Citation: Palo Alto Sofacy 06-2018)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,IaaS,SaaS|T1119|Automated Collection| APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.(Citation: DOJ GRU Indictment Jul 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1560|Archive Collected Data|
APT28.md
869c6bc17ece-9
APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.(Citation: DOJ GRU Indictment Jul 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| APT28 sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites.(Citation: DOJ GRU Indictment Jul 2018)(Citation: ESET Zebrocy May 2019)(Citation: US District Court Indictment GRU Oct 2018)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)| |mitre-attack|enterprise-attack,mobile-attack|Windows,SaaS,IaaS,Linux,macOS,Office 365|T1199|Trusted Relationship|Once APT28 gained access to the DCCC network, the group then proceeded to use that access to compromise the DNC network.(Citation: DOJ GRU Indictment Jul 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,Windows,macOS|T1211|Exploitation for Defense Evasion| APT28 has used CVE-2015-4902 to bypass security features.(Citation: Bitdefender APT28 Dec 2015)(Citation: Microsoft SIR Vol 19)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1204.002|Malicious File| APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts.(Citation: Unit 42 Sofacy Feb 2018)(Citation: Accenture SNAKEMACKEREL Nov 2018)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Office 365|T1213.002|Sharepoint|
APT28.md
869c6bc17ece-10
APT28 has collected information from Microsoft SharePoint services within target networks.(Citation: RSAC 2015 Abu Dhabi Stefano Maccaglia)| |mitre-attack|enterprise-attack,mobile-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments.(Citation: Unit 42 Sofacy Feb 2018)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: DOJ GRU Indictment Jul 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Accenture SNAKEMACKEREL Nov 2018)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)| |mitre-attack|enterprise-attack,mobile-attack|Windows,macOS,Linux|T1564.001|Hidden Files and Directories| APT28 has saved files with hidden file attributes.(Citation: Talos Seduploader Oct 2017)(Citation: Talos Seduploader Oct 2017)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1059.003|Windows Command Shell|An APT28 loader Trojan uses a cmd.exe and batch script to run its payload.(Citation: Unit 42 Playbook Dec 2017) The group has also used macros to execute payloads.(Citation: Talos Seduploader Oct 2017)(Citation: Unit42 Cannon Nov 2018)(Citation: Accenture SNAKEMACKEREL Nov 2018)(Citation: TrendMicro Pawn Storm Dec 2020)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Linux,macOS|T1140|Deobfuscate/Decode Files or Information|An APT28 macro uses the command
APT28.md
869c6bc17ece-11
APT28 macro uses the command APT28 exploited a Windows SMB Remote Code Execution Vulnerability to conduct lateral movement.(Citation: FireEye APT28)(Citation: FireEye APT28 Hospitality Aug 2017)(Citation: MS17-010 March 2017)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1037.001|Logon Script (Windows)|An APT28 loader Trojan adds the Registry key APT28 has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration.(Citation: Überwachung APT28 Forfiles June 2015)(Citation: DOJ GRU Indictment Jul 2018)(Citation: TrendMicro Pawn Storm 2019)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Network,IaaS|T1040|Network Sniffing| APT28 deployed the open source tool Responder to conduct NetBIOS Name Service poisoning, which captured usernames and hashed passwords that allowed access to legitimate credentials.(Citation: FireEye APT28)(Citation: FireEye APT28 Hospitality Aug 2017) APT28 close-access teams have used Wi-Fi pineapples to intercept Wi-Fi signals and user credentials.(Citation: US District Court Indictment GRU Oct 2018)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1559.002|Dynamic Data Exchange| APT28 has delivered JHUHUGIT and Koadic by executing PowerShell commands through DDE in Word documents.(Citation: McAfee APT28 DDE1 Nov 2017)(Citation: McAfee APT28 DDE2 Nov 2017)(Citation: Palo Alto Sofacy 06-2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1070.004|File Deletion|
APT28.md
869c6bc17ece-12
APT28 has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner.(Citation: DOJ GRU Indictment Jul 2018)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1134.001|Token Impersonation/Theft| APT28 has used CVE-2015-1701 to access the SYSTEM token and copy it into the current process as part of privilege escalation.(Citation: FireEye Op RussianDoll)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Office 365|T1137.002|Office Test| APT28 has used the Office Test persistence mechanism within Microsoft Office by adding the Registry key APT28 has used Forfiles to locate PDF, Excel, and Word documents during collection. The group also searched a compromised DCCC computer for specific terms.(Citation: Überwachung APT28 Forfiles June 2015)(Citation: DOJ GRU Indictment Jul 2018)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| APT28 has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder.(Citation: Trend Micro Pawn Storm April 2017)(Citation: DOJ GRU Indictment Jul 2018)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Network|T1057|Process Discovery|An APT28 loader Trojan will enumerate the victim's processes searching for explorer.exe if its current process does not have necessary permissions.(Citation: Unit 42 Playbook Dec 2017)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1550.002|Pass the Hash|
APT28.md
869c6bc17ece-13
APT28 has used pass the hash for lateral movement.(Citation: Microsoft SIR Vol 19)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1025|Data from Removable Media|An APT28 backdoor may collect the entire contents of an inserted USB device.(Citation: Microsoft SIR Vol 19)| |mitre-attack|enterprise-attack,mobile-attack|Windows,macOS,Linux|T1120|Peripheral Device Discovery| APT28 uses a module to receive a notification every time a USB mass storage device is inserted into a victim.(Citation: Microsoft SIR Vol 19)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1074.001|Local Data Staging| APT28 has stored captured credential information in a file named pi.log.(Citation: Microsoft SIR Vol 19)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1092|Communication Through Removable Media| APT28 uses a tool that captures information from air-gapped computers via an infected USB and transfers it to network-connected computer when the USB is inserted.(Citation: Microsoft SIR Vol 19)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1546.015|Component Object Model Hijacking| APT28 has used COM hijacking for persistence by replacing the legitimate APT28 has used tools to take screenshots from victims.(Citation: ESET Sednit Part 2)(Citation: XAgentOSX 2017)(Citation: DOJ GRU Indictment Jul 2018)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1003.001|LSASS Memory| APT28 regularly deploys both publicly available (ex:
APT28.md
869c6bc17ece-14
APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims.(Citation: ESET Sednit Part 2)(Citation: DOJ GRU Indictment Jul 2018) They have also dumped the LSASS process memory using the MiniDump function.(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging| APT28 has used tools to perform keylogging.(Citation: Microsoft SIR Vol 19)(Citation: DOJ GRU Indictment Jul 2018)(Citation: TrendMicro Pawn Storm Dec 2020)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| APT28 encrypted a .dll payload using RTL and a custom encryption algorithm. APT28 has also obfuscated payloads with base64, XOR, and RC4.(Citation: Bitdefender APT28 Dec 2015)(Citation: Unit 42 Sofacy Feb 2018)(Citation: Palo Alto Sofacy 06-2018)(Citation: Talos Seduploader Oct 2017)(Citation: Accenture SNAKEMACKEREL Nov 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,Windows|T1542.003|Bootkit| APT28 has deployed a bootkit along with Downdelph to ensure its persistence on the victim. The bootkit shares code with some variants of BlackEnergy.(Citation: ESET Sednit Part 3)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Containers|T1068|Exploitation for Privilege Escalation|
APT28.md
869c6bc17ece-15
APT28 has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges.(Citation: Bitdefender APT28 Dec 2015)(Citation: Microsoft SIR Vol 19)(Citation: Securelist Sofacy Feb 2018)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1091|Replication Through Removable Media| APT28 uses a tool to infect connected USB devices and transmit itself to air-gapped computers when the infected USB device is inserted.(Citation: Microsoft SIR Vol 19)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1070.001|Clear Windows Event Logs| APT28 has cleared event logs, including by using the commands APT28 has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims.(Citation: FireEye APT28)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1001.001|Junk Data| APT28 added "junk data" to each encoded string, preventing trivial decoding without knowledge of the junk removal algorithm. Each implant was given a "junk length" value when created, tracked by the controller software to allow seamless communication but prevent analysis of the command protocol on the wire.(Citation: FireEye APT28)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer|
APT28.md
869c6bc17ece-16
APT28 has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.(Citation: Bitdefender APT28 Dec 2015)(Citation: Unit 42 Playbook Dec 2017)(Citation: Accenture SNAKEMACKEREL Nov 2018)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1070.006|Timestomp| APT28 has performed timestomping on victim files.(Citation: Crowdstrike DNC June 2016)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1090.002|External Proxy| APT28 used other victims as proxies to relay command traffic, for instance using a compromised Georgian military email server as a hop point to NATO victims. The group has also used a tool that acts as a proxy to allow C2 even if the victim is behind a router. APT28 has also used a machine to relay and obscure communications between CHOPSTICK and their server.(Citation: FireEye APT28)(Citation: Bitdefender APT28 Dec 2015)(Citation: DOJ GRU Indictment Jul 2018)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1218.011|Rundll32| APT28 executed CHOPSTICK by using rundll32 commands such as APT28 also executed a .dll for a first stage dropper using rundll32.exe. An APT28 loader Trojan saved a batch script that uses rundll32 to execute a DLL payload.(Citation: Crowdstrike DNC June 2016)(Citation: Bitdefender APT28 Dec 2015)(Citation: Palo Alto Sofacy 06-2018)(Citation: Unit 42 Playbook Dec 2017)(Citation: ESET Zebrocy May 2019)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)|
APT28.md
70ab680d3c44-0
APT29 - G0016 Created: 2017-05-31T21:31:52.748Z Modified: 2023-04-16T22:25:01.191Z Contributors: Daniyal Naeem, BT Security,Matt Brenton, Zurich Insurance Group,Katie Nickels, Red Canary,Joe Gumke, U.S. Bank Aliases APT29,IRON RITUAL,IRON HEMLOCK,NobleBaron,Dark Halo,StellarParticle,NOBELIUM,UNC2452,YTTRIUM,The Dukes,Cozy Bear,CozyDuke,SolarStorm,Blue Kitsune Description APT29 is threat group that has been attributed to Russia's Foreign Intelligence Service (SVR).(Citation: White House Imposing Costs RU Gov April 2021)(Citation: UK Gov Malign RIS Activity April 2021) They have operated since at least 2008, often targeting government networks in Europe and NATO member countries, research institutes, and think tanks. APT29 reportedly compromised the Democratic National Committee starting in the summer of 2015.(Citation: F-Secure The Dukes)(Citation: GRIZZLY STEPPE JAR)(Citation: Crowdstrike DNC June 2016)(Citation: UK Gov UK Exposes Russia SolarWinds April 2021) In April 2021, the US and UK governments attributed the SolarWinds Compromise to the SVR; public statements included citations to APT29, Cozy Bear, and The Dukes.(Citation: NSA Joint Advisory SVR SolarWinds April 2021)(Citation: UK NSCS Russia SolarWinds April 2021) Industry reporting also referred to the actors involved in this campaign as UNC2452, NOBELIUM, StellarParticle, Dark Halo, and SolarStorm.(Citation: FireEye SUNBURST Backdoor December 2020)(Citation: MSTIC NOBELIUM Mar 2021)(Citation: CrowdStrike SUNSPOT Implant January 2021)(Citation: Volexity SolarWinds)(Citation: Cybersecurity Advisory SVR TTP May 2021)(Citation: Unit 42 SolarStorm December 2020) Techniques Used
APT29.md
70ab680d3c44-1
Techniques Used APT29 has used residential proxies, including Azure Virtual Machines, to obfuscate their access to victim environments.(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|Office 365,Windows,Google Workspace|T1114.002|Remote Email Collection| APT29 has collected emails from targeted mailboxes within a compromised Azure AD tenant.(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|Windows,Office 365,Google Workspace|T1098.002|Additional Email Delegate Permissions| APT29 has used a compromised global administrator account in Azure AD to backdoor a service principal with APT29 has gained access to a global administrator account in Azure AD.(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| APT29 has used a compromised account to access an organization's VPN infrastructure.(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|Azure AD,Windows,SaaS|T1098.005|Device Registration| APT29 has enrolled a device in MFA to an Azure AD environment following a successful password guessing attack against a dormant account.(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1110.001|Password Guessing| APT29 has successfully conducted password guessing attacks against a list of mailboxes.(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Containers,IaaS|T1562.001|Disable or Modify Tools|
APT29.md
70ab680d3c44-2
APT29 has disabled Purview Audit on targeted accounts prior to stealing emails from Microsoft 365 tenants.(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|IaaS,Azure AD,Office 365,SaaS,Google Workspace|T1059.009|Cloud API| APT29 has leveraged the Microsoft Graph API to perform various actions across Azure and M365 environments. They have also utilized AADInternals PowerShell Modules to access the API (Citation: MSTIC Nobelium Toolset May 2021)| |mitre-attack|enterprise-attack|IaaS,Azure AD|T1651|Cloud Administration Command| APT29 has used Azure Run Command and Azure Admin-on-Behalf-of (AOBO) to execute code on virtual machines.(Citation: MSTIC Nobelium Oct 2021)| |mitre-attack|enterprise-attack|Office 365,Azure AD,SaaS,IaaS,Google Workspace|T1021.007|Cloud Services| APT29 has leveraged compromised high-privileged on-premises accounts synced to Office 365 to move laterally into a cloud environment, including through the use of Azure AD PowerShell.(Citation: Mandiant Remediation and Hardening Strategies for Microsoft 365)| |mitre-attack|enterprise-attack|Windows,Azure AD,SaaS,Google Workspace,Office 365,IaaS|T1556.007|Hybrid Identity| APT29 has edited the APT29 has abused misconfigured AD CS certificate templates to impersonate admin users and create additional authentication certificates.(Citation: Mandiant APT29 Trello)| |mitre-attack|enterprise-attack|Windows,Office 365,Linux,macOS,IaaS,SaaS,Azure AD,Google Workspace|T1621|Multi-Factor Authentication Request Generation| APT29 has used repeated MFA requests to gain access to victim accounts.(Citation: Suspected Russian Activity Targeting Government and Business Entities Around the Globe)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1027.006|HTML Smuggling|
APT29.md
70ab680d3c44-3
APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.(Citation: ESET T3 Threat Report 2021) | |mitre-attack|enterprise-attack|PRE|T1586.002|Email Accounts| APT29 has compromised email accounts to further enable phishing campaigns and taken control of dormant accounts.(Citation: ANSSI Nobelium Phishing December 2021)(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|Azure AD,Office 365,SaaS,IaaS,Google Workspace|T1087.004|Cloud Account| APT29 has conducted enumeration of Azure AD accounts.(Citation: MSTIC Nobelium Oct 2021)| |mitre-attack|enterprise-attack|Azure AD,Office 365,IaaS,Google Workspace,SaaS|T1136.003|Cloud Account| APT29 can create new users through Azure AD.(Citation: MSTIC Nobelium Oct 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1573|Encrypted Channel| APT29 has used multiple layers of encryption within malware to protect C2 communication.(Citation: Secureworks IRON HEMLOCK Profile)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1068|Exploitation for Privilege Escalation| APT29 has exploited CVE-2021-36934 to escalate privileges on a compromised host.(Citation: ESET T3 Threat Report 2021)| |mitre-attack|enterprise-attack|Windows|T1553.005|Mark-of-the-Web Bypass| APT29 has embedded ISO images and VHDX files in HTML to evade Mark-of-the-Web.(Citation: ESET T3 Threat Report 2021)| |mitre-attack|enterprise-attack|Windows|T1218.005|Mshta| APT29 has use APT29 has obtained and used a variety of tools including Mimikatz, SDelete, Tor, meek, and
APT29.md
70ab680d3c44-4
APT29 has use APT29 has obtained and used a variety of tools including Mimikatz, SDelete, Tor, meek, and Cobalt Strike.(Citation: Mandiant No Easy Breach)(Citation: F-Secure The Dukes)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.001|Binary Padding| APT29 used large size files to avoid detection by security solutions with hardcoded size limits.(Citation: SentinelOne NobleBaron June 2021)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers|T1110.003|Password Spraying| APT29 has conducted brute force password spray attacks.(Citation: MSRC Nobelium June 2021)(Citation: MSTIC Nobelium Oct 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1566.003|Spearphishing via Service| APT29 has used the legitimate mailing service Constant Contact to send phishing e-mails.(Citation: MSTIC NOBELIUM May 2021)| |mitre-attack|enterprise-attack|Windows,SaaS,IaaS,Linux,macOS,Office 365|T1199|Trusted Relationship| APT29 has compromised IT, cloud services, and managed services providers to gain broad access to multiple customers for subsequent operations.(Citation: MSTIC Nobelium Oct 2021)| |mitre-attack|enterprise-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell| APT29 has installed web shells on exploited Microsoft Exchange servers.(Citation: Cybersecurity Advisory SVR TTP May 2021)| |mitre-attack|enterprise-attack|PRE|T1595.002|Vulnerability Scanning| APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit.(Citation: Cybersecurity Advisory SVR TTP May 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link|
APT29.md
70ab680d3c44-5
APT29 has used various forms of spearphishing attempting to get a user to click on a malicous link.(Citation: MSTIC NOBELIUM May 2021)(Citation: Secureworks IRON RITUAL USAID Phish May 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT29 has downloaded additional tools and malware onto compromised networks.(Citation: Mandiant No Easy Breach)(Citation: PWC WellMess July 2020)(Citation: F-Secure The Dukes)| |mitre-attack|enterprise-attack|PRE|T1587.001|Malware| APT29 has used unique malware in many of their operations.(Citation: F-Secure The Dukes)(Citation: Mandiant No Easy Breach)(Citation: MSTIC Nobelium Toolset May 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| APT29 has renamed malicious DLLs with legitimate names to appear benign; they have also created an Azure AD certificate with a Common Name that matched the display name of the compromised service principal.(Citation: SentinelOne NobleBaron June 2021)(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| APT29 has used compromised identities to access networks via VPNs and Citrix.(Citation: NCSC APT29 July 2020)(Citation: Mandiant APT29 Microsoft 365 2022)| |mitre-attack|enterprise-attack|PRE|T1587.003|Digital Certificates| APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware.(Citation: PWC WellMess July 2020)(Citation: PWC WellMess C2 August 2020)| |mitre-attack|enterprise-attack|PRE|T1583.006|Web Services| APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware, such as HAMMERTOSS.
APT29.md
70ab680d3c44-6
APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware, such as HAMMERTOSS. APT29 has also used legitimate web services such as Dropbox and Constant Contact in their operations.(Citation: FireEye APT29)(Citation: MSTIC NOBELIUM May 2021)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application| APT29 has exploited CVE-2019-19781 for Citrix, CVE-2019-11510 for Pulse Secure VPNs, CVE-2018-13379 for FortiGate VPNs, and CVE-2019-9670 in Zimbra software to gain access.(Citation: Cybersecurity Advisory SVR TTP May 2021)(Citation: NCSC APT29 July 2020)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1059.006|Python| APT29 has developed malware variants written in Python.(Citation: Symantec Seaduke 2015)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| APT29 has used various forms of spearphishing attempting to get a user to open attachments, including, but not limited to, malicious Microsoft Word documents, .pdf, and .lnk files. (Citation: F-Secure The Dukes)(Citation: ESET T3 Threat Report 2021)(Citation: Secureworks IRON HEMLOCK Profile)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims.(Citation: F-Secure The Dukes)(Citation: MSTIC NOBELIUM May 2021)(Citation: ESET T3 Threat Report 2021)(Citation: Secureworks IRON HEMLOCK Profile)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link|
APT29.md
70ab680d3c44-7
APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.(Citation: Mandiant No Easy Breach)(Citation: MSTIC NOBELIUM May 2021)(Citation: Secureworks IRON RITUAL USAID Phish May 2021)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| APT29 has used multiple software exploits for common client software, like Microsoft Word, Exchange, and Adobe Reader, to gain code execution.(Citation: F-Secure The Dukes)(Citation: Cybersecurity Advisory SVR TTP May 2021)(Citation: MSTIC NOBELIUM May 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1090.003|Multi-hop Proxy|A backdoor used by APT29 created a Tor hidden service to forward traffic from the Tor client to local ports 3389 (RDP), 139 (Netbios), and 445 (SMB) enabling full remote access from outside the network and has also used TOR.(Citation: Mandiant No Easy Breach)(Citation: MSTIC Nobelium Oct 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1090.004|Domain Fronting| APT29 has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic.(Citation: Mandiant No Easy Breach)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1027.002|Software Packing| APT29 used UPX to pack files.(Citation: Mandiant No Easy Breach)| |mitre-attack|enterprise-attack|Windows|T1550.003|Pass the Ticket| APT29 used Kerberos ticket attacks for lateral movement.(Citation: Mandiant No Easy Breach)| |mitre-attack|enterprise-attack|Windows|T1047|Windows Management Instrumentation|
APT29.md
70ab680d3c44-8
APT29 used Kerberos ticket attacks for lateral movement.(Citation: Mandiant No Easy Breach)| |mitre-attack|enterprise-attack|Windows|T1047|Windows Management Instrumentation| APT29 used WMI to steal credentials and execute backdoors at a future time.(Citation: Mandiant No Easy Breach)| |mitre-attack|enterprise-attack|Windows|T1548.002|Bypass User Account Control| APT29 has bypassed UAC.(Citation: Mandiant No Easy Breach)| |mitre-attack|enterprise-attack|Windows|T1546.003|Windows Management Instrumentation Event Subscription| APT29 has used WMI event subscriptions for persistence.(Citation: Mandiant No Easy Breach)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| APT29 added Registry Run keys to establish persistence.(Citation: Mandiant No Easy Breach)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| APT29 has used named and hijacked scheduled tasks to establish persistence.(Citation: Mandiant No Easy Breach)| |mitre-attack|enterprise-attack|Windows|T1546.008|Accessibility Features| APT29 used sticky-keys to obtain unauthenticated, privileged console access.(Citation: Mandiant No Easy Breach)(Citation: FireEye APT29 Domain Fronting)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke.(Citation: Symantec Seaduke 2015)(Citation: Mandiant No Easy Breach)(Citation: ESET T3 Threat Report 2021)(Citation: Secureworks IRON HEMLOCK Profile)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| APT29 has used SDelete to remove artifacts from victim networks.(Citation: Mandiant No Easy Breach)|
APT29.md
7782c4e87a52-0
APT3 - G0022 Created: 2017-05-31T21:31:55.853Z Modified: 2021-10-01T19:09:20.817Z Contributors: Patrick Sungbahadoor Aliases APT3,Gothic Panda,Pirpi,UPS Team,Buckeye,Threat Group-0110,TG-0110 Description APT3 is a China-based threat group that researchers have attributed to China's Ministry of State Security.(Citation: FireEye Clandestine Wolf)(Citation: Recorded Future APT3 May 2017) This group is responsible for the campaigns known as Operation Clandestine Fox, Operation Clandestine Wolf, and Operation Double Tap.(Citation: FireEye Clandestine Wolf)(Citation: FireEye Operation Double Tap) As of June 2015, the group appears to have shifted from targeting primarily US victims to primarily political organizations in Hong Kong.(Citation: Symantec Buckeye) In 2017, MITRE developed an APT3 Adversary Emulation Plan.(Citation: APT3 Adversary Emulation Plan) Techniques Used APT3 has sent spearphishing emails containing malicious links.(Citation: FireEye Clandestine Wolf)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link| APT3 has lured victims into clicking malicious links delivered through spearphishing.(Citation: FireEye Clandestine Wolf)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| APT3 has exploited the Adobe Flash Player vulnerability CVE-2015-3113 and Internet Explorer vulnerability CVE-2014-1776.(Citation: FireEye Clandestine Wolf)(Citation: FireEye Clandestine Fox)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1555.003|Credentials from Web Browsers| APT3 has used tools to dump passwords from browsers.(Citation: Symantec Buckeye)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1564.003|Hidden Window| APT3 has been known to use
APT3.md
7782c4e87a52-1
APT3 has been known to use PowerShell windows.(Citation: FireEye Operation Double Tap)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1090.002|External Proxy|An APT3 downloader establishes SOCKS5 connections for its initial C2.(Citation: FireEye Operation Double Tap)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,IaaS,Linux,macOS,Google Workspace,SaaS,Network|T1098|Account Manipulation| APT3 has been known to add created accounts to local admin groups to maintain elevated access.(Citation: aptsim)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,Azure AD,Network|T1110.002|Password Cracking| APT3 has been known to brute force password hashes to be able to leverage plain text credentials.(Citation: APT3 Adversary Emulation Plan)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.005|Indicator Removal from Tools| APT3 has been known to remove indicators of compromise from tools.(Citation: APT3 Adversary Emulation Plan)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1027.002|Software Packing| APT3 has been known to pack their tools.(Citation: APT3 Adversary Emulation Plan)(Citation: FireEye Clandestine Wolf) | |mitre-attack|enterprise-attack|Windows|T1218.011|Rundll32| APT3 has a tool that can run DLLs.(Citation: FireEye Clandestine Fox)| |mitre-attack|enterprise-attack|Windows|T1574.002|DLL Side-Loading| APT3 has been known to side load DLLs with a valid version of Chrome with one of their tools.(Citation: FireEye Clandestine Fox)(Citation: FireEye Clandestine Fox Part 2)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery|
APT3.md
7782c4e87a52-2
APT3 has a tool that can obtain information about the local system.(Citation: Symantec Buckeye)(Citation: evolution of pirpi)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers|T1552.001|Credentials In Files| APT3 has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome.(Citation: Symantec Buckeye)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1005|Data from Local System| APT3 will identify Microsoft Office documents on the victim's computer.(Citation: aptsim)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| APT3 has a tool that can delete files.(Citation: FireEye Clandestine Fox)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1041|Exfiltration Over C2 Channel| APT3 has a tool that exfiltrates data over the C2 channel.(Citation: FireEye Clandestine Fox)| |mitre-attack|enterprise-attack|Windows|T1543.003|Windows Service| APT3 has a tool that creates a new service for persistence.(Citation: FireEye Operation Double Tap)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1057|Process Discovery| APT3 has a tool that can list out currently running processes.(Citation: FireEye Clandestine Fox)(Citation: evolution of pirpi)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| APT3 places scripts in the startup folder for persistence.(Citation: FireEye Operation Double Tap)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1136.001|Local Account| APT3 has been known to create or enable accounts, such as APT3 replaces the Sticky Keys binary
APT3.md
7782c4e87a52-3
APT3 has been known to create or enable accounts, such as APT3 replaces the Sticky Keys binary APT3 has used tools to compress data before exfilling it.(Citation: aptsim)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT3 has a tool that can copy files to remote machines.(Citation: FireEye Clandestine Fox)| |mitre-attack|enterprise-attack|Windows|T1021.002|SMB/Windows Admin Shares| APT3 will copy files over to Windows Admin Shares (like ADMIN$) as part of lateral movement.(Citation: Symantec Buckeye)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| APT3 has a tool that looks for files and directories on the local file system.(Citation: FireEye Clandestine Fox)(Citation: evolution of pirpi)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1018|Remote System Discovery| APT3 has a tool that can detect the existence of remote systems.(Citation: Symantec Buckeye)(Citation: FireEye Clandestine Fox)| |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol| APT3 enables the Remote Desktop Protocol for persistence.(Citation: aptsim) APT3 has also interacted with compromised systems to browse and copy files through RDP sessions.(Citation: Twitter Cglyer Status Update APT3 eml)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers|T1069|Permission Groups Discovery| APT3 has a tool that can enumerate the permissions associated with Windows groups.(Citation: Symantec Buckeye)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information|
APT3.md
7782c4e87a52-4
APT3 obfuscates files or information to help evade defensive measures.(Citation: Symantec Buckeye)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery| APT3 has a tool that can enumerate current network connections.(Citation: Symantec Buckeye)(Citation: FireEye Clandestine Fox)(Citation: evolution of pirpi)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1078.002|Domain Accounts| APT3 leverages valid accounts after gaining credentials for use within the victim domain.(Citation: Symantec Buckeye)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1074.001|Local Data Staging| APT3 has been known to stage files for exfiltration in a single location.(Citation: aptsim)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging| APT3 has used a keylogging tool that records keystrokes in encrypted files.(Citation: Symantec Buckeye)| |mitre-attack|enterprise-attack|Windows|T1003.001|LSASS Memory| APT3 has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument "dig."(Citation: Symantec Buckeye)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1087.001|Local Account| APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.(Citation: Symantec Buckeye)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1016|System Network Configuration Discovery|A keylogging tool used by APT3 gathers network information from the victim, including the MAC address, IP address, WINS, DHCP server, and gateway.(Citation: Symantec Buckeye)(Citation: evolution of pirpi)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1104|Multi-Stage Channels|An
APT3.md
7782c4e87a52-5
APT3 downloader first establishes a SOCKS5 connection to 192.157.198[.]103 using TCP port 1913; once the server response is verified, it then requests a connection to 192.184.60[.]229 on TCP port 81.(Citation: FireEye Operation Double Tap)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task|An APT3 downloader creates persistence by creating the following scheduled task: APT3 downloader uses the Windows command APT3 downloader establishes SOCKS5 connections for its initial C2.(Citation: FireEye Operation Double Tap)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery|An APT3 downloader uses the Windows command APT3 has used PowerShell on victim systems to download and run payloads after exploitation.(Citation: FireEye Operation Double Tap)|
APT3.md
869b2ceae43e-0
APT30 - G0013 Created: 2017-05-31T21:31:51.026Z Modified: 2020-07-29T19:34:28.999Z Contributors: Aliases APT30 Description APT30 is a threat group suspected to be associated with the Chinese government. While Naikon shares some characteristics with APT30, the two groups do not appear to be exact matches.(Citation: FireEye APT30)(Citation: Baumgartner Golovkin Naikon 2015) Techniques Used |Matrix|Domain|Platform|Technique ID|Technique Name|Use| | :---| :---| :---| :---| :---| :---| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment|APT30 has used spearphishing emails with malicious DOC attachments.(Citation: FireEye APT30)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails.(Citation: FireEye APT30)|
APT30.md
27e1939db0f2-0
APT32 - G0050 Created: 2017-12-14T16:46:06.044Z Modified: 2023-03-21T21:04:18.158Z Contributors: Romain Dumont, ESET Aliases APT32,SeaLotus,OceanLotus,APT-C-00 Description APT32 is a suspected Vietnam-based threat group that has been active since at least 2014. The group has targeted multiple private sector industries as well as foreign governments, dissidents, and journalists with a strong focus on Southeast Asian countries like Vietnam, the Philippines, Laos, and Cambodia. They have extensively used strategic web compromises to compromise victims.(Citation: FireEye APT32 May 2017)(Citation: Volexity OceanLotus Nov 2017)(Citation: ESET OceanLotus) Techniques Used APT32's backdoor has stored its configuration in a registry key.(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.010|Command Obfuscation| APT32 has used the APT32 has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub.(Citation: FireEye APT32 May 2017)(Citation: Cybereason Oceanlotus May 2017)| |mitre-attack|enterprise-attack|PRE|T1608.001|Upload Malware| APT32 has hosted malicious payloads in Dropbox, Amazon S3, and Google Drive for use during targeting.(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|PRE|T1608.004|Drive-by Target| APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate, but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update.(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|PRE|T1589|Gather Victim Identity Information|
APT32.md
27e1939db0f2-1
APT32 has conducted targeted surveillance against activists and bloggers.(Citation: Amnesty Intl. Ocean Lotus February 2021)| |mitre-attack|enterprise-attack|PRE|T1589.002|Email Addresses| APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware.(Citation: Amnesty Intl. Ocean Lotus February 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102|Web Service| APT32 has used Dropbox, Amazon S3, and Google Drive to host malicious downloads.(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|PRE|T1598.003|Spearphishing Link| APT32 has used malicious links to direct users to web pages designed to harvest credentials.(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|PRE|T1583.006|Web Services| APT32 has set up Dropbox, Amazon S3, and Google Drive to host malicious downloads.(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|PRE|T1583.001|Domains| APT32 has set up and operated websites to gather information and deliver malware.(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|PRE|T1585.001|Social Media Accounts| APT32 has set up Facebook pages in tandem with fake websites.(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.007|JavaScript| APT32 has used JavaScript for drive-by downloads and C2 communications.(Citation: Cybereason Cobalt Kitty 2017)(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network,Office 365,Azure AD,IaaS,Google Workspace|T1059|Command and Scripting Interpreter|
APT32.md
27e1939db0f2-2
APT32 has used COM scriptlets to download Cobalt Strike beacons.(Citation: Cybereason Cobalt Kitty 2017) | |mitre-attack|enterprise-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging| APT32 has abused the PasswordChangeNotify to monitor for and capture account password changes.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036|Masquerading| APT32 has disguised a Cobalt Strike beacon as a Flash Installer.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link| APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails.(Citation: Cybereason Cobalt Kitty 2017)(Citation: Volexity Ocean Lotus November 2020)(Citation: Amnesty Intl. Ocean Lotus February 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1055|Process Injection| APT32 malware has injected a Cobalt Strike beacon into Rundll32.exe.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows|T1218.011|Rundll32| APT32 malware has used rundll32.exe to execute an initial infection process.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1135|Network Share Discovery| APT32 used the APT32 has deployed tools after moving laterally using administrative accounts.(Citation: Cybereason Cobalt Kitty 2017) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1571|Non-Standard Port|An APT32 backdoor can use HTTP over a non-standard TCP port (e.g 14146) which is specified in the backdoor configuration.(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Windows|T1543.003|Windows Service|
APT32.md
27e1939db0f2-3
APT32 modified Windows Services to ensure PowerShell scripts were loaded on the system. APT32 also creates a Windows service to establish persistence.(Citation: ESET OceanLotus)(Citation: Cybereason Cobalt Kitty 2017)(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1003|OS Credential Dumping| APT32 used GetPassword_x64 to harvest credentials.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows|T1552.002|Credentials in Registry| APT32 used Outlook Credential Dumper to harvest credentials stored in Windows registry.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1087.001|Local Account| APT32 enumerated administrative users using the commands APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection.(Citation: Twitter ItsReallyNick APT32 pubprn Masquerade)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1036.004|Masquerade Task or Service| APT32 has used hidden or non-printing characters to help masquerade service names, such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name "install_flashplayer.exe".(Citation: FireEye APT32 May 2017)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic| APT32 has used macros, COM scriptlets, and VBS scripts.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.003|Mail Protocols|
APT32.md
27e1939db0f2-4
APT32 has used email for C2 via an Office macro.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1048.003|Exfiltration Over Unencrypted Non-C2 Protocol| APT32's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets.(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1564.003|Hidden Window| APT32 has used the WindowStyle parameter to conceal PowerShell windows. (Citation: FireEye APT32 May 2017) (Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| APT32 has used cmd.exe for execution.(Citation: Cybereason Cobalt Kitty 2017) | |mitre-attack|enterprise-attack|macOS,Linux|T1222.002|Linux and Mac File and Directory Permissions Modification| APT32's macOS backdoor changes the permission of the file it wants to execute to 755.(Citation: ESET OceanLotus macOS April 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| APT32's macOS backdoor can receive a “delete” command.(Citation: ESET OceanLotus macOS April 2019)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1564.001|Hidden Files and Directories| APT32's macOS backdoor hides the clientID file via a chflags function.(Citation: ESET OceanLotus macOS April 2019)| |mitre-attack|enterprise-attack|Windows|T1569.002|Service Execution| APT32's backdoor has used Windows services as a way to execute its malicious payload. (Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Windows|T1112|Modify Registry|
APT32.md
27e1939db0f2-5
APT32's backdoor has modified the Windows Registry to store the backdoor's configuration. (Citation: ESET OceanLotus Mar 2019) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560|Archive Collected Data| APT32's backdoor has used LZMA compression and RC4 encryption before exfiltration.(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Windows|T1012|Query Registry| APT32's backdoor can query the Windows Registry to gather system information. (Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| APT32's backdoor possesses the capability to list files and directories on a machine. (Citation: ESET OceanLotus Mar 2019) APT32's backdoor has exfiltrated data using the already opened channel with its C&C server.(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| APT32 has used RTF document that includes an exploit to execute malicious code. (CVE-2017-11882)(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Windows,Office 365|T1137|Office Application Startup| APT32 have replaced Microsoft Outlook's VbaProject.OTM file to install a backdoor macro for persistence.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows|T1003.001|LSASS Memory| APT32 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder|
APT32.md
27e1939db0f2-6
APT32 established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| APT32 has sent spearphishing emails containing malicious links.(Citation: ESET OceanLotus)(Citation: Cybereason Oceanlotus May 2017)(Citation: FireEye APT32 April 2020)(Citation: Volexity Ocean Lotus November 2020)(Citation: Amnesty Intl. Ocean Lotus February 2021)| |mitre-attack|enterprise-attack|Windows|T1218.005|Mshta| APT32 has used mshta.exe for code execution.(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1016|System Network Configuration Discovery| APT32 used the APT32 used the APT32 has enumerated DC servers using the command APT32 used NTFS alternate data streams to hide their payloads.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows|T1047|Windows Management Instrumentation| APT32 used WMI to deploy their tools on remote machines and to gather information about the Outlook process.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows|T1550.002|Pass the Hash| APT32 has used pass the hash for lateral movement.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers,Network|T1046|Network Service Discovery|
APT32.md
27e1939db0f2-7
APT32 performed network scanning on the network to search for open ports, services, OS finger-printing, and other vulnerabilities.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows|T1550.003|Pass the Ticket| APT32 successfully gained remote access by using pass the ticket.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows|T1021.002|SMB/Windows Admin Shares| APT32 used Net to use Windows' hidden network shares to copy their tools to remote machines for execution.(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery| APT32 has collected the OS version and computer name from victims. One of the group's backdoors can also query the Windows Registry to gather system information, and another macOS backdoor performs a fingerprint of the machine on its first connection to the C&C server. APT32 executed shellcode to identify the name of the infected host.(Citation: ESET OceanLotus)(Citation: ESET OceanLotus Mar 2019)(Citation: ESET OceanLotus macOS April 2019)(Citation: FireEye APT32 April 2020)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet.(Citation: ESET OceanLotus)(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)(Citation: ESET OceanLotus Mar 2019)(Citation: FireEye APT32 April 2020)(Citation: Amnesty Intl. Ocean Lotus February 2021)| |mitre-attack|enterprise-attack|Windows|T1070.001|Clear Windows Event Logs| APT32 has cleared select event log entries.(Citation: FireEye APT32 May 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|
APT32.md
27e1939db0f2-8
APT32 has cleared select event log entries.(Citation: FireEye APT32 May 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment.(Citation: ESET OceanLotus)(Citation: Cybereason Oceanlotus May 2017)(Citation: ESET OceanLotus Mar 2019)(Citation: FireEye APT32 April 2020)(Citation: Amnesty Intl. Ocean Lotus February 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery| APT32 collected the victim's username and executed the APT32 executed shellcode to collect the username on the victim's machine. (Citation: FireEye APT32 April 2020)(Citation: ESET OceanLotus)(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.001|Binary Padding| APT32 includes garbage code to mislead anti-malware software and researchers.(Citation: ESET OceanLotus)(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Windows|T1574.002|DLL Side-Loading| APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder).(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| APT32 has infected victims by tricking them into visiting compromised watering hole websites.(Citation: ESET OceanLotus)(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|Windows|T1216.001|PubPrn|
APT32.md
27e1939db0f2-9
APT32 has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses.(Citation: Twitter ItsReallyNick Status Update APT32 PubPrn)| |mitre-attack|enterprise-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell| APT32 has used Web shells to maintain access to victim websites.(Citation: Volexity OceanLotus Nov 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT32 has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors.(Citation: Volexity OceanLotus Nov 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| APT32 has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP.(Citation: Volexity OceanLotus Nov 2017)(Citation: Cybereason Cobalt Kitty 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| APT32 has performed code obfuscation, including encoding payloads using Base64 and using a framework called "Dont-Kill-My-Cat (DKMC). APT32 also encrypts the library used for network exfiltration with AES-256 in CBC mode in their macOS backdoor.(Citation: FireEye APT32 May 2017)(Citation: GitHub Invoke-Obfuscation)(Citation: ESET OceanLotus)(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)(Citation: ESET OceanLotus Mar 2019)(Citation: ESET OceanLotus macOS April 2019)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task|
APT32.md
27e1939db0f2-10
APT32 has used scheduled tasks to persist on victim systems.(Citation: FireEye APT32 May 2017)(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)(Citation: ESET OceanLotus Mar 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1072|Software Deployment Tools| APT32 compromised McAfee ePO to move laterally by distributing malware as a software deployment task.(Citation: FireEye APT32 May 2017)| |mitre-attack|enterprise-attack|Windows|T1218.010|Regsvr32| APT32 created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor.(Citation: ESET OceanLotus Mar 2019)(Citation: FireEye APT32 May 2017)(Citation: Cybereason Cobalt Kitty 2017) | |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| APT32 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. APT32 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe. (Citation: Cybereason Cobalt Kitty 2017)(Citation: Volexity Ocean Lotus November 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1068|Exploitation for Privilege Escalation| APT32 has used CVE-2016-7255 to escalate privileges.(Citation: FireEye APT32 May 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.006|Timestomp| APT32 has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally,
APT32.md
27e1939db0f2-11
APT32 has used a random value to modify the timestamp of the file storing the clientID.(Citation: FireEye APT32 May 2017)(Citation: ESET OceanLotus Mar 2019)(Citation: ESET OceanLotus macOS April 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1078.003|Local Accounts| APT32 has used legitimate local admin account credentials.(Citation: FireEye APT32 May 2017)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| APT32 has used PowerShell-based tools, PowerShell one-liners, and shellcode loaders for execution.(Citation: FireEye APT32 May 2017)(Citation: Cybereason Oceanlotus May 2017)(Citation: Cybereason Cobalt Kitty 2017)|
APT32.md
fb6fac0f663f-0
APT33 - G0064 Created: 2018-04-18T17:59:24.739Z Modified: 2023-03-08T22:07:25.123Z Contributors: Dragos Threat Intelligence Aliases APT33,HOLMIUM,Elfin Description APT33 is a suspected Iranian threat group that has carried out operations since at least 2013. The group has targeted organizations across multiple industries in the United States, Saudi Arabia, and South Korea, with a particular interest in the aviation and energy sectors. (Citation: FireEye APT33 Sept 2017) (Citation: FireEye APT33 Webinar Sept 2017) Techniques Used APT33 has obtained and leveraged publicly-available tools for early intrusion activities.(Citation: FireEye APT33 Guardrail)(Citation: Symantec Elfin Mar 2019)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1546.003|Windows Management Instrumentation Event Subscription| APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts.(Citation: Microsoft Holmium June 2020)| |mitre-attack|enterprise-attack,ics-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT33 has sent spearphishing e-mails with archive attachments.(Citation: Microsoft Holmium June 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1204.002|Malicious File| APT33 has used malicious e-mail attachments to lure victims into executing malware.(Citation: Microsoft Holmium June 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows,macOS,Linux|T1059.005|Visual Basic| APT33 has used VBScript to initiate the delivery of payloads.(Citation: Microsoft Holmium June 2020)| |mitre-attack|enterprise-attack,ics-attack|Azure AD,Office 365,SaaS,IaaS,Google Workspace|T1078.004|Cloud Accounts| APT33 has used compromised Office 365 accounts in tandem with
APT33.md
fb6fac0f663f-1
APT33 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints.(Citation: Microsoft Holmium June 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1571|Non-Standard Port| APT33 has used HTTP over TCP ports 808 and 880 for command and control.(Citation: Symantec Elfin Mar 2019)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1552.006|Group Policy Preferences| APT33 has used a variety of publicly available tools like Gpppassword to gather credentials.(Citation: Symantec Elfin Mar 2019)(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1555|Credentials from Password Stores| APT33 has used a variety of publicly available tools like LaZagne to gather credentials.(Citation: Symantec Elfin Mar 2019)(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1555.003|Credentials from Web Browsers| APT33 has used a variety of publicly available tools like LaZagne to gather credentials.(Citation: Symantec Elfin Mar 2019)(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1003.005|Cached Domain Credentials| APT33 has used a variety of publicly available tools like LaZagne to gather credentials.(Citation: Symantec Elfin Mar 2019)(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1003.004|LSA Secrets| APT33 has used a variety of publicly available tools like LaZagne to gather credentials.(Citation: Symantec Elfin Mar 2019)(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Windows,IaaS,Linux,macOS,Containers|T1552.001|Credentials In Files|
APT33.md
fb6fac0f663f-2
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.(Citation: Symantec Elfin Mar 2019)(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers|T1110.003|Password Spraying| APT33 has used password spraying to gain access to target systems.(Citation: FireEye APT33 Guardrail)(Citation: Microsoft Holmium June 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Containers|T1068|Exploitation for Privilege Escalation| APT33 has used a publicly available exploit for CVE-2017-0213 to escalate privileges on a local system.(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS|T1573.001|Symmetric Cryptography| APT33 has used AES for encryption of command and control traffic.(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| APT33 has used base64 to encode payloads.(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1132.001|Standard Encoding| APT33 has used base64 to encode command and control traffic.(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1053.005|Scheduled Task| APT33 has created a scheduled task to execute a .vbe file multiple times a day.(Citation: Symantec Elfin Mar 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1048.003|Exfiltration Over Unencrypted Non-C2 Protocol|
APT33.md
fb6fac0f663f-3
APT33 has used FTP to exfiltrate files (separately from the C2 channel).(Citation: Symantec Elfin Mar 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1071.001|Web Protocols| APT33 has used HTTP for command and control.(Citation: Symantec Elfin Mar 2019)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| APT33 has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence.(Citation: Symantec Elfin Mar 2019)(Citation: Microsoft Holmium June 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1059.001|PowerShell| APT33 has utilized PowerShell to download files from the C2 server and run various scripts. (Citation: Symantec Elfin Mar 2019)(Citation: Microsoft Holmium June 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT33 has downloaded additional files and programs from its C2 server.(Citation: Symantec Elfin Mar 2019)(Citation: Microsoft Holmium June 2020) APT33 has used WinRAR to compress data prior to exfil.(Citation: Symantec Elfin Mar 2019) | |mitre-attack|enterprise-attack,ics-attack|Windows|T1003.001|LSASS Memory| APT33 has used a variety of publicly available tools like LaZagne, Mimikatz, and ProcDump to dump credentials.(Citation: Symantec Elfin Mar 2019)(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network,IaaS|T1040|Network Sniffing|
APT33.md
fb6fac0f663f-4
APT33 has used SniffPass to collect credentials by sniffing network traffic.(Citation: Symantec Elfin Mar 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| APT33 has attempted to exploit a known vulnerability in WinRAR (CVE-2018-20250), and attempted to gain remote code execution via a security bypass vulnerability (CVE-2017-11774).(Citation: Symantec Elfin Mar 2019)(Citation: Microsoft Holmium June 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1204.001|Malicious Link| APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.(Citation: FireEye APT33 Sept 2017)(Citation: Symantec Elfin Mar 2019)| |mitre-attack|enterprise-attack,ics-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| APT33 has used valid accounts for initial access and privilege escalation.(Citation: FireEye APT33 Webinar Sept 2017)(Citation: FireEye APT33 Guardrail)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| APT33 has sent spearphishing emails containing links to .hta files.(Citation: FireEye APT33 Sept 2017)(Citation: Symantec Elfin Mar 2019)| |mitre-attack|enterprise-attack,ics-attack|Engineering Workstation|T0853|Scripting| APT33 utilized PowerShell scripts to establish command and control and install files for execution. (Citation: Symantec March 2019) (Citation: Dragos)| |mitre-attack|enterprise-attack,ics-attack|Human-Machine Interface|T0852|Screen Capture|
APT33.md
fb6fac0f663f-5
APT33 utilize backdoors capable of capturing screenshots once installed on a system. (Citation: Jacqueline O'Leary et al. September 2017)(Citation: Junnosuke Yagi March 2017)| |mitre-attack|enterprise-attack,ics-attack|Engineering Workstation,Human-Machine Interface,Control Server,Data Historian|T0865|Spearphishing Attachment| APT33 sent spear phishing emails containing links to HTML application files, which were embedded with malicious code. (Citation: Jacqueline O'Leary et al. September 2017) APT33 has conducted targeted spear phishing campaigns against U.S. government agencies and private sector companies. (Citation: Andy Greenburg June 2019)|
APT33.md
dbe259a980bf-0
APT37 - G0067 Created: 2018-04-18T17:59:24.739Z Modified: 2021-10-15T16:54:01.193Z Contributors: Valerii Marchuk, Cybersecurity Help s.r.o. Aliases APT37,Richochet Chollima,InkySquid,ScarCruft,Reaper,Group123,TEMP.Reaper Description APT37 is a North Korean state-sponsored cyber espionage group that has been active since at least 2012. The group has targeted victims primarily in South Korea, but also in Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and other parts of the Middle East. APT37 has also been linked to the following campaigns between 2016-2018: Operation Daybreak, Operation Erebus, Golden Time, Evil New Year, Are you Happy?, FreeMilk, North Korean Human Rights, and Evil New Year 2018.(Citation: FireEye APT37 Feb 2018)(Citation: Securelist ScarCruft Jun 2016)(Citation: Talos Group123) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups. Techniques Used APT37 has used Ruby scripts to execute payloads.(Citation: Volexity InkySquid RokRAT August 2021)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1059.006|Python| APT37 has used Python scripts to execute payloads.(Citation: Volexity InkySquid RokRAT August 2021)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| APT37 has created scheduled tasks to run malicious scripts on a compromised host.(Citation: Volexity InkySquid RokRAT August 2021)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic|
APT37.md
dbe259a980bf-1
APT37 executes shellcode and a VBA script to decode Base64 strings.(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.003|Steganography| APT37 uses steganography to send images to users that are embedded with shellcode.(Citation: Talos Group123)(Citation: Securelist ScarCruft May 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1529|System Shutdown/Reboot| APT37 has used malware that will issue the command APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges.(Citation: Securelist ScarCruft May 2019)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1120|Peripheral Device Discovery| APT37 has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices. (Citation: Securelist ScarCruft May 2019)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1106|Native API| APT37 leverages the Windows API calls: VirtualAlloc(), WriteProcessMemory(), and CreateRemoteThread() for process injection.(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1055|Process Injection| APT37 injects its malware variant, ROKRAT, into the cmd.exe process.(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery| APT37 identifies the victim username.(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| APT37 uses HTTPS to conceal C2 communications.(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery|
APT37.md
dbe259a980bf-2
APT37 uses HTTPS to conceal C2 communications.(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery| APT37 collects the computer name, the BIOS model, and execution path.(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1057|Process Discovery| APT37's Freenki malware lists running processes using the Microsoft Windows API.(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| APT37 obfuscates strings and payloads.(Citation: Talos Group123)(Citation: Securelist ScarCruft May 2019)(Citation: Volexity InkySquid RokRAT August 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102.002|Bidirectional Communication| APT37 leverages social networking sites and cloud platforms (AOL, Twitter, Yandex, Mediafire, pCloud, Dropbox, and Box) for C2.(Citation: FireEye APT37 Feb 2018)(Citation: Talos Group123)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT37 delivers malware using spearphishing emails with malicious HWP attachments.(Citation: FireEye APT37 Feb 2018)(Citation: Talos Group123)(Citation: Securelist ScarCruft May 2019)| |mitre-attack|enterprise-attack|Windows|T1559.002|Dynamic Data Exchange| APT37 has used Windows DDE for execution of commands and a malicious VBS.(Citation: Securelist ScarCruft Jun 2016)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell|
APT37.md
dbe259a980bf-3
APT37 has used the command-line interface.(Citation: FireEye APT37 Feb 2018)(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| APT37 has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020-1380 and CVE-2020-26411), and Microsoft Edge (CVE-2021-26411) for execution.(Citation: Securelist ScarCruft Jun 2016)(Citation: FireEye APT37 Feb 2018)(Citation: Talos Group123)(Citation: Volexity InkySquid BLUELIGHT August 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1555.003|Credentials from Web Browsers| APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.(Citation: FireEye APT37 Feb 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| APT37 has sent spearphishing attachments attempting to get a user to open them.(Citation: FireEye APT37 Feb 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1561.002|Disk Structure Wipe| APT37 has access to destructive malware that is capable of overwriting a machine's Master Boot Record (MBR).(Citation: FireEye APT37 Feb 2018)(Citation: Talos Group123)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise|
APT37.md
dbe259a980bf-4
APT37 has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly.(Citation: Securelist ScarCruft Jun 2016)(Citation: FireEye APT37 Feb 2018)(Citation: Volexity InkySquid BLUELIGHT August 2021)| |mitre-attack|enterprise-attack|macOS,Windows|T1036.001|Invalid Code Signature| APT37 has signed its malware with an invalid digital certificates listed as “Tencent Technology (Shenzhen) Company Limited.”(Citation: Securelist ScarCruft Jun 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1005|Data from Local System| APT37 has collected data from victims' local systems.(Citation: FireEye APT37 Feb 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1123|Audio Capture| APT37 has used an audio capturing utility known as SOUNDWAVE that captures microphone input.(Citation: FireEye APT37 Feb 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT37 has downloaded second stage malware from compromised websites.(Citation: FireEye APT37 Feb 2018)(Citation: Securelist ScarCruft May 2019)(Citation: Volexity InkySquid BLUELIGHT August 2021)(Citation: Volexity InkySquid RokRAT August 2021)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| APT37's has added persistence via the Registry key
APT37.md
63837688fa2b-0
APT38 - G0082 Created: 2019-01-29T21:27:24.793Z Modified: 2022-01-18T17:13:14.610Z Contributors: Aliases APT38,NICKEL GLADSTONE,BeagleBoyz,Bluenoroff,Stardust Chollima Description APT38 is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.(Citation: CISA AA20-239A BeagleBoyz August 2020) Active since at least 2014, APT38 has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which APT38 stole $81 million, as well as attacks against Bancomext (2018) and Banco de Chile (2018); some of their attacks have been destructive.(Citation: CISA AA20-239A BeagleBoyz August 2020)(Citation: FireEye APT38 Oct 2018)(Citation: DOJ North Korea Indictment Feb 2021)(Citation: Kaspersky Lazarus Under The Hood Blog 2017) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups. Techniques Used APT38 has used CHM files to move concealed payloads.(Citation: Kaspersky Lazarus Under The Hood APR 2017)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1588.002|Tool| APT38 has obtained and used open-source tools such as Mimikatz.(Citation: ESET Lazarus KillDisk April 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1070.006|Timestomp|
APT38.md
63837688fa2b-1
APT38 has modified data timestamps to mimic files that are in the same folder on a compromised host.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|macOS,Windows,Linux|T1135|Network Share Discovery| APT38 has enumerated network shares on a compromised host.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1110|Brute Force| APT38 has used brute force techniques to attempt account access when passwords are unknown or when password hashes are unavailable.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery| APT38 has identified primary users, currently logged in users, sets of users that commonly use a system, or inactive users.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1543.003|Windows Service| APT38 has installed a new Windows service to establish persistence.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery| APT38 has attempted to get detailed information about a compromised host, including the operating system, version, patches, hotfixes, and service packs.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace|T1518.001|Security Software Discovery|
APT38.md
63837688fa2b-2
APT38 has identified security software, configurations, defensive tools, and sensors installed on a compromised system.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1562.003|Impair Command History Logging| APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell| APT38 has used web shells for persistence or to ensure redundant access.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| APT38 have enumerated files and directories, or searched in specific locations within a compromised host.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS|T1217|Browser Information Discovery| APT38 has collected browser bookmark information to learn more about compromised hosts, obtain personal information about users, and acquire details about internal network resources.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1562.004|Disable or Modify System Firewall| APT38 have created firewall exemptions on specific ports, including ports 443, 6443, 8443, and 9443.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1005|Data from Local System|
APT38.md
63837688fa2b-3
APT38 has collected data from a compromised host.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1569.002|Service Execution| APT38 has created new services or modified existing ones to run executables, commands, or scripts.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows,macOS,Linux|T1106|Native API| APT38 has used the Windows API to execute code within a victim's system.(Citation: CISA AA20-239A BeagleBoyz August 2020) | |mitre-attack|enterprise-attack,ics-attack|Windows,macOS,Linux|T1059.005|Visual Basic| APT38 has used VBScript to execute commands and other operational tasks.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1053.005|Scheduled Task| APT38 has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1059.001|PowerShell| APT38 has used PowerShell to execute commands and other operational tasks.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1218.011|Rundll32| APT38 has used rundll32.exe to execute binaries, scripts, and Control Panel Item files and to execute code via proxy to avoid triggering security tools.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1204.002|Malicious File|
APT38.md
63837688fa2b-4
APT38 has attempted to lure victims into enabling malicious macros within email attachments.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS|T1053.003|Cron| APT38 has used cron to create pre-scheduled and periodic background jobs on a Linux system.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT38 has conducted spearphishing campaigns using malicious email attachments.(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1529|System Shutdown/Reboot| APT38 has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery| APT38 installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Windows,IaaS,Linux,macOS|T1485|Data Destruction| APT38 has used a custom secure delete function to make deleted files unrecoverable.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,IaaS|T1486|Data Encrypted for Impact| APT38 has used Hermes ransomware to encrypt files with AES256.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1561.002|Disk Structure Wipe|
APT38.md
63837688fa2b-5
APT38 has used a custom MBR wiper named BOOTWRECK to render systems inoperable.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1565.001|Stored Data Manipulation| APT38 has used DYEPACK to create, delete, and alter records in databases used for SWIFT transactions.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1565.002|Transmitted Data Manipulation| APT38 has used DYEPACK to manipulate SWIFT messages en route to a printer.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1565.003|Runtime Data Manipulation| APT38 has used DYEPACK.FOX to manipulate PDF data as it is accessed to remove traces of fraudulent SWIFT transactions from the data displayed to the end user.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| APT38 has conducted watering holes schemes to gain initial access to victims.(Citation: FireEye APT38 Oct 2018)(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT38 used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging| APT38 used a Trojan called KEYLIME to capture keystrokes from the victim’s machine.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1059.003|Windows Command Shell|
APT38.md
63837688fa2b-6
APT38 has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS|T1115|Clipboard Data| APT38 used a Trojan called KEYLIME to collect data from the clipboard.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1112|Modify Registry| APT38 uses a tool called CLEANTOAD that has the capability to modify Registry keys.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1071.001|Web Protocols| APT38 used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1070.001|Clear Windows Event Logs| APT38 clears Window Event logs and Sysmon logs from the system.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1070.004|File Deletion| APT38 has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process.(Citation: FireEye APT38 Oct 2018)(Citation: CISA AA20-239A BeagleBoyz August 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1057|Process Discovery| APT38 leveraged Sysmon to understand the processes, services in the organization.(Citation: FireEye APT38 Oct 2018)| |mitre-attack|enterprise-attack,ics-attack|macOS,Windows,Linux|T1027.002|Software Packing|
APT38.md
63837688fa2b-7
APT38 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants.(Citation: FireEye APT38 Oct 2018)|
APT38.md
58b296926e7e-0
APT39 - G0087 Created: 2019-02-19T16:01:38.585Z Modified: 2022-09-02T18:03:29.024Z Contributors: Aliases APT39,ITG07,Chafer,Remix Kitten Description APT39 is one of several names for cyber espionage activity conducted by the Iranian Ministry of Intelligence and Security (MOIS) through the front company Rana Intelligence Computing since at least 2014. APT39 has primarily targeted the travel, hospitality, academic, and telecommunications industries in Iran and across Asia, Africa, Europe, and North America to track individuals and entities considered to be a threat by the MOIS.(Citation: FireEye APT39 Jan 2019)(Citation: Symantec Chafer Dec 2015)(Citation: FBI FLASH APT39 September 2020)(Citation: Dept. of Treasury Iran Sanctions September 2020)(Citation: DOJ Iran Indictments September 2020) Techniques Used APT39 has modified and used customized versions of publicly-available tools like PLINK and Mimikatz.(Citation: BitDefender Chafer May 2020)(Citation: IBM ITG07 June 2019)| |mitre-attack|enterprise-attack|Windows|T1546.010|AppInit DLLs| APT39 has used malware to set APT39 has used malware to decrypt encrypted CAB files.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Windows,macOS|T1553.006|Code Signing Policy Modification| APT39 has used malware to turn off the APT39 has used malware to delete files after they are deployed on a compromised host.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| APT39 has used malware to drop encrypted CAB files.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1041|Exfiltration Over C2 Channel|
APT39.md
58b296926e7e-1
APT39 has exfiltrated stolen victim data through C2 communications.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1074.001|Local Data Staging| APT39 has utilized tools to aggregate data prior to exfiltration.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Windows|T1197|BITS Jobs| APT39 has used the BITS protocol to exfiltrate stolen data from a compromised host.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| APT39 has used tools with the ability to search for files on a compromised host.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Windows|T1012|Query Registry| APT39 has used various strains of malware to query the Registry.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1056|Input Capture| APT39 has utilized tools to capture mouse movements.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic| APT39 has utilized malicious VBS scripts in malware.(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications, closely mimicking a legitimate McAfee file mfevtps.exe.(Citation: BitDefender Chafer May 2020)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application|
APT39.md
58b296926e7e-2
APT39 has used SQL injection for initial compromise.(Citation: Symantec Chafer February 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1113|Screen Capture| APT39 has used a screen capture utility to take screenshots on a compromised host.(Citation: Symantec Chafer February 2018)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging| APT39 has used tools for capturing keystrokes.(Citation: Symantec Chafer February 2018)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1005|Data from Local System| APT39 has used various tools to steal files from the compromised host.(Citation: Symantec Chafer February 2018)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1115|Clipboard Data| APT39 has used tools capable of stealing contents of the clipboard.(Citation: Symantec Chafer February 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT39 has downloaded tools to compromised hosts.(Citation: Symantec Chafer February 2018)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Windows|T1021.002|SMB/Windows Admin Shares| APT39 has used SMB for lateral movement.(Citation: Symantec Chafer February 2018)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1003|OS Credential Dumping| APT39 has used different versions of Mimikatz to obtain credentials.(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols|
APT39.md
58b296926e7e-3
APT39 has used HTTP in communications with C2.(Citation: BitDefender Chafer May 2020)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1059.006|Python| APT39 has used a command line utility and a network scanner written in python.(Citation: BitDefender Chafer May 2020)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.004|DNS| APT39 has used remote access tools that leverage DNS in communications with C2.(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102.002|Bidirectional Communication| APT39 has communicated with C2 through files uploaded to and downloaded from DropBox.(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| APT39 has used PowerShell to execute malicious code.(Citation: BitDefender Chafer May 2020)(Citation: Symantec Chafer February 2018)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1135|Network Share Discovery| APT39 has used the post exploitation tool CrackMapExec to enumerate network shares.(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Windows|T1569.002|Service Execution| APT39 has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes.(Citation: BitDefender Chafer May 2020)(Citation: Symantec Chafer February 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1136.001|Local Account| APT39 has created accounts on multiple compromised hosts to perform actions within the network.(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1090.002|External Proxy|
APT39.md
58b296926e7e-4
APT39 has used various tools to proxy C2 communications.(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1555|Credentials from Password Stores| APT39 has used the Smartftp Password Decryptor tool to decrypt FTP passwords.(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1110|Brute Force| APT39 has used Ncrack to reveal credentials.(Citation: FireEye APT39 Jan 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link| APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link.(Citation: FireEye APT39 Jan 2019)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery| APT39 used Remexi to collect usernames from the system.(Citation: Symantec Chafer Dec 2015)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1027.002|Software Packing| APT39 has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection.(Citation: FireEye APT39 Jan 2019)(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment.(Citation: FireEye APT39 Jan 2019)(Citation: BitDefender Chafer May 2020)(Citation: Symantec Chafer February 2018)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell|
APT39.md
58b296926e7e-5
APT39 has installed ANTAK and ASPXSPY web shells.(Citation: FireEye APT39 Jan 2019)| |mitre-attack|enterprise-attack|Linux,macOS|T1021.004|SSH| APT39 used secure shell (SSH) to move laterally among their targets.(Citation: FireEye APT39 Jan 2019)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| APT39 has used stolen credentials to compromise Outlook Web Access (OWA).(Citation: FireEye APT39 Jan 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network,Office 365,Azure AD,IaaS,Google Workspace|T1059|Command and Scripting Interpreter| APT39 has utilized AutoIt and custom scripts to perform internal reconnaissance.(Citation: FireEye APT39 Jan 2019)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers,Network|T1046|Network Service Discovery| APT39 has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning.(Citation: FireEye APT39 Jan 2019)(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Windows|T1003.001|LSASS Memory| APT39 has used Mimikatz, Windows Credential Editor and ProcDump to dump credentials.(Citation: FireEye APT39 Jan 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1090.001|Internal Proxy| APT39 used custom tools to create SOCK5 and custom protocol proxies between infected hosts.(Citation: FireEye APT39 Jan 2019)(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560.001|Archive via Utility|
APT39.md
58b296926e7e-6
APT39 has used WinRAR and 7-Zip to compress an archive stolen data.(Citation: FireEye APT39 Jan 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1018|Remote System Discovery| APT39 has used NBTscan and custom tools to discover remote systems.(Citation: FireEye APT39 Jan 2019)(Citation: BitDefender Chafer May 2020)(Citation: Symantec Chafer February 2018)| |mitre-attack|enterprise-attack|Windows|T1547.009|Shortcut Modification| APT39 has modified LNK shortcuts.(Citation: FireEye APT39 Jan 2019)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| APT39 has created scheduled tasks for persistence.(Citation: FireEye APT39 Jan 2019)(Citation: BitDefender Chafer May 2020)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol| APT39 has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.(Citation: FireEye APT39 Jan 2019)(Citation: BitDefender Chafer May 2020)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| APT39 has maintained persistence using the startup folder.(Citation: FireEye APT39 Jan 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| APT39 leveraged spearphishing emails with malicious links to initially compromise victims.(Citation: FireEye APT39 Jan 2019)(Citation: FBI FLASH APT39 September 2020)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment|
APT39.md
58b296926e7e-7
APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.(Citation: FireEye APT39 Jan 2019)(Citation: Symantec Chafer February 2018)(Citation: FBI FLASH APT39 September 2020)|
APT39.md
c14154e5c888-0
APT41 - G0096 Created: 2019-09-23T13:43:36.945Z Modified: 2023-03-23T15:45:58.846Z Contributors: Kyaw Pyiyt Htet, @KyawPyiytHtet Aliases APT41,Wicked Panda Description APT41 is a threat group that researchers have assessed as Chinese state-sponsored espionage group that also conducts financially-motivated operations. Active since at least 2012, APT41 has been observed targeting healthcare, telecom, technology, and video game industries in 14 countries. APT41 overlaps at least partially with public reporting on groups including BARIUM and Winnti Group.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021) Techniques Used APT41 has added user accounts to the User and Admin groups.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|PRE|T1588.002|Tool| APT41 has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1005|Data from Local System| APT41 has uploaded files and data from a compromised host.(Citation: Group IB APT 41 June 2021)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1036.004|Masquerade Task or Service| APT41 has created services to appear as benign system tools.(Citation: Group IB APT 41 June 2021)| |mitre-attack|enterprise-attack|Windows|T1218.011|Rundll32| APT41 has used rundll32.exe to execute a loader.(Citation: Crowdstrike GTR2020 Mar 2020)| |mitre-attack|enterprise-attack|Windows|T1574.001|DLL Search Order Hijacking|
APT41.md
c14154e5c888-1
APT41 has used search order hijacking to execute malicious payloads, such as Winnti RAT.(Citation: Crowdstrike GTR2020 Mar 2020)| |mitre-attack|enterprise-attack|Windows|T1021.002|SMB/Windows Admin Shares| APT41 has transferred implant files using Windows Admin Shares.(Citation: Crowdstrike GTR2020 Mar 2020)| |mitre-attack|enterprise-attack|Linux,macOS|T1574.006|Dynamic Linker Hijacking| APT41 has configured payloads to load via LD_PRELOAD.(Citation: Crowdstrike GTR2020 Mar 2020) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1480.001|Environmental Keying| APT41 has encrypted payloads using the Data Protection API (DPAPI), which relies on keys tied to specific user accounts on specific machines. APT41 has also environmentally keyed second stage malware with an RC5 key derived in part from the infected system's volume serial number.(Citation: Twitter ItsReallyNick APT41 EK)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| APT41 used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits.(Citation: FireEye APT41 March 2020) | |mitre-attack|enterprise-attack|Windows|T1569.002|Service Execution| APT41 used svchost.exe and Net to execute a system service installed to launch a Cobalt Strike BEACON loader.(Citation: FireEye APT41 March 2020)(Citation: Group IB APT 41 June 2021)| |mitre-attack|enterprise-attack|macOS,Linux|T1059.004|Unix Shell| APT41 executed APT41 has executed APT41 used exploit payloads that initiate download via ftp.(Citation: FireEye APT41 March 2020)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application|
APT41.md
c14154e5c888-2
ftp.(Citation: FireEye APT41 March 2020)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application| APT41 exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gateway devices.(Citation: FireEye APT41 March 2020)| |mitre-attack|enterprise-attack|Windows|T1197|BITS Jobs| APT41 used BITSAdmin to download and install payloads.(Citation: FireEye APT41 March 2020)(Citation: Crowdstrike GTR2020 Mar 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1104|Multi-Stage Channels| APT41 used the storescyncsvc.dll BEACON backdoor to download a secondary backdoor.(Citation: FireEye APT41 March 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| APT41 used certutil to download additional files.(Citation: FireEye APT41 March 2020)(Citation: Crowdstrike GTR2020 Mar 2020)(Citation: Group IB APT 41 June 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| APT41 used VMProtected binaries in multiple intrusions.(Citation: FireEye APT41 March 2020)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1135|Network Share Discovery| APT41 used the APT41 has enumerated IP addresses of network resources and used the APT41 leveraged the follow exploits in their operations: CVE-2012-0158, CVE-2015-1641, CVE-2017-0199, CVE-2017-11882, and CVE-2019-3396.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|Windows|T1574.002|DLL Side-Loading|
APT41.md
c14154e5c888-3
APT41 used legitimate executables to perform DLL side-loading of their malware.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| APT41 deleted files from the system.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|Windows|T1218.001|Compiled HTML File| APT41 used compiled HTML (.chm) files for targeting.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1008|Fallback Channels| APT41 used the Steam community page as a fallback mechanism for C2.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1055|Process Injection| APT41 malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.004|DNS| APT41 used DNS for C2 communications.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021) | |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1016|System Network Configuration Discovery| APT41 collected MAC addresses from victim machines.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021) | |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1136.001|Local Account| APT41 has created user accounts.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task|
APT41.md
c14154e5c888-4
APT41 has created user accounts.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| APT41 used a compromised account to create a scheduled task on a system.(Citation: FireEye APT41 Aug 2019)(Citation: Crowdstrike GTR2020 Mar 2020)| |mitre-attack|enterprise-attack|Windows|T1543.003|Windows Service| APT41 modified legitimate Windows services to install malware backdoors.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021) APT41 created the StorSyncSvc service to provide persistence for Cobalt Strike.(Citation: FireEye APT41 March 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1070.003|Clear Command History| APT41 attempted to remove evidence of some of its activity by deleting Bash histories.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| APT41 used APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader.(Citation: FireEye APT41 March 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,IaaS|T1486|Data Encrypted for Impact| APT41 used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102.001|Dead Drop Resolver| APT41 used legitimate websites for C2 through dead drop resolvers (DDR), including GitHub, Pastebin, and Microsoft TechNet.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers|T1496|Resource Hijacking|
APT41.md