id
stringlengths
14
15
text
stringlengths
96
2.14k
source
stringlengths
6
21
c14154e5c888-5
APT41 deployed a Monero cryptocurrency mining tool in a victim’s environment.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560.001|Archive via Utility| APT41 created a RAR archive of targeted files for exfiltration.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Windows|T1112|Modify Registry| APT41 used a malware variant called GOODLUCK to modify the registry in order to steal credentials.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021)| |mitre-attack|enterprise-attack|Windows|T1070.001|Clear Windows Event Logs| APT41 attempted to remove evidence of some of its activity by clearing Windows security and system events.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| APT41 created and modified startup files for persistence.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021) APT41 added a registry key in APT41 used the WMIEXEC utility to execute APT41 used WMI in several ways, including for execution of commands via WMIEXEC as well as for persistence via PowerSploit.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| APT41 used compromised credentials to log on to other systems.(Citation: FireEye APT41 Aug 2019)(Citation: Crowdstrike GTR2020 Mar 2020)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging|
APT41.md
c14154e5c888-6
APT41 used a keylogger called GEARSHIFT on a target system.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1195.002|Compromise Software Supply Chain| APT41 gained access to production environments where they could inject malicious code into legitimate, signed files and widely distribute them to end users.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1568.002|Domain Generation Algorithms| APT41 has used DGAs to change their C2 servers monthly.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1090|Proxy| APT41 used a tool called CLASSFON to covertly proxy network communications.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| APT41 compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| APT41 attempted to masquerade their files as popular anti-virus software.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell|
APT41.md
c14154e5c888-7
APT41 leveraged PowerShell to deploy malware families in victims’ environments.(Citation: FireEye APT41 Aug 2019)(Citation: FireEye APT41 March 2020)| |mitre-attack|enterprise-attack|Windows|T1546.008|Accessibility Features| APT41 leveraged sticky keys to establish persistence.(Citation: FireEye APT41 Aug 2019) | |mitre-attack|enterprise-attack|Windows|T1003.001|LSASS Memory| APT41 has used hashdump, Mimikatz, and the Windows Credential Editor to dump password hashes from memory and authenticate to other user accounts.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021)| |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol| APT41 used RDP for lateral movement.(Citation: FireEye APT41 Aug 2019)(Citation: Crowdstrike GTR2020 Mar 2020)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers,Network|T1046|Network Service Discovery| APT41 used a malware variant called WIDETONE to conduct port scans on specified subnets.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,Azure AD,Network|T1110.002|Password Cracking| APT41 performed password brute-force attacks on the local admin account.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,Windows|T1542.003|Bootkit| APT41 deployed Master Boot Record bootkits on Windows systems to hide their malware and maintain persistence on victim systems.(Citation: FireEye APT41 Aug 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1014|Rootkit|
APT41.md
c14154e5c888-8
APT41 deployed rootkits on Linux systems.(Citation: FireEye APT41 Aug 2019)(Citation: Crowdstrike GTR2020 Mar 2020)| |mitre-attack|enterprise-attack|macOS,Windows|T1553.002|Code Signing| APT41 leveraged code-signing certificates to sign malware when targeting both gaming and non-gaming organizations.(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021)|
APT41.md
fb75947d6b3f-0
Aquatic Panda - G0143 Created: 2022-01-18T14:49:29.505Z Modified: 2023-03-21T21:16:34.243Z Contributors: NST Assure Research Team, NetSentries Technologies,Pooja Natarajan, NEC Corporation India,Hiroki Nagahama, NEC Corporation,Manikantan Srinivasan, NEC Corporation India Aliases Aquatic Panda Description Aquatic Panda is a suspected China-based threat group with a dual mission of intelligence collection and industrial espionage. Active since at least May 2020, Aquatic Panda has primarily targeted entities in the telecommunications, technology, and government sectors.(Citation: CrowdStrike AQUATIC PANDA December 2021) Techniques Used Aquatic Panda has acquired and used Cobalt Strike in its operations.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|PRE|T1588.001|Malware| Aquatic Panda has acquired and used njRAT in its operations.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Windows|T1574.001|DLL Search Order Hijacking| Aquatic Panda has used DLL search-order hijacking to load Aquatic Panda has encoded PowerShell commands in Base64.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery| Aquatic Panda has used native OS commands to understand privilege levels and system details.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1007|System Service Discovery| Aquatic Panda has attempted to discover services for third party EDR products.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to
Aquatic_Panda.md
fb75947d6b3f-1
Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to Aquatic Panda has used WinRAR to compress memory dumps prior to exfiltration.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| Aquatic Panda has deleted malicious executables from compromised machines.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Windows|T1003.001|LSASS Memory| Aquatic Panda has attempted to harvest credentials through LSASS memory dumping.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| Aquatic Panda has downloaded additional malware onto compromised hosts.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| Aquatic Panda has downloaded additional scripts and executed Base64 encoded commands in PowerShell.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Containers,IaaS|T1562.001|Disable or Modify Tools| Aquatic Panda has attempted to stop endpoint detection and response (EDR) tools on compromised systems.(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|PRE|T1595.002|Vulnerability Scanning| Aquatic Panda has used publicly accessible DNS logging services to identify servers vulnerable to Log4j (CVE 2021-44228).(Citation: CrowdStrike AQUATIC PANDA December 2021)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace|T1518.001|Security Software Discovery| Aquatic Panda has attempted to discover third party endpoint detection and response (EDR) tools on compromised systems.(Citation: CrowdStrike AQUATIC PANDA December 2021)|
Aquatic_Panda.md
df3453d797e7-0
Axiom - G0001 Created: 2017-05-31T21:31:45.629Z Modified: 2023-03-20T22:03:44.661Z Contributors: Aliases Axiom,Group 72 Description Axiom is a suspected Chinese cyber espionage group that has targeted the aerospace, defense, government, manufacturing, and media sectors since at least 2008. Some reporting suggests a degree of overlap between Axiom and Winnti Group but the two groups appear to be distinct based on differences in reporting on TTPs and targeting.(Citation: Kaspersky Winnti April 2013)(Citation: Kaspersky Winnti June 2015)(Citation: Novetta Winnti April 2015) Techniques Used Axiom has collected data from a compromised network.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|PRE|T1583.002|DNS Server| Axiom has acquired dynamic DNS services for use in the targeting of intended victims.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|PRE|T1583.003|Virtual Private Server| Axiom has used VPS hosting providers in targeting of intended victims.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560|Archive Collected Data| Axiom has compressed and encrypted data prior to exfiltration.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|Windows|T1563.002|RDP Hijacking| Axiom has targeted victims with remote administration tools including RDP.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| Axiom has used previously compromised administrative accounts to escalate privileges.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|PRE|T1584.005|Botnet|
Axiom.md
df3453d797e7-1
Axiom has used previously compromised administrative accounts to escalate privileges.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|PRE|T1584.005|Botnet| Axiom has used large groups of compromised machines for use as proxy nodes.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1553|Subvert Trust Controls| Axiom has used digital certificates to deliver malware.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| Axiom has used watering hole attacks to gain access.(Citation: Cisco Group 72)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,SaaS,Office 365,Google Workspace|T1566|Phishing| Axiom has used spear phishing to initially compromise victims.(Citation: Cisco Group 72)(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| Axiom has used exploits for multiple vulnerabilities including CVE-2014-0322, CVE-2012-4792, CVE-2012-1889, and CVE-2013-3893.(Citation: Cisco Group 72)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1001.002|Steganography| Axiom has used steganography to hide its C2 communications.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application| Axiom has been observed using SQL injection to gain access to systems.(Citation: Novetta-Axiom)(Citation: Cisco Group 72)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1003|OS Credential Dumping|
Axiom.md
df3453d797e7-2
Axiom has been known to dump credentials.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|Windows|T1546.008|Accessibility Features| Axiom actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence.(Citation: Novetta-Axiom)| |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol| Axiom has used RDP during operations.(Citation: Novetta-Axiom)|
Axiom.md
3dae1b8d847d-0
BackdoorDiplomacy - G0135 Created: 2021-09-21T14:52:49.596Z Modified: 2021-10-18T19:47:11.389Z Contributors: Zaw Min Htun, @Z3TAE Aliases BackdoorDiplomacy Description BackdoorDiplomacy is a cyber espionage threat group that has been active since at least 2017. BackdoorDiplomacy has targeted Ministries of Foreign Affairs and telecommunication companies in Africa, Europe, the Middle East, and Asia.(Citation: ESET BackdoorDiplomacy Jun 2021) Techniques Used BackdoorDiplomacy has used an executable to detect removable media, such as USB flash drives.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1074.001|Local Data Staging| BackdoorDiplomacy has copied files of interest to the main drive's recycle bin.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell| BackdoorDiplomacy has used web shells to establish an initial foothold and for lateral movement within a victim's system.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|PRE|T1588.002|Tool| BackdoorDiplomacy has obtained a variety of open-source reconnaissance and red team tools for discovery and lateral movement.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| BackdoorDiplomacy has obfuscated tools and malware it uses with VMProtect.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,Network|T1095|Non-Application Layer Protocol|
BackdoorDiplomacy.md
3dae1b8d847d-1
BackdoorDiplomacy has used EarthWorm for network tunneling with a SOCKS5 server and port transfer functionalities.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1036.004|Masquerade Task or Service| BackdoorDiplomacy has disguised their backdoor droppers with naming conventions designed to blend into normal operations.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application| BackdoorDiplomacy has exploited CVE-2020-5902, an F5 BIP-IP vulnerability, to drop a Linux backdoor. BackdoorDiplomacy has also exploited mis-configured Plesk servers.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery| BackdoorDiplomacy has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| BackdoorDiplomacy has dropped implants in folders named for legitimate software.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers,Network|T1046|Network Service Discovery| BackdoorDiplomacy has used SMBTouch, a vulnerability scanner, to determine whether a target is vulnerable to EternalBlue malware.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Windows|T1574.001|DLL Search Order Hijacking|
BackdoorDiplomacy.md
3dae1b8d847d-2
BackdoorDiplomacy has executed DLL search order hijacking.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| BackdoorDiplomacy has downloaded additional files and tools onto a compromised host.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|PRE|T1588.001|Malware| BackdoorDiplomacy has obtained and used leaked malware, including DoublePulsar, EternalBlue, EternalRocks, and EternalSynergy, in its operations.(Citation: ESET BackdoorDiplomacy Jun 2021)| |mitre-attack|enterprise-attack|Windows|T1055.001|Dynamic-link Library Injection| BackdoorDiplomacy has dropped legitimate software onto a compromised host and used it to execute malicious DLLs.(Citation: ESET BackdoorDiplomacy Jun 2021)|
BackdoorDiplomacy.md
7b4f9ed6b6e6-0
BITTER - G1002 Created: 2022-06-01T20:26:53.880Z Modified: 2022-06-01T21:20:18.113Z Contributors: Aliases BITTER,T-APT-17 Description BITTER is a suspected South Asian cyber espionage threat group that has been active since at least 2013. BITTER has primarily targeted government, energy, and engineering organizations in Pakistan, China, Bangladesh, and Saudi Arabia.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016) Techniques Used BITTER has registered domains to stage payloads.(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|PRE|T1583.001|Domains| BITTER has registered a variety of domains to host malicious payloads and for C2.(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1068|Exploitation for Privilege Escalation| BITTER has exploited CVE-2021-1732 for privilege escalation.(Citation: DBAPPSecurity BITTER zero-day Feb 2021)(Citation: Microsoft CVE-2021-1732 Feb 2021)| |mitre-attack|enterprise-attack|PRE|T1588.002|Tool| BITTER has obtained tools such as PuTTY for use in their operations.(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1568|Dynamic Resolution| BITTER has used DDNS for C2 communications.(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1573|Encrypted Channel| BITTER has encrypted their C2 communications.(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,Network|T1095|Non-Application Layer Protocol|
BITTER.md
7b4f9ed6b6e6-1
BITTER has used TCP for C2 communications.(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| BITTER has used HTTP POST requests for C2.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| BITTER has used a RAR SFX dropper to deliver malware.(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| BITTER has used scheduled tasks for persistence and execution.(Citation: Cisco Talos Bitter Bangladesh May 2022)| |mitre-attack|enterprise-attack|Windows|T1559.002|Dynamic Data Exchange| BITTER has executed OLE objects using Microsoft Equation Editor to download and run malicious payloads.(Citation: Cisco Talos Bitter Bangladesh May 2022) | |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1036.004|Masquerade Task or Service| BITTER has disguised malware as a Windows Security update service.(Citation: Cisco Talos Bitter Bangladesh May 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| BITTER has downloaded additional malware and tools onto a compromised host.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016) | |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution|
BITTER.md
7b4f9ed6b6e6-2
BITTER has exploited Microsoft Office vulnerabilities CVE-2012-0158, CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| BITTER has attempted to lure victims into opening malicious attachments delivered via spearphishing.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| BITTER has sent spearphishing emails with a malicious RTF document or Excel spreadsheet.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016)|
BITTER.md
9ac9cf197f37-0
BlackOasis - G0063 Created: 2018-04-18T17:59:24.739Z Modified: 2018-10-17T00:14:20.652Z Contributors: Aliases BlackOasis Description BlackOasis is a Middle Eastern threat group that is believed to be a customer of Gamma Group. The group has shown interest in prominent figures in the United Nations, as well as opposition bloggers, activists, regional news correspondents, and think tanks. (Citation: Securelist BlackOasis Oct 2017) (Citation: Securelist APT Trends Q2 2017) A group known by Microsoft as NEODYMIUM is reportedly associated closely with BlackOasis operations, but evidence that the group names are aliases has not been identified. (Citation: CyberScoop BlackOasis Oct 2017) Techniques Used |Matrix|Domain|Platform|Technique ID|Technique Name|Use| | :---| :---| :---| :---| :---| :---| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information|BlackOasis's first stage shellcode contains a NOP sled with alternative instructions that was likely designed to bypass antivirus tools.(Citation: Securelist BlackOasis Oct 2017)|
BlackOasis.md
262927084b76-0
BlackTech - G0098 Created: 2020-05-05T18:36:45.970Z Modified: 2022-04-06T13:14:27.477Z Contributors: Tatsuya Daitoku, Cyber Defense Institute, Inc.,Hannah Simes, BT Security Aliases BlackTech,Palmerworm Description BlackTech is a suspected Chinese cyber espionage group that has primarily targeted organizations in East Asia--particularly Taiwan, Japan, and Hong Kong--and the US since at least 2013. BlackTech has used a combination of custom malware, dual-use tools, and living off the land tactics to compromise media, construction, engineering, electronics, and financial company networks.(Citation: TrendMicro BlackTech June 2017)(Citation: Symantec Palmerworm Sep 2020)(Citation: Reuters Taiwan BlackTech August 2020) Techniques Used BlackTech has obtained and used tools such as Putty, SNScan, and PsExec for its operations.(Citation: Symantec Palmerworm Sep 2020)| |mitre-attack|enterprise-attack|PRE|T1588.004|Digital Certificates| BlackTech has used valid, stolen digital certificates for some of their malware and tools.(Citation: ESET PLEAD Malware July 2018)| |mitre-attack|enterprise-attack|PRE|T1588.003|Code Signing Certificates| BlackTech has used stolen code-signing certificates for its malicious payloads.(Citation: Symantec Palmerworm Sep 2020)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers,Network|T1046|Network Service Discovery| BlackTech has used the SNScan tool to find other potential targets on victim networks.(Citation: Symantec Palmerworm Sep 2020)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1106|Native API| BlackTech has used built-in API functions.(Citation: IronNet BlackTech Oct 2021)| |mitre-attack|enterprise-attack|Linux,macOS|T1021.004|SSH|
BlackTech.md
262927084b76-1
BlackTech has used built-in API functions.(Citation: IronNet BlackTech Oct 2021)| |mitre-attack|enterprise-attack|Linux,macOS|T1021.004|SSH| BlackTech has used Putty for remote access.(Citation: Symantec Palmerworm Sep 2020)| |mitre-attack|enterprise-attack|Windows|T1574.002|DLL Side-Loading| BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories.(Citation: Trend Micro Waterbear December 2019) | |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| BlackTech has used spearphishing e-mails with malicious password-protected archived files (ZIP or RAR) to deliver malware.(Citation: TrendMicro BlackTech June 2017)(Citation: NTT Security Flagpro new December 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| BlackTech has used e-mails with malicious documents to lure victims into installing malware.(Citation: TrendMicro BlackTech June 2017)(Citation: NTT Security Flagpro new December 2021) | |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| BlackTech has used spearphishing e-mails with links to cloud services to deliver malware.(Citation: TrendMicro BlackTech June 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link| BlackTech has used e-mails with malicious links to lure victims into installing malware.(Citation: TrendMicro BlackTech June 2017) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1036.002|Right-to-Left Override|
BlackTech.md
262927084b76-2
BlackTech has used right-to-left-override to obfuscate the filenames of malicious e-mail attachments.(Citation: TrendMicro BlackTech June 2017)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| BlackTech has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities CVE-2012-0158, CVE-2014-6352, CVE-2017-0199, and Adobe Flash CVE-2015-5119.(Citation: TrendMicro BlackTech June 2017)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application| BlackTech has exploited a buffer overflow vulnerability in Microsoft Internet Information Services (IIS) 6.0, CVE-2017-7269, in order to establish a new HTTP or command and control (C2) server.(Citation: TrendMicro BlackTech June 2017)|
BlackTech.md
671247df0cf3-0
Blue Mockingbird - G0108 Created: 2020-05-26T20:09:39.139Z Modified: 2021-10-12T21:46:13.007Z Contributors: Tony Lambert, Red Canary Aliases Blue Mockingbird Description Blue Mockingbird is a cluster of observed activity involving Monero cryptocurrency-mining payloads in dynamic-link library (DLL) form on Windows systems. The earliest observed Blue Mockingbird tools were created in December 2019.(Citation: RedCanary Mockingbird May 2020) Techniques Used Blue Mockingbird has obtained and used tools such as Mimikatz.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1574.012|COR_PROFILER| Blue Mockingbird has used wmic.exe and Windows Registry modifications to set the COR_PROFILER environment variable to execute a malicious DLL whenever a process loads the .NET CLR.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| Blue Mockingbird has obfuscated the wallet address in the payload binary.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1047|Windows Management Instrumentation| Blue Mockingbird has used wmic.exe to set environment variables.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1112|Modify Registry| Blue Mockingbird has used Windows Registry modifications to specify a DLL payload.(Citation: RedCanary Mockingbird May 2020) | |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery| Blue Mockingbird has collected hardware details for the victim's system, including CPU and memory information.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1543.003|Windows Service|
Blue_Mockingbird.md
671247df0cf3-1
Blue Mockingbird has made their XMRIG payloads persistent as a Windows Service.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1134|Access Token Manipulation| Blue Mockingbird has used JuicyPotato to abuse the Blue Mockingbird has used Mimikatz to retrieve credentials from LSASS memory.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol| Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1021.002|SMB/Windows Admin Shares| Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1090|Proxy| Blue Mockingbird has used frp, ssf, and Venom to establish SOCKS proxy connections.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers|T1496|Resource Hijacking|
Blue_Mockingbird.md
671247df0cf3-2
Blue Mockingbird has used XMRIG to mine cryptocurrency on victim systems.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1546.003|Windows Management Instrumentation Event Subscription| Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| Blue Mockingbird has used batch script files to automate execution and deployment of payloads.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| Blue Mockingbird has used Windows Scheduled Tasks to establish persistence on local and remote hosts.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application| Blue Mockingbird has gained initial access by exploiting CVE-2019-18935, a vulnerability within Telerik UI for ASP.NET AJAX.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1218.011|Rundll32| Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using rundll32.exe.(Citation: RedCanary Mockingbird May 2020)| |mitre-attack|enterprise-attack|Windows|T1218.010|Regsvr32| Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using regsvr32.exe.(Citation: RedCanary Mockingbird May 2020) | |mitre-attack|enterprise-attack|Windows|T1569.002|Service Execution| Blue Mockingbird has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the "wercplsupport" service.(Citation: RedCanary Mockingbird May 2020) |
Blue_Mockingbird.md
a7f57c8741d8-0
BRONZE BUTLER - G0060 Created: 2018-01-16T16:13:52.465Z Modified: 2021-10-12T19:42:16.869Z Contributors: Trend Micro Incorporated Aliases BRONZE BUTLER,REDBALDKNIGHT,Tick Description BRONZE BUTLER is a cyber espionage group with likely Chinese origins that has been active since at least 2008. The group primarily targets Japanese organizations, particularly those in government, biotechnology, electronics manufacturing, and industrial chemistry.(Citation: Trend Micro Daserf Nov 2017)(Citation: Secureworks BRONZE BUTLER Oct 2017)(Citation: Trend Micro Tick November 2019) Techniques Used BRONZE BUTLER has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor.(Citation: Symantec Tick Apr 2016)| |mitre-attack|enterprise-attack|Windows|T1574.002|DLL Side-Loading| BRONZE BUTLER has used legitimate applications to side-load malicious DLLs.(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1007|System Service Discovery| BRONZE BUTLER has used TROJ_GETVERSION to discover system services.(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Containers,IaaS|T1562.001|Disable or Modify Tools| BRONZE BUTLER has incorporated code into several tools that attempts to terminate anti-virus processes.(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.003|Steganography| BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads.(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace|T1518|Software Discovery|
BRONZE_BUTLER.md
a7f57c8741d8-1
BRONZE BUTLER has used tools to enumerate software installed on an infected host.(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036|Masquerading| BRONZE BUTLER has masked executables with document file icons including Word and Adobe PDF.(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1059.006|Python| BRONZE BUTLER has made use of Python-based remote access tools.(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1036.002|Right-to-Left Override| BRONZE BUTLER has used Right-to-Left Override to deceive victims into executing several strains of malware.(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Windows,Office 365,SaaS,Linux,macOS|T1080|Taint Shared Content| BRONZE BUTLER has placed malware on file shares and given it the same name as legitimate documents on the share.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic| BRONZE BUTLER has used VBS and VBE scripts for execution.(Citation: Secureworks BRONZE BUTLER Oct 2017)(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| BRONZE BUTLER compromised three Japanese websites using a Flash exploit to perform watering hole attacks.(Citation: Symantec Tick Apr 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|
BRONZE_BUTLER.md
a7f57c8741d8-2
BRONZE BUTLER has attempted to get users to launch malicious Microsoft Word attachments delivered via spearphishing emails.(Citation: Symantec Tick Apr 2016)(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| BRONZE BUTLER has exploited Microsoft Office vulnerabilities CVE-2014-4114, CVE-2018-0802, and CVE-2018-0798 for execution.(Citation: Symantec Tick Apr 2016)(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims.(Citation: Symantec Tick Apr 2016)(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102.001|Dead Drop Resolver| BRONZE BUTLER's MSGET downloader uses a dead drop resolver to access malicious payloads.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion|The BRONZE BUTLER uploader or malware the uploader uses BRONZE BUTLER tools encode data with base64 when posting it to a C2 server.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Windows|T1550.003|Pass the Ticket| BRONZE BUTLER has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell|
BRONZE_BUTLER.md
a7f57c8741d8-3
BRONZE BUTLER has used batch scripts and the command-line interface for execution.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| BRONZE BUTLER has given malware the same name as an existing file on the file share server to cause users to unwittingly launch and install the malware on additional systems.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1053.002|At| BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560.001|Archive via Utility| BRONZE BUTLER has compressed data into password-protected RAR archives prior to exfiltration.(Citation: Secureworks BRONZE BUTLER Oct 2017)(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Windows,Network|T1124|System Time Discovery| BRONZE BUTLER has used BRONZE BUTLER has used various tools to download files, including DGet (a similar tool to wget).(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Windows|T1548.002|Bypass User Account Control| BRONZE BUTLER has used a Windows 10 specific tool and xxmm to bypass UAC for privilege escalation.(Citation: Secureworks BRONZE BUTLER Oct 2017)(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| BRONZE BUTLER malware has used HTTP for C2.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1005|Data from Local System|
BRONZE_BUTLER.md
a7f57c8741d8-4
BRONZE BUTLER has exfiltrated files stolen from local systems.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| BRONZE BUTLER has used PowerShell for execution.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1573.001|Symmetric Cryptography| BRONZE BUTLER has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. BRONZE BUTLER has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.001|Binary Padding| BRONZE BUTLER downloader code has included "0" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection.(Citation: Secureworks BRONZE BUTLER Oct 2017)(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Windows|T1003.001|LSASS Memory| BRONZE BUTLER has used various tools (such as Mimikatz and WCE) to perform credential dumping.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1087.002|Domain Account| BRONZE BUTLER has used BRONZE BUTLER typically use Net to enumerate systems.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1113|Screen Capture| BRONZE BUTLER has used a tool to capture screenshots.(Citation: Secureworks BRONZE BUTLER Oct 2017)(Citation: Trend Micro Tick November 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery|
BRONZE_BUTLER.md
a7f57c8741d8-5
BRONZE BUTLER has collected a list of files from the victim and uploaded it to its C2 server, and then created a new list of specific files to steal.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1140|Deobfuscate/Decode Files or Information| BRONZE BUTLER downloads encoded payloads and decodes them on the victim.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1039|Data from Network Shared Drive| BRONZE BUTLER has exfiltrated files stolen from file shares.(Citation: Secureworks BRONZE BUTLER Oct 2017)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| BRONZE BUTLER has used a batch script that adds a Registry Run key to establish malware persistence.(Citation: Secureworks BRONZE BUTLER Oct 2017)|
BRONZE_BUTLER.md
a976705880dd-0
Carbanak - G0008 Created: 2017-05-31T21:31:49.021Z Modified: 2021-10-18T21:02:30.899Z Contributors: Anastasios Pingios Aliases Carbanak,Anunak Description Carbanak is a cybercriminal group that has used Carbanak malware to target financial institutions since at least 2013. Carbanak may be linked to groups tracked separately as Cobalt Group and FIN7 that have also used Carbanak malware.(Citation: Kaspersky Carbanak)(Citation: FireEye FIN7 April 2017)(Citation: Europol Cobalt Mar 2018)(Citation: Secureworks GOLD NIAGARA Threat Profile)(Citation: Secureworks GOLD KINGSWOOD Threat Profile) Techniques Used Carbanak has obtained and used open-source tools such as PsExec and Mimikatz.(Citation: Kaspersky Carbanak)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1036.004|Masquerade Task or Service| Carbanak has copied legitimate service names to use for malicious services.(Citation: Kaspersky Carbanak)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1219|Remote Access Software| Carbanak used legitimate programs such as AmmyyAdmin and Team Viewer for remote interactive C2 to target systems.(Citation: Group-IB Anunak)| |mitre-attack|enterprise-attack|Windows|T1218.011|Rundll32| Carbanak installs VNC server software that executes through rundll32.(Citation: Kaspersky Carbanak)| |mitre-attack|enterprise-attack|Windows|T1543.003|Windows Service| Carbanak malware installs itself as a service to provide persistence and SYSTEM privileges.(Citation: Kaspersky Carbanak)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1562.004|Disable or Modify System Firewall| Carbanak may use
Carbanak.md
a976705880dd-1
Carbanak may use netsh to add local firewall rule exceptions.(Citation: Group-IB Anunak)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102.002|Bidirectional Communication| Carbanak has used a VBScript named "ggldr" that uses Google Apps Script, Sheets, and Forms services for C2.(Citation: Forcepoint Carbanak Google C2)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| Carbanak has named malware "svchost.exe," which is the name of the Windows shared service host program.(Citation: Kaspersky Carbanak)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| Carbanak actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars.(Citation: Kaspersky Carbanak)|
Carbanak.md
d5608583768a-0
Chimera - G0114 Created: 2020-08-24T17:01:55.842Z Modified: 2023-03-22T03:25:24.295Z Contributors: Aliases Chimera Description Chimera is a suspected China-based threat group that has been active since at least 2018 targeting the semiconductor industry in Taiwan as well as data from the airline industry.(Citation: Cycraft Chimera April 2020)(Citation: NCC Group Chimera January 2021) Techniques Used Chimera has obtained and used tools such as BloodHound, Cobalt Strike, Mimikatz, and PsExec.(Citation: Cycraft Chimera April 2020)(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| Chimera has performed file deletion to evade detection.(Citation: Cycraft Chimera April 2020) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1572|Protocol Tunneling| Chimera has encapsulated Cobalt Strike's C2 protocol in DNS and HTTPS.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1039|Data from Network Shared Drive| Chimera has collected data of interest from network shares.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1007|System Service Discovery| Chimera has used Chimera has used Chimera has used the Chimera has used ipconfig, Ping, and Chimera has used Chimera has used Chimera has queried Registry keys using Chimera has used Chimera has used custom DLLs for continuous retrieval of data from memory.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1087.001|Local Account| Chimera has used
Chimera.md
d5608583768a-1
Chimera has used Chimera has registered alternate phone numbers for compromised users to intercept 2FA codes sent via SMS.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1550.002|Pass the Hash| Chimera has dumped password hashes for use in pass the hash authentication attacks.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| Chimera has used HTTPS for C2 communications.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1569.002|Service Execution| Chimera has used PsExec to deploy beacons on compromised systems.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.004|DNS| Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1574.002|DLL Side-Loading| Chimera has used side loading to place malicious DLLs in memory.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1074.001|Local Data Staging| Chimera has staged stolen data locally on compromised hosts.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1114.001|Local Email Collection| Chimera has harvested data from victim's e-mail including through execution of Chimera has harvested data from remote mailboxes including through execution of
Chimera.md
d5608583768a-2
Chimera has harvested data from victim's e-mail including through execution of Chimera has harvested data from remote mailboxes including through execution of Chimera has collected documents from the victim's SharePoint.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1570|Lateral Tool Transfer| Chimera has copied tools between compromised hosts using SMB.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1021.006|Windows Remote Management| Chimera has used WinRM for lateral movement.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers,Network|T1046|Network Service Discovery| Chimera has used the Chimera has used the NtdsAudit utility to collect information related to accounts and passwords.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery| Chimera has used Chimera has cleared event logs on compromised hosts.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.006|Timestomp| Chimera has used a Windows version of the Linux Chimera has used Chimera has exfiltrated stolen data to OneDrive accounts.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS|T1074.002|Remote Data Staging| Chimera has staged stolen data on designated servers in the target environment.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1041|Exfiltration Over C2 Channel| Chimera has used
Chimera.md
d5608583768a-3
Chimera has used Cobalt Strike C2 beacons for data exfiltration.(Citation: NCC Group Chimera January 2021) | |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| Chimera has utilized multiple commands to identify data of interest in file and directory listings.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1482|Domain Trust Discovery| Chimera has Chimera has utilized various scans and queries to find domain controllers and remote services in the target environment.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1135|Network Share Discovery| Chimera has used Chimera has used compromised domain accounts to gain access to the target environment.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers|T1110.003|Password Spraying| Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|PRE|T1589.001|Credentials| Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers|T1110.004|Credential Stuffing| Chimera has used credential stuffing against victim's remote services to obtain valid accounts.(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1021.002|SMB/Windows Admin Shares|
Chimera.md
d5608583768a-4
Chimera has used Windows admin shares to move laterally.(Citation: Cycraft Chimera April 2020)(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1106|Native API| Chimera has used direct Windows system calls by leveraging Dumpert.(Citation: Cycraft Chimera April 2020)| |mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| Chimera has used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services.(Citation: Cycraft Chimera April 2020)(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| Chimera has used scheduled tasks to invoke Cobalt Strike including through batch script Chimera has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features.(Citation: Cycraft Chimera April 2020)(Citation: NCC Group Chimera January 2021) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.010|Command Obfuscation| Chimera has encoded PowerShell commands.(Citation: Cycraft Chimera April 2020) | |mitre-attack|enterprise-attack|Windows|T1556.001|Domain Controller Authentication| Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential.(Citation: Cycraft Chimera April 2020) | |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| Chimera has renamed malware to GoogleUpdate.exe and WinRAR to jucheck.exe, RecordedTV.ms, teredo.tmp, update.exe, and msadcs1.exe.(Citation: Cycraft Chimera April 2020)| |mitre-attack|enterprise-attack|Windows|T1003.003|NTDS|
Chimera.md
d5608583768a-5
Chimera has gathered the SYSTEM registry and ntds.dit files from target systems.(Citation: Cycraft Chimera April 2020) Chimera specifically has used the NtdsAudit tool to dump the password hashes of domain users via Chimera has has used Chimera has used WMIC to execute remote commands.(Citation: Cycraft Chimera April 2020)(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| Chimera has used a valid account to maintain persistence via scheduled task.(Citation: Cycraft Chimera April 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| Chimera has remotely copied tools and malware onto targeted systems.(Citation: Cycraft Chimera April 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560.001|Archive via Utility| Chimera has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts.(Citation: Cycraft Chimera April 2020)(Citation: NCC Group Chimera January 2021)| |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol| Chimera has used RDP to access targeted systems.(Citation: Cycraft Chimera April 2020)|
Chimera.md
34a5d54afb3d-0
Cleaver - G0003 Created: 2017-05-31T21:31:46.390Z Modified: 2022-07-22T18:37:22.178Z Contributors: Aliases Cleaver,Threat Group 2889,TG-2889 Description Cleaver is a threat group that has been attributed to Iranian actors and is responsible for activity tracked as Operation Cleaver. (Citation: Cylance Cleaver) Strong circumstantial evidence suggests Cleaver is linked to Threat Group 2889 (TG-2889). (Citation: Dell Threat Group 2889) Techniques Used Cleaver has obtained and used open-source tools such as PsExec, Windows Credential Editor, and Mimikatz.(Citation: Cylance Cleaver)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1557.002|ARP Cache Poisoning| Cleaver has used custom tools to facilitate ARP cache poisoning.(Citation: Cylance Cleaver)| |mitre-attack|enterprise-attack|PRE|T1587.001|Malware| Cleaver has created customized tools and payloads for functions including ARP poisoning, encryption, credential dumping, ASP.NET shells, web backdoors, process enumeration, WMI querying, HTTP and SMB communications, network interface sniffing, and keystroke logging.(Citation: Cylance Cleaver)| |mitre-attack|enterprise-attack|PRE|T1585.001|Social Media Accounts| Cleaver has created fake LinkedIn profiles that included profile photos, details, and connections.(Citation: Dell Threat Group 2889)| |mitre-attack|enterprise-attack|Windows|T1003.001|LSASS Memory| Cleaver has been known to dump credentials using Mimikatz and Windows Credential Editor.(Citation: Cylance Cleaver)|
Cleaver.md
cc3ad216a455-0
Cobalt Group - G0080 Created: 2018-10-17T00:14:20.652Z Modified: 2023-03-22T03:28:29.415Z Contributors: Aliases Cobalt Group,GOLD KINGSWOOD,Cobalt Gang,Cobalt Spider Description Cobalt Group is a financially motivated threat group that has primarily targeted financial institutions since at least 2016. The group has conducted intrusions to steal money via targeting ATM systems, card processing, payment systems and SWIFT systems. Cobalt Group has mainly targeted banks in Eastern Europe, Central Asia, and Southeast Asia. One of the alleged leaders was arrested in Spain in early 2018, but the group still appears to be active. The group has been known to target organizations in order to use their access to then compromise additional victims.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Group IB Cobalt Aug 2017)(Citation: Proofpoint Cobalt June 2017)(Citation: RiskIQ Cobalt Nov 2017)(Citation: RiskIQ Cobalt Jan 2018) Reporting indicates there may be links between Cobalt Group and both the malware Carbanak and the group Carbanak.(Citation: Europol Cobalt Mar 2018) Techniques Used Cobalt Group has obtained and used a variety of tools including Mimikatz, PsExec, Cobalt Strike, and SDelete.(Citation: PTSecurity Cobalt Dec 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1195.002|Compromise Software Supply Chain| Cobalt Group has compromised legitimate web browser updates to deliver a backdoor. (Citation: Crowdstrike GTR2020 Mar 2020)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.007|JavaScript|
Cobalt_Group.md
cc3ad216a455-1
Cobalt Group has executed JavaScript scriptlets on the victim's machine.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: Group IB Cobalt Aug 2017)(Citation: Morphisec Cobalt Gang Oct 2018)(Citation: Unit 42 Cobalt Gang Oct 2018)(Citation: TrendMicro Cobalt Group Nov 2017)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands.(Citation: Morphisec Cobalt Gang Oct 2018) The group has used an exploit toolkit known as Threadkit that launches .bat files.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: Group IB Cobalt Aug 2017)(Citation: Morphisec Cobalt Gang Oct 2018)(Citation: Unit 42 Cobalt Gang Oct 2018)(Citation: TrendMicro Cobalt Group Nov 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link| Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine.(Citation: Talos Cobalt Group July 2018)(Citation: Unit 42 Cobalt Gang Oct 2018)(Citation: Secureworks GOLD KINGSWOOD September 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.004|DNS| Cobalt Group has used DNS tunneling for C2.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1572|Protocol Tunneling|
Cobalt_Group.md
cc3ad216a455-2
Cobalt Group has used the Plink utility to create SSH tunnels.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Windows|T1218.008|Odbcconf| Cobalt Group has used Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine.(Citation: Morphisec Cobalt Gang Oct 2018)| |mitre-attack|enterprise-attack|Windows|T1037.001|Logon Script (Windows)| Cobalt Group has added persistence by registering the file name for the next stage malware under Cobalt Group obfuscated several scriptlets and code used on the victim’s machine, including through use of XOR and RC4.(Citation: Talos Cobalt Group July 2018)(Citation: Morphisec Cobalt Gang Oct 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1573.002|Asymmetric Cryptography| Cobalt Group has used the Plink utility to create SSH tunnels.(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Windows|T1548.002|Bypass User Account Control| Cobalt Group has bypassed UAC.(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| Cobalt Group has sent emails with URLs pointing to malicious documents.(Citation: Talos Cobalt Group July 2018)(Citation: Secureworks GOLD KINGSWOOD September 2018)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1219|Remote Access Software|
Cobalt_Group.md
cc3ad216a455-3
Cobalt Group used the Ammyy Admin tool as well as TeamViewer for remote access, including to preserve remote access if a Cobalt Strike module was lost.(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| Cobalt Group has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike.(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Windows|T1218.003|CMSTP| Cobalt Group has used the command Cobalt Group has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers.(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: PTSecurity Cobalt Dec 2016) The group's JavaScript backdoor is also capable of downloading files.(Citation: Morphisec Cobalt Gang Oct 2018)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| Cobalt Group has used powershell.exe to download and execute scripts.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Group IB Cobalt Aug 2017)(Citation: RiskIQ Cobalt Jan 2018)(Citation: TrendMicro Cobalt Group Nov 2017)| |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol| Cobalt Group has used Remote Desktop Protocol to conduct lateral movement.(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|
Cobalt_Group.md
cc3ad216a455-4
Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine.(Citation: Talos Cobalt Group July 2018)(Citation: Unit 42 Cobalt Gang Oct 2018)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers,Network|T1046|Network Service Discovery| Cobalt Group leveraged an open-source tool called SoftPerfect Network Scanner to perform network scanning.(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Windows|T1543.003|Windows Service| Cobalt Group has created new services to establish persistence.(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Windows|T1559.002|Dynamic Data Exchange| Cobalt Group has sent malicious Word OLE compound documents to victims.(Citation: Talos Cobalt Group July 2018)| |mitre-attack|enterprise-attack|Windows|T1220|XSL Script Processing| Cobalt Group used msxsl.exe to bypass AppLocker and to invoke Jscript code from an XSL file.(Citation: Talos Cobalt Group July 2018)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic| Cobalt Group has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: Group IB Cobalt Aug 2017)(Citation: Morphisec Cobalt Gang Oct 2018)(Citation: Unit 42 Cobalt Gang Oct 2018)(Citation: TrendMicro Cobalt Group Nov 2017)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task|
Cobalt_Group.md
cc3ad216a455-5
Cobalt Group has created Windows tasks to establish persistence.(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf, .doc, .xls, archives containing LNK files, and password protected archives containing .exe and .scr executables.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Group IB Cobalt Aug 2017)(Citation: Proofpoint Cobalt June 2017)(Citation: RiskIQ Cobalt Nov 2017)(Citation: Unit 42 Cobalt Gang Oct 2018)(Citation: TrendMicro Cobalt Group Nov 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| Cobalt Group has used HTTPS for C2.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1055|Process Injection| Cobalt Group has injected code into trusted processes.(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| Cobalt Group deleted the DLL dropper from the victim’s machine to cover their tracks.(Citation: Talos Cobalt Group July 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1068|Exploitation for Privilege Escalation| Cobalt Group has used exploits to increase their levels of rights and privileges.(Citation: Group IB Cobalt Aug 2017)| |mitre-attack|enterprise-attack|Windows|T1218.010|Regsvr32|
Cobalt_Group.md
cc3ad216a455-6
Cobalt Group has used regsvr32.exe to execute scripts.(Citation: Talos Cobalt Group July 2018)(Citation: Morphisec Cobalt Gang Oct 2018)(Citation: TrendMicro Cobalt Group Nov 2017)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| Cobalt Group had exploited multiple vulnerabilities for execution, including Microsoft’s Equation Editor (CVE-2017-11882), an Internet Explorer vulnerability (CVE-2018-8174), CVE-2017-8570, CVE-2017-0199, and CVE-2017-8759.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Proofpoint Cobalt June 2017)(Citation: RiskIQ Cobalt Nov 2017)(Citation: RiskIQ Cobalt Jan 2018)(Citation: Crowdstrike Global Threat Report Feb 2018)(Citation: TrendMicro Cobalt Group Nov 2017)|
Cobalt_Group.md
521f49377c24-0
Confucius - G0142 Created: 2021-12-26T23:11:39.442Z Modified: 2022-06-30T20:15:32.697Z Contributors: Aliases Confucius,Confucius APT Description Confucius is a cyber espionage group that has primarily targeted military personnel, high-profile personalities, business persons, and government organizations in South Asia since at least 2013. Security researchers have noted similarities between Confucius and Patchwork, particularly in their respective custom malware code and targets.(Citation: TrendMicro Confucius APT Feb 2018)(Citation: TrendMicro Confucius APT Aug 2021)(Citation: Uptycs Confucius APT Jan 2021) Techniques Used Confucius has used mshta.exe to execute malicious VBScript.(Citation: TrendMicro Confucius APT Feb 2018) | |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic| Confucius has used VBScript to execute malicious code.(Citation: TrendMicro Confucius APT Feb 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1567.002|Exfiltration to Cloud Storage| Confucius has exfiltrated victim data to cloud storage service accounts.(Citation: TrendMicro Confucius APT Feb 2018)| |mitre-attack|enterprise-attack|PRE|T1583.006|Web Services| Confucius has obtained cloud storage service accounts to host stolen data.(Citation: TrendMicro Confucius APT Feb 2018)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Confucius has crafted and sent victims malicious attachments to gain initial access.(Citation: Uptycs Confucius APT Jan 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link|
Confucius.md
521f49377c24-1
Confucius has sent malicious links to victims through email campaigns.(Citation: TrendMicro Confucius APT Aug 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link| Confucius has lured victims into clicking on a malicious link sent through spearphishing.(Citation: TrendMicro Confucius APT Aug 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| Confucius has lured victims to execute malicious attachments included in crafted spearphishing emails related to current topics.(Citation: Uptycs Confucius APT Jan 2021)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| Confucius has used PowerShell to execute malicious files and payloads.(Citation: TrendMicro Confucius APT Aug 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| Confucius has used HTTP for C2 communications.(Citation: Uptycs Confucius APT Jan 2021)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| Confucius has exploited Microsoft Office vulnerabilities, including CVE-2015-1641, CVE-2017-11882, and CVE-2018-0802.(Citation: Uptycs Confucius APT Jan 2021)(Citation: TrendMicro Confucius APT Feb 2018)| |mitre-attack|enterprise-attack|Windows|T1221|Template Injection| Confucius has used a weaponized Microsoft Word document with an embedded RTF exploit.(Citation: Uptycs Confucius APT Jan 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer|
Confucius.md
521f49377c24-2
Confucius has downloaded additional files and payloads onto a compromised host following initial access.(Citation: Uptycs Confucius APT Jan 2021)(Citation: TrendMicro Confucius APT Aug 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,IaaS,SaaS|T1119|Automated Collection| Confucius has used a file stealer to steal documents and images with the following extensions: txt, pdf, png, jpg, doc, xls, xlm, odp, ods, odt, rtf, ppt, xlsx, xlsm, docx, pptx, and jpeg.(Citation: TrendMicro Confucius APT Aug 2021)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| Confucius has created scheduled tasks to maintain persistence on a compromised host.(Citation: TrendMicro Confucius APT Aug 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1041|Exfiltration Over C2 Channel| Confucius has exfiltrated stolen files to its C2 server.(Citation: TrendMicro Confucius APT Aug 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| Confucius has used a file stealer that checks the Document, Downloads, Desktop, and Picture folders for documents and images with specific extensions.(Citation: TrendMicro Confucius APT Aug 2021)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| Confucius has dropped malicious files into the startup folder Confucius has used a file stealer that can examine system drives, including those other than the C drive.(Citation: TrendMicro Confucius APT Aug 2021)|
Confucius.md
382e9c1fb014-0
CopyKittens - G0052 Created: 2018-01-16T16:13:52.465Z Modified: 2022-08-08T21:29:36.462Z Contributors: Aliases CopyKittens Description CopyKittens is an Iranian cyber espionage group that has been operating since at least 2013. It has targeted countries including Israel, Saudi Arabia, Turkey, the U.S., Jordan, and Germany. The group is responsible for the campaign known as Operation Wilted Tulip.(Citation: ClearSky CopyKittens March 2017)(Citation: ClearSky Wilted Tulip July 2017)(Citation: CopyKittens Nov 2015) Techniques Used CopyKittens has used the AirVPN service for operational activity.(Citation: Microsoft POLONIUM June 2022)| |mitre-attack|enterprise-attack|PRE|T1588.002|Tool| CopyKittens has used Metasploit, Empire, and AirVPN for post-exploitation activities.(Citation: ClearSky and Trend Micro Operation Wilted Tulip July 2017)(Citation: Microsoft POLONIUM June 2022)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1564.003|Hidden Window| CopyKittens has used PowerShell windows. (Citation: ClearSky Wilted Tulip July 2017)| |mitre-attack|enterprise-attack|Windows|T1218.011|Rundll32| CopyKittens uses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.(Citation: ClearSky Wilted Tulip July 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560.001|Archive via Utility| CopyKittens uses ZPP, a .NET console program, to compress files with ZIP.(Citation: ClearSky Wilted Tulip July 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1560.003|Archive via Custom Method|
CopyKittens.md
382e9c1fb014-1
CopyKittens encrypts data with a substitute cipher prior to exfiltration.(Citation: CopyKittens Nov 2015)| |mitre-attack|enterprise-attack|macOS,Windows|T1553.002|Code Signing| CopyKittens digitally signed an executable with a stolen certificate from legitimate company AI Squared.(Citation: ClearSky Wilted Tulip July 2017)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| CopyKittens has used PowerShell Empire.(Citation: ClearSky Wilted Tulip July 2017)|
CopyKittens.md
91aafb65c94b-0
CURIUM - G1012 Created: 2023-01-13T20:51:13.494Z Modified: 2023-04-12T13:21:41.276Z Contributors: Aliases CURIUM Description CURIUM is an Iranian threat group first reported in November 2021 that has invested in building a relationship with potential targets via social media over a period of months to establish trust and confidence before sending malware. Security researchers note CURIUM has demonstrated great patience and persistence by chatting with potential targets daily and sending benign files to help lower their security consciousness.(Citation: Microsoft Iranian Threat Actor Trends November 2021) Techniques Used |Matrix|Domain|Platform|Technique ID|Technique Name|Use| | :---| :---| :---| :---| :---| :---| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1005|Data from Local System|CURIUM has exfiltrated data from a compromised machine.(Citation: Microsoft Iranian Threat Actor Trends November 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1566.003|Spearphishing via Service|CURIUM has used social media to deliver malicious files to victims.(Citation: Microsoft Iranian Threat Actor Trends November 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|CURIUM has lured users into opening malicious files delivered via social media.(Citation: Microsoft Iranian Threat Actor Trends November 2021)| |mitre-attack|enterprise-attack|PRE|T1585.001|Social Media Accounts|CURIUM has established a network of fictitious social media accounts, including on Facebook and LinkedIn, to establish relationships with victims, often posing as an attractive woman.(Citation: Microsoft Iranian Threat Actor Trends November 2021)|
CURIUM.md
440049496973-0
Darkhotel - G0012 Created: 2017-05-31T21:31:50.624Z Modified: 2022-10-19T22:07:30.243Z Contributors: Harry, CODEMIZE Aliases Darkhotel,DUBNIUM Description Darkhotel is a suspected South Korean threat group that has targeted victims primarily in East Asia since at least 2004. The group's name is based on cyber espionage operations conducted via hotel Internet networks against traveling executives and other select guests. Darkhotel has also conducted spearphishing campaigns and infected victims through peer-to-peer and file sharing networks.(Citation: Kaspersky Darkhotel)(Citation: Securelist Darkhotel Aug 2015)(Citation: Microsoft Digital Defense FY20 Sept 2020) Techniques Used Darkhotel has used malware that repeatedly checks the mouse cursor position to determine if a real user is on the system.(Citation: Lastline DarkHotel Just In Time Decryption Nov 2015)| |mitre-attack|enterprise-attack|Windows,Network|T1124|System Time Discovery| Darkhotel malware can obtain system time from a compromised host.(Citation: Lastline DarkHotel Just In Time Decryption Nov 2015)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1497|Virtualization/Sandbox Evasion| Darkhotel malware has employed just-in-time decryption of strings to evade sandbox detection.(Citation: Lastline DarkHotel Just In Time Decryption Nov 2015)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| Darkhotel has used malware that is disguised as a Secure Shell (SSH) tool.(Citation: Microsoft DUBNIUM June 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1497.001|System Checks| Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names, if a filename ends with
Darkhotel.md
440049496973-1
Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names, if a filename ends with Darkhotel has exploited Adobe Flash vulnerability CVE-2015-8651 for execution.(Citation: Microsoft DUBNIUM June 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| Darkhotel has used first-stage payloads that download additional malware from C2 servers.(Citation: Microsoft DUBNIUM June 2016)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1573.001|Symmetric Cryptography| Darkhotel has used AES-256 and 3DES for C2 communications.(Citation: Microsoft DUBNIUM July 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| Darkhotel has used malware that searched for files with specific patterns.(Citation: Microsoft DUBNIUM July 2016)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments.(Citation: Securelist Darkhotel Aug 2015)(Citation: Microsoft DUBNIUM July 2016)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1082|System Information Discovery| Darkhotel has collected the hostname, OS version, service pack version, and the processor architecture from the victim’s machine.(Citation: Securelist Darkhotel Aug 2015)(Citation: Microsoft DUBNIUM July 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| Darkhotel has sent spearphishing emails in an attempt to lure users into clicking on a malicious attachments.(Citation: Securelist Darkhotel Aug 2015)(Citation: Microsoft DUBNIUM July 2016)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1140|Deobfuscate/Decode Files or Information|
Darkhotel.md
440049496973-2
Darkhotel has decrypted strings and imports using RC4 during execution.(Citation: Securelist Darkhotel Aug 2015)(Citation: Microsoft DUBNIUM July 2016)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| Darkhotel used embedded iframes on hotel login portals to redirect selected victims to download malware.(Citation: Kaspersky Darkhotel)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1016|System Network Configuration Discovery| Darkhotel has collected the IP address and network adapter information from the victim’s machine.(Citation: Securelist Darkhotel Aug 2015)(Citation: Microsoft DUBNIUM July 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| Darkhotel has obfuscated code using RC4, XOR, and RSA.(Citation: Securelist Darkhotel Aug 2015)(Citation: Microsoft DUBNIUM July 2016)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace|T1518.001|Security Software Discovery| Darkhotel has searched for anti-malware strings and anti-virus processes running on the system.(Citation: Securelist Darkhotel Aug 2015)(Citation: Microsoft DUBNIUM June 2016) | |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1057|Process Discovery| Darkhotel malware can collect a list of running processes on a system.(Citation: Securelist Darkhotel Aug 2015)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file.(Citation: Securelist Darkhotel Aug 2015)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder|
Darkhotel.md
440049496973-3
Darkhotel has been known to establish persistence by adding programs to the Run Registry key.(Citation: Kaspersky Darkhotel)| |mitre-attack|enterprise-attack|Windows|T1091|Replication Through Removable Media| Darkhotel's selective infector modifies executables stored on removable media as a method of spreading across computers.(Citation: Kaspersky Darkhotel)| |mitre-attack|enterprise-attack|Windows,Office 365,SaaS,Linux,macOS|T1080|Taint Shared Content| Darkhotel used a virus that propagates by infecting executables stored on shared drives.(Citation: Kaspersky Darkhotel)| |mitre-attack|enterprise-attack|macOS,Windows|T1553.002|Code Signing| Darkhotel has used code-signing certificates on its malware that are either forged due to weak keys or stolen. Darkhotel has also stolen certificates and signed backdoors and downloaders with them.(Citation: Kaspersky Darkhotel)(Citation: Securelist Darkhotel Aug 2015)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging| Darkhotel has used a keylogger.(Citation: Kaspersky Darkhotel)|
Darkhotel.md
3ce921051536-0
DarkHydrus - G0079 Created: 2018-10-17T00:14:20.652Z Modified: 2021-10-12T19:52:22.454Z Contributors: Oleg Skulkin, Group-IB Aliases DarkHydrus Description DarkHydrus is a threat group that has targeted government agencies and educational institutions in the Middle East since at least 2016. The group heavily leverages open-source tools and custom payloads for carrying out attacks. (Citation: Unit 42 DarkHydrus July 2018) (Citation: Unit 42 Playbook Dec 2017) Techniques Used DarkHydrus has obtained and used tools such as Mimikatz, Empire, and Cobalt Strike.(Citation: Unit 42 DarkHydrus July 2018)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1564.003|Hidden Window| DarkHydrus has used PowerShell windows. (Citation: Unit 42 DarkHydrus July 2018)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| DarkHydrus leveraged PowerShell to download and execute additional scripts for execution.(Citation: Unit 42 DarkHydrus July 2018)(Citation: Unit 42 Playbook Dec 2017)| |mitre-attack|enterprise-attack|Windows|T1187|Forced Authentication| DarkHydrus used Template Injection to launch an authentication window for users to enter their credentials.(Citation: Unit 42 Phishery Aug 2018)| |mitre-attack|enterprise-attack|Windows|T1221|Template Injection| DarkHydrus used an open-source tool, Phishery, to inject malicious remote template URLs into Microsoft Word documents and then sent them to victims to enable Forced Authentication.(Citation: Unit 42 Phishery Aug 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|
DarkHydrus.md
3ce921051536-1
Forced Authentication.(Citation: Unit 42 Phishery Aug 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| DarkHydrus has sent malware that required users to hit the enable button in Microsoft Excel to allow an .iqy file to be downloaded.(Citation: Unit 42 DarkHydrus July 2018)(Citation: Unit 42 Playbook Dec 2017)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the “attachedTemplate” technique to load a template from a remote server.(Citation: Unit 42 DarkHydrus July 2018)(Citation: Unit 42 Phishery Aug 2018)(Citation: Unit 42 Playbook Dec 2017)|
DarkHydrus.md
62b0523cc059-0
DarkVishnya - G0105 Created: 2020-05-15T13:07:26.651Z Modified: 2021-10-12T22:10:04.107Z Contributors: Aliases DarkVishnya Description DarkVishnya is a financially motivated threat actor targeting financial institutions in Eastern Europe. In 2017-2018 the group attacked at least 8 banks in this region.(Citation: Securelist DarkVishnya Dec 2018) Techniques Used DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.(Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Containers,Network|T1046|Network Service Discovery| DarkVishnya performed port scanning to obtain the list of active services.(Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1110|Brute Force| DarkVishnya used brute-force attack to obtain login data.(Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network,IaaS|T1040|Network Sniffing| DarkVishnya used network sniffing to obtain login data. (Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1219|Remote Access Software| DarkVishnya used DameWare Mini Remote Control for lateral movement.(Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| DarkVishnya used PowerShell to create shellcode loaders.(Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|Windows|T1543.003|Windows Service|
DarkVishnya.md
62b0523cc059-1
DarkVishnya used PowerShell to create shellcode loaders.(Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|Windows|T1543.003|Windows Service| DarkVishnya created new services for shellcode loaders distribution.(Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1571|Non-Standard Port| DarkVishnya used ports 5190 and 7900 for shellcode listeners, and 4444, 4445, 31337 for shellcode C2.(Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1135|Network Share Discovery| DarkVishnya scanned the network for public shared folders.(Citation: Securelist DarkVishnya Dec 2018)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1200|Hardware Additions| DarkVishnya used Bash Bunny, Raspberry Pi, netbooks or inexpensive laptops to connect to the company’s local network.(Citation: Securelist DarkVishnya Dec 2018)|
DarkVishnya.md
57c90465ed5b-0
Dark Caracal - G0070 Created: 2018-10-17T00:14:20.652Z Modified: 2021-10-11T19:08:18.503Z Contributors: Aliases Dark Caracal Description Dark Caracal is threat group that has been attributed to the Lebanese General Directorate of General Security (GDGS) and has operated since at least 2012. (Citation: Lookout Dark Caracal Jan 2018) Techniques Used Dark Caracal's version of Bandook communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string “&&&”.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1059.003|Windows Command Shell| Dark Caracal has used macros in Word documents that would download a second stage if executed.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|macOS,Windows,Linux|T1027.002|Software Packing| Dark Caracal has used UPX to pack Bandook.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1113|Screen Capture| Dark Caracal took screenshots using their Windows malware.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| Dark Caracal leveraged a watering hole to serve up malicious code.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| Dark Caracal has obfuscated strings in
Dark_Caracal.md
57c90465ed5b-1
Dark Caracal has obfuscated strings in Bandook by base64 encoding, and then encrypting them.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Network|T1005|Data from Local System| Dark Caracal collected complete contents of the 'Pictures' folder from compromised Windows systems.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1204.002|Malicious File| Dark Caracal makes their malware look like Flash Player, Office, or PDF documents in order to entice a user to click on it.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| Dark Caracal's version of Bandook adds a registry key to Dark Caracal leveraged a compiled HTML file that contained a command to download and run an executable.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1566.003|Spearphishing via Service| Dark Caracal spearphished victims via Facebook and Whatsapp.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| Dark Caracal collected file listings of all default Windows directories.(Citation: Lookout Dark Caracal Jan 2018)| |mitre-attack|enterprise-attack,mobile-attack|Android,iOS|T1437.001|Web Protocols| Dark Caracal controls implants using standard HTTP communication.(Citation: Lookout Dark Caracal Jan 2018) |
Dark_Caracal.md
0259dc382812-0
Deep Panda - G0009 Created: 2017-05-31T21:31:49.412Z Modified: 2022-07-20T20:10:29.593Z Contributors: Andrew Smith, @jakx_ Aliases Deep Panda,Shell Crew,WebMasters,KungFu Kittens,PinkPanther,Black Vine Description Deep Panda is a suspected Chinese threat group known to target many industries, including government, defense, financial, and telecommunications. (Citation: Alperovitch 2014) The intrusion into healthcare company Anthem has been attributed to Deep Panda. (Citation: ThreatConnect Anthem) This group is also known as Shell Crew, WebMasters, KungFu Kittens, and PinkPanther. (Citation: RSA Shell Crew) Deep Panda also appears to be known as Black Vine based on the attribution of both group names to the Anthem intrusion. (Citation: Symantec Black Vine) Some analysts track Deep Panda and APT19 as the same group, but it is unclear from open source information if the groups are the same. (Citation: ICIT China's Espionage Jul 2016) Techniques Used Deep Panda has used PowerShell windows by setting the WindowStyle parameter to hidden. (Citation: Alperovitch 2014)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1018|Remote System Discovery| Deep Panda has used ping to identify other machines of interest.(Citation: Alperovitch 2014)| |mitre-attack|enterprise-attack|Windows|T1546.008|Accessibility Features| Deep Panda has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions.(Citation: RSA Shell Crew)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| Deep Panda has used PowerShell scripts to download and execute programs in memory, without writing to disk.(Citation: Alperovitch 2014)| |mitre-attack|enterprise-attack|Windows|T1021.002|SMB/Windows Admin Shares| Deep Panda uses net.exe to connect to network shares using
Deep_Panda.md
0259dc382812-1
Deep Panda uses net.exe to connect to network shares using Deep Panda uses Web shells on publicly accessible Web servers to access victim networks.(Citation: CrowdStrike Deep Panda Web Shells)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1057|Process Discovery| Deep Panda uses the Microsoft Tasklist utility to list processes running on systems.(Citation: Alperovitch 2014)| |mitre-attack|enterprise-attack|Windows|T1218.010|Regsvr32| Deep Panda has used regsvr32.exe to execute a server variant of Derusbi in victim networks.(Citation: RSA Shell Crew)| |mitre-attack|enterprise-attack|Windows|T1047|Windows Management Instrumentation|The Deep Panda group is known to utilize WMI for lateral movement.(Citation: Alperovitch 2014)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.005|Indicator Removal from Tools| Deep Panda has updated and modified its malware, resulting in different hash values that evade detection.(Citation: Symantec Black Vine)|
Deep_Panda.md
fa2738cf4875-0
Dragonfly - G0035 Created: 2017-05-31T21:32:05.217Z Modified: 2023-03-08T22:03:28.170Z Contributors: Dragos Threat Intelligence Aliases Dragonfly,TEMP.Isotope,DYMALLOY,Berserk Bear,TG-4192,Crouching Yeti,IRON LIBERTY,Energetic Bear Description Dragonfly is a cyber espionage group that has been attributed to Russia's Federal Security Service (FSB) Center 16.(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022) Active since at least 2010, Dragonfly has targeted defense and aviation companies, government entities, companies related to industrial control systems, and critical infrastructure sectors worldwide through supply chain, spearphishing, and drive-by compromise attacks.(Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Symantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Gigamon Berserk Bear October 2021)(Citation: CISA AA20-296A Berserk Bear December 2020)(Citation: Symantec Dragonfly 2.0 October 2017) Techniques Used Dragonfly has exploited a Windows Netlogon vulnerability (CVE-2020-1472) to obtain access to Windows Active Directory servers.(Citation: CISA AA20-296A Berserk Bear December 2020)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1583.001|Domains| Dragonfly has registered domains for targeting intended victims.(Citation: CISA AA20-296A Berserk Bear December 2020)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1595.002|Vulnerability Scanning|
Dragonfly.md
fa2738cf4875-1
Dragonfly has scanned targeted systems for vulnerable Citrix and Microsoft Exchange services.(Citation: CISA AA20-296A Berserk Bear December 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1110|Brute Force| Dragonfly has attempted to brute force credentials to gain access.(Citation: CISA AA20-296A Berserk Bear December 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application| Dragonfly has conducted SQL injection attacks, exploited vulnerabilities CVE-2019-19781 and CVE-2020-0688 for Citrix and MS Exchange, and CVE-2018-13379 for Fortinet VPNs.(Citation: CISA AA20-296A Berserk Bear December 2020)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1583.003|Virtual Private Server| Dragonfly has acquired VPS infrastructure for use in malicious campaigns.(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1584.004|Server| Dragonfly has compromised legitimate websites to host C2 and malware modules.(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1591.002|Business Relationships| Dragonfly has collected open source information to identify relationships between organizations for targeting purposes.(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| Dragonfly has exploited CVE-2011-0611 in Adobe Flash Player to gain execution on a targeted system.(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1608.004|Drive-by Target|
Dragonfly.md
fa2738cf4875-2
Dragonfly has compromised websites to redirect traffic and to host exploit kits.(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Dragonfly has sent emails with malicious attachments to gain initial access.(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1204.002|Malicious File| Dragonfly has used various forms of spearphishing in attempts to get users to open malicious attachments.(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| Dragonfly has compromised user credentials and used valid accounts for operations.(Citation: US-CERT TA18-074A)(Citation: Gigamon Berserk Bear October 2021)(Citation: CISA AA20-296A Berserk Bear December 2020)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery| Dragonfly used the command Dragonfly has injected SMB URLs into malicious Word spearphishing attachments to initiate Forced Authentication.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1113|Screen Capture| Dragonfly has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil).(Citation: US-CERT TA18-074A)(Citation: Symantec Dragonfly Sept 2017)(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell|
Dragonfly.md
fa2738cf4875-3
Dragonfly has commonly created Web shells on victims' publicly accessible email and web servers, which they used to maintain access to a victim network and download additional malicious files.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1016|System Network Configuration Discovery| Dragonfly has used batch scripts to enumerate network information, including information about trusts, zones, and the domain.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1018|Remote System Discovery| Dragonfly has likely obtained a list of hosts in the victim environment.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1053.005|Scheduled Task| Dragonfly has used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1012|Query Registry| Dragonfly has queried the Registry to identify victim information.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1069.002|Domain Groups| Dragonfly has used batch scripts to enumerate administrators and users in the domain.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1598.003|Spearphishing Link| Dragonfly has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1598.002|Spearphishing Attachment| Dragonfly has used spearphishing with Microsoft Office attachments to enable harvesting of user credentials.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1021.001|Remote Desktop Protocol|
Dragonfly.md
fa2738cf4875-4
Dragonfly has moved laterally via RDP.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|macOS,Windows,Linux|T1135|Network Share Discovery| Dragonfly has identified and browsed file servers in the victim network, sometimes , viewing files pertaining to ICS or Supervisory Control and Data Acquisition (SCADA) systems.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1003.002|Security Account Manager| Dragonfly has dropped and executed SecretsDump to dump password hashes.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1003.003|NTDS| Dragonfly has dropped and executed SecretsDump to dump password hashes. They also obtained ntds.dit from domain controllers.(Citation: US-CERT TA18-074A)(Citation: Core Security Impacket)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1003.004|LSA Secrets| Dragonfly has dropped and executed SecretsDump to dump password hashes.(Citation: US-CERT TA18-074A)(Citation: Core Security Impacket)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1070.001|Clear Windows Event Logs| Dragonfly has cleared Windows event logs and other logs produced by tools they used, including system, security, terminal services, remote services, and audit logs. The actors also deleted specific Registry keys.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1070.004|File Deletion| Dragonfly has deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer|
Dragonfly.md
fa2738cf4875-5
Dragonfly has copied and installed tools for operations once in the victim environment.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Containers|T1036|Masquerading| Dragonfly has created accounts disguised as legitimate backup and service accounts as well as an email administration account.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1112|Modify Registry| Dragonfly has modified the Registry to perform multiple techniques through the use of Reg.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|macOS,Windows,Linux|T1564.002|Hidden Users| Dragonfly has modified the Registry to hide created user accounts.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1562.004|Disable or Modify System Firewall| Dragonfly has disabled host-based firewalls. The group has also globally opened port 3389.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| Dragonfly has used a batch script to gather folder and file names from victim hosts.(Citation: US-CERT TA18-074A)(Citation: Gigamon Berserk Bear October 2021)(Citation: CISA AA20-296A Berserk Bear December 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1187|Forced Authentication| Dragonfly has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.(Citation: US-CERT TA18-074A)(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1136.001|Local Account|
Dragonfly.md
fa2738cf4875-6
Dragonfly has created accounts on victims, including administrator accounts, some of which appeared to be tailored to each individual staging target.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1005|Data from Local System| Dragonfly has collected data from local victim systems.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1074.001|Local Data Staging| Dragonfly has created a directory named "out" in the user's %AppData% folder and copied files to it.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Office 365,Windows,Google Workspace|T1114.002|Remote Email Collection| Dragonfly has accessed email accounts using Outlook Web Access.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| Dragonfly has used VPNs and Outlook Web Access (OWA) to maintain access to victim networks.(Citation: US-CERT TA18-074A)(Citation: CISA AA20-296A Berserk Bear December 2020)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1059.003|Windows Command Shell| Dragonfly has used various types of scripting to perform operations, including batch scripts.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS|T1059.006|Python| Dragonfly has used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1059.001|PowerShell|
Dragonfly.md
fa2738cf4875-7
Dragonfly has used PowerShell scripts for execution.(Citation: US-CERT TA18-074A)(Citation: Symantec Dragonfly Sept 2017)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network,Office 365,Azure AD,IaaS,Google Workspace|T1059|Command and Scripting Interpreter| Dragonfly has used the command line for execution.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Office 365,Azure AD,Network|T1110.002|Password Cracking| Dragonfly has dropped and executed tools used for password cracking, including Hydra and CrackMapExec.(Citation: US-CERT TA18-074A)(Citation: Kali Hydra)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1071|Application Layer Protocol| Dragonfly has used SMB for C2.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1560|Archive Collected Data| Dragonfly has compressed data into .zip files prior to exfiltration.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| Dragonfly has added the registry value ntdll to the Registry Run key to establish persistence.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Windows,Azure AD,Office 365,IaaS,Linux,macOS,Google Workspace,SaaS,Network|T1098|Account Manipulation| Dragonfly has added newly created accounts to the administrators group to maintain elevated access.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1087.002|Domain Account|
Dragonfly.md
fa2738cf4875-8
Dragonfly has used batch scripts to enumerate users on a victim domain controller.(Citation: US-CERT TA18-074A)| |mitre-attack|enterprise-attack,ics-attack|PRE|T1588.002|Tool| Dragonfly has obtained and used tools such as Mimikatz, CrackMapExec, and PsExec.(Citation: Secureworks IRON LIBERTY July 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1195.002|Compromise Software Supply Chain| Dragonfly has placed trojanized installers for control system software on legitimate vendor app stores.(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| Dragonfly has compromised targets via strategic web compromise (SWC) utilizing a custom exploit kit.(Citation: Secureworks IRON LIBERTY July 2019)(Citation: US-CERT TA18-074A)(Citation: Gigamon Berserk Bear October 2021)| |mitre-attack|enterprise-attack,ics-attack|None|T0817|Drive-by Compromise| Dragonfly utilized watering hole attacks on energy sector websites by injecting a redirect iframe to deliver Backdoor.Oldrea or Trojan.Karagany. (Citation: Symantec Security Response July 2014)| |mitre-attack|enterprise-attack,ics-attack|Control Server,Data Historian,Field Controller/RTU/PLC/IED,Human-Machine Interface,Input/Output Server,Safety Instrumented System/Protection Relay|T0862|Supply Chain Compromise| Dragonfly trojanized legitimate ICS equipment providers software packages available for download on their websites.(Citation: Symantec Security Response July 2014)|
Dragonfly.md
c629b1d2f543-0
Earth Lusca - G1006 Created: 2022-07-01T20:12:30.184Z Modified: 2022-10-17T19:51:56.531Z Contributors: Aliases Earth Lusca,TAG-22 Description Earth Lusca is a suspected China-based cyber espionage group that has been active since at least April 2019. Earth Lusca has targeted organizations in Australia, China, Hong Kong, Mongolia, Nepal, the Philippines, Taiwan, Thailand, Vietnam, the United Arab Emirates, Nigeria, Germany, France, and the United States. Targets included government institutions, news media outlets, gambling companies, educational institutions, COVID-19 research organizations, telecommunications companies, religious movements banned in China, and cryptocurrency trading platforms; security researchers assess some Earth Lusca operations may be financially motivated.(Citation: TrendMicro EarthLusca 2022) Earth Lusca has used malware commonly used by other Chinese threat groups, including APT41 and the Winnti Group cluster, however security researchers assess Earth Lusca's techniques and infrastructure are separate.(Citation: TrendMicro EarthLusca 2022) Techniques Used Earth Lusca adopted Cloudflare as a proxy for compromised servers.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows,macOS,Linux|T1059.005|Visual Basic| Earth Lusca used VBA scripts.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1204.002|Malicious File| Earth Lusca required users to click on a malicious file for the loader to activate.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1567.002|Exfiltration to Cloud Storage|
Earth_Lusca.md
c629b1d2f543-1
Earth Lusca has used the megacmd tool to upload stolen files from a victim network to MEGA.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,Windows,macOS|T1210|Exploitation of Remote Services| Earth Lusca has used Mimikatz to exploit a domain controller via the ZeroLogon exploit (CVE-2020-1472).(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1547.012|Print Processors| Earth Lusca has added the Registry key Earth Lusca has used PowerShell to execute commands.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows,macOS,Linux|T1007|System Service Discovery| Earth Lusca has used Tasklist to obtain information from a compromised host.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Network|T1057|Process Discovery| Earth Lusca has used Tasklist to obtain information from a compromised host.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1482|Domain Trust Discovery| Earth Lusca has used Nltest to obtain information about domain controllers.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,IaaS,Network|T1098.004|SSH Authorized Keys| Earth Lusca has dropped an SSH-authorized key in the Earth Lusca has acquired and used a variety of open source tools.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1588.001|Malware| Earth Lusca has acquired and used a variety of malware, including
Earth_Lusca.md
c629b1d2f543-2
Earth Lusca has acquired and used a variety of malware, including Cobalt Strike.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1583.006|Web Services| Earth Lusca has established GitHub accounts to host their malware.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1584.006|Web Services| Earth Lusca has compromised Google Drive repositories.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1608.001|Upload Malware| Earth Lusca has staged malware and malicious files on compromised web servers, GitHub, and Google Drive.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1583.001|Domains| Earth Lusca has registered domains, intended to look like legitimate target domains, that have been used in watering hole attacks.(Citation: TrendMicro EarthLusca 2022) | |mitre-attack|enterprise-attack,mobile-attack|PRE|T1584.004|Server| Earth Lusca has used compromised web servers as part of their operational infrastructure.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1583.004|Server| Earth Lusca has acquired multiple servers for some of their operations, using each server for a different role.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1027.003|Steganography| Earth Lusca has used steganography to hide shellcode in a BMP image file.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1204.001|Malicious Link|
Earth_Lusca.md
c629b1d2f543-3
Earth Lusca has sent spearphishing emails that required the user to click on a malicious link and subsequently open a decoy document with a malicious loader.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1047|Windows Management Instrumentation| Earth Lusca used a VBA script to execute WMI.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,Windows,macOS|T1059.006|Python| Earth Lusca used Python scripts for port scanning or building reverse shells.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1560.001|Archive via Utility| Earth Lusca has used WinRAR to compress stolen files into an archive prior to exfiltration.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1003.001|LSASS Memory| Earth Lusca has used ProcDump to obtain the hashes of credentials by dumping the memory of the LSASS process.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1003.006|DCSync| Earth Lusca has used a Mimikatz to retrieve credentials from an exploited controller.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1548.002|Bypass User Account Control| Earth Lusca has used the Fodhelper UAC bypass technique to gain elevated privileges.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| Earth Lusca used the command Earth Lusca used the command
Earth_Lusca.md
c629b1d2f543-4
Earth Lusca used the command Earth Lusca used the command Earth Lusca has also used multiple scanning tools to discover other machines within the same compromised network.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery| Earth Lusca employed a PowerShell script called RDPConnectionParser to read and filter the Windows event log “Microsoft-Windows-TerminalServices-RDPClient/Operational” (Event ID 1024) to obtain network information from RDP connections. Earth Lusca has also used netstat from a compromised system to obtain network connection information.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1574.002|DLL Side-Loading| Earth Lusca has placed a malicious payload in Earth Lusca modified the registry using the command Earth Lusca used the command Earth Lusca created a service using the command Earth Lusca used the command Earth Lusca collected information on user accounts via the Earth Lusca has compromised victims by directly exploiting vulnerabilities of public-facing servers, including those associated with Microsoft Exchange and Oracle GlassFish.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows,macOS,Linux|T1059.007|JavaScript| Earth Lusca has manipulated legitimate websites to inject malicious JavaScript code as part of their watering hole operations.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| Earth Lusca has sent spearphishing emails to potential targets that contained a malicious link.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information|
Earth_Lusca.md
c629b1d2f543-5
Earth Lusca used Base64 to encode strings.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|PRE|T1595.002|Vulnerability Scanning| Earth Lusca has scanned for vulnerabilities in the public-facing servers of their targets.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows|T1218.005|Mshta| Earth Lusca has used Earth Lusca has used certutil to decode a string into a cabinet file.(Citation: TrendMicro EarthLusca 2022)| |mitre-attack|enterprise-attack,mobile-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| Earth Lusca has performed watering hole attacks.(Citation: TrendMicro EarthLusca 2022)|
Earth_Lusca.md
291ad1eed5e2-0
Elderwood - G0066 Created: 2018-04-18T17:59:24.739Z Modified: 2021-03-02T22:40:11.097Z Contributors: Valerii Marchuk, Cybersecurity Help s.r.o. Aliases Elderwood,Elderwood Gang,Beijing Group,Sneaky Panda Description Elderwood is a suspected Chinese cyber espionage group that was reportedly responsible for the 2009 Google intrusion known as Operation Aurora. (Citation: Security Affairs Elderwood Sept 2012) The group has targeted defense organizations, supply chain manufacturers, human rights and nongovernmental organizations (NGOs), and IT service providers. (Citation: Symantec Elderwood Sept 2012) (Citation: CSM Elderwood Sept 2012) Techniques Used Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links.(Citation: Symantec Elderwood Sept 2012)(Citation: CSM Elderwood Sept 2012)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| Elderwood has used exploitation of endpoint software, including Microsoft Internet Explorer Adobe Flash vulnerabilities, to gain execution. They have also used zero-day exploits.(Citation: Symantec Elderwood Sept 2012)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer|The Ritsol backdoor trojan used by Elderwood can download files onto a compromised host from a remote location.(Citation: Symantec Ristol May 2012)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1027.002|Software Packing| Elderwood has packed malware payloads before delivery to victims.(Citation: Symantec Elderwood Sept 2012)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information|
Elderwood.md
291ad1eed5e2-1
Elderwood has encrypted documents and malicious executables.(Citation: Symantec Elderwood Sept 2012)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments.(Citation: Symantec Elderwood Sept 2012)(Citation: CSM Elderwood Sept 2012)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server.(Citation: Symantec Elderwood Sept 2012)(Citation: CSM Elderwood Sept 2012)| |mitre-attack|enterprise-attack|Windows,Linux,macOS,SaaS|T1189|Drive-by Compromise| Elderwood has delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector.(Citation: Symantec Elderwood Sept 2012)(Citation: CSM Elderwood Sept 2012)(Citation: Security Affairs Elderwood Sept 2012)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.(Citation: Symantec Elderwood Sept 2012)(Citation: CSM Elderwood Sept 2012)|
Elderwood.md
cef18a5fb495-0
Ember Bear - G1003 Created: 2022-06-09T14:49:57.704Z Modified: 2023-03-22T03:40:53.311Z Contributors: Hannah Simes, BT Security Aliases Ember Bear,Saint Bear,UNC2589,UAC-0056,Lorec53,Lorec Bear,Bleeding Bear Description Ember Bear is a suspected Russian state-sponsored cyber espionage group that has been active since at least March 2021. Ember Bear has primarily focused their operations against Ukraine and Georgia, but has also targeted Western European and North American foreign ministries, pharmaceutical companies, and financial sector organizations. Security researchers assess Ember Bear likely conducted the WhisperGate destructive wiper attacks against Ukraine in early 2022.(Citation: CrowdStrike Ember Bear Profile March 2022)(Citation: Mandiant UNC2589 March 2022)(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) Techniques Used Ember Bear has obfuscated malicious scripts to help avoid detection.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|PRE|T1588.003|Code Signing Certificates| Ember Bear has stolen legitimate certificates to sign malicious payloads.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Windows|T1218.002|Control Panel| Ember Bear has used control panel files (CPL), delivered via e-mail, for execution.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| Ember Bear has used tools to download malicious code.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|macOS,Windows|T1553.002|Code Signing| Ember Bear has used stolen certificates from Electrum Technologies GmbH to sign payloads.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Windows|T1112|Modify Registry|
Ember_Bear.md
cef18a5fb495-1
Ember Bear has used an open source batch script to modify Windows Defender registry keys.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027.001|Binary Padding| Ember Bear has added extra spaces between JavaScript code characters to increase the overall file size.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|PRE|T1588.002|Tool| Ember Bear has obtained and used open source scripts from GitHub.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) | |mitre-attack|enterprise-attack|Windows,macOS,Linux,Containers,IaaS|T1562.001|Disable or Modify Tools| Ember Bear has executed a batch script designed to disable Windows Defender on a compromised host.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| Ember Bear has obfuscated malware to help avoid detection.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1027.002|Software Packing| Ember Bear has packed malware to help avoid detection.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102|Web Service| Ember Bear has used Discord's content delivery network (CDN) to deliver malware and malicious scripts to a compromised host.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| Ember Bear had used Ember Bear has used PowerShell to download and execute malicious code.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution|
Ember_Bear.md
cef18a5fb495-2
Ember Bear has exploited Microsoft Office vulnerability CVE-2017-11882.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.007|JavaScript| Ember Bear has used JavaScript to execute malicious code on a victim's machine.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| Ember Bear has sent spearphishing emails containing malicious links.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link| Ember Bear has attempted to lure users to click on a malicious link within a spearphishing email.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| Ember Bear has attempted to lure victims into executing malicious files.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Ember Bear has sent spearphishing emails containing malicious attachments in the form of PDFs, Word documents, JavaScript files, and Control Panel File (CPL) executables.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) |
Ember_Bear.md
4d23dc3fbd85-0
Equation - G0020 Created: 2017-05-31T21:31:54.697Z Modified: 2020-06-29T01:39:22.044Z Contributors: Aliases Equation Description Equation is a sophisticated threat group that employs multiple remote access tools. The group is known to use zero-day exploits and has developed the capability to overwrite the firmware of hard disk drives. (Citation: Kaspersky Equation QA) Techniques Used |Matrix|Domain|Platform|Technique ID|Technique Name|Use| | :---| :---| :---| :---| :---| :---| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1564.005|Hidden File System|Equation has used an encrypted virtual file system stored in the Windows Registry.(Citation: Kaspersky Equation QA)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1542.002|Component Firmware|Equation is known to have the capability to overwrite the firmware on hard drives from some manufacturers.(Citation: Kaspersky Equation QA) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1480.001|Environmental Keying|Equation has been observed utilizing environmental keying in payload delivery.(Citation: Kaspersky Gauss Whitepaper)(Citation: Kaspersky Equation QA)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1120|Peripheral Device Discovery|Equation has used tools with the functionality to search for specific information about the attached hard drive that could be used to identify and overwrite the firmware.(Citation: Kaspersky Equation QA)|
Equation.md
d592eb129034-0
Evilnum - G0120 Created: 2021-01-22T16:46:17.790Z Modified: 2021-04-27T19:55:58.323Z Contributors: Aliases Evilnum Description Evilnum is a financially motivated threat group that has been active since at least 2018.(Citation: ESET EvilNum July 2020) Techniques Used Evilnum can deploy additional components or tools as needed.(Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1219|Remote Access Software| EVILNUM has used the malware variant, TerraTV, to run a legitimate TeamViewer application to connect to compromrised machines.(Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Windows|T1574.001|DLL Search Order Hijacking| Evilnum has used the malware variant, TerraTV, to load a malicious DLL placed in the TeamViewer directory, instead of the original Windows DLL located in a system folder.(Citation: ESET EvilNum July 2020) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1497.001|System Checks| Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments. (Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Windows|T1548.002|Bypass User Account Control| Evilnum has used PowerShell to bypass UAC.(Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| Evilnum has deleted files used during infection.(Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.007|JavaScript|
Evilnum.md
d592eb129034-1
Evilnum has deleted files used during infection.(Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.007|JavaScript| Evilnum has used malicious JavaScript files on the victim's machine.(Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1555|Credentials from Password Stores| Evilnum can collect email credentials from victims.(Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link| Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file.(Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| Evilnum has sent spearphishing emails containing a link to a zip file hosted on Google Drive.(Citation: ESET EvilNum July 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1539|Steal Web Session Cookie| Evilnum can steal cookies and session information from browsers.(Citation: ESET EvilNum July 2020)|
Evilnum.md
15aa61326786-0
EXOTIC LILY - G1011 Created: 2022-08-18T15:25:59.689Z Modified: 2022-10-24T18:48:18.917Z Contributors: Phill Taylor, BT Security Aliases EXOTIC LILY Description EXOTIC LILY is a financially motivated group that has been closely linked with Wizard Spider and the deployment of ransomware including Conti and Diavol. EXOTIC LILY may be acting as an initial access broker for other malicious actors, and has targeted a wide range of industries including IT, cybersecurity, and healthcare since at least September 2021.(Citation: Google EXOTIC LILY March 2022) Techniques Used EXOTIC LILY conducted an e-mail thread-hijacking campaign with malicious ISO attachments.(Citation: Google EXOTIC LILY March 2022)(Citation: Proofpoint Bumblebee April 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.001|Malicious Link| EXOTIC LILY has used malicious links to lure users into executing malicious payloads.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1566.003|Spearphishing via Service| EXOTIC LILY has used the e-mail notification features of legitimate file sharing services for spearphishing.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|PRE|T1597|Search Closed Sources| EXOTIC LILY has searched for information on targeted individuals on business databases including RocketReach and CrunchBase.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|PRE|T1593.001|Social Media| EXOTIC LILY has copied data from social media sites to impersonate targeted individuals.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|PRE|T1585.001|Social Media Accounts|
EXOTIC_LILY.md
15aa61326786-1
EXOTIC LILY has established social media profiles to mimic employees of targeted companies.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|PRE|T1608.001|Upload Malware| EXOTIC LILY has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|PRE|T1594|Search Victim-Owned Websites| EXOTIC LILY has used contact forms on victim websites to generate phishing e-mails.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|PRE|T1589.002|Email Addresses| EXOTIC LILY has gathered targeted individuals' e-mail addresses through open source research and website contact forms.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|PRE|T1585.002|Email Accounts| EXOTIC LILY has created e-mail accounts to spoof targeted organizations.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|PRE|T1583.001|Domains| EXOTIC LILY has registered domains to spoof targeted organizations by changing the top-level domain (TLD) to “.us”, “.co” or “.biz”.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102|Web Service| EXOTIC LILY has used file-sharing services including WeTransfer, TransferNow, and OneDrive to deliver payloads.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link|
EXOTIC_LILY.md
15aa61326786-2
EXOTIC LILY has relied on victims to open malicious links in e-mails for execution.(Citation: Google EXOTIC LILY March 2022)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| EXOTIC LILY has gained execution through victims clicking on malicious LNK files contained within ISO files, which can execute hidden DLLs within the ISO.(Citation: Google EXOTIC LILY March 2022)(Citation: Proofpoint Bumblebee April 2022)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| EXOTIC LILY has used malicious documents containing exploits for CVE-2021-40444 affecting Microsoft MSHTML.(Citation: Google EXOTIC LILY March 2022)|
EXOTIC_LILY.md
e38d323612a7-0
Ferocious Kitten - G0137 Created: 2021-09-28T17:41:12.950Z Modified: 2021-10-25T14:28:10.337Z Contributors: Pooja Natarajan, NEC Corporation India,Manikantan Srinivasan, NEC Corporation India,Hiroki Nagahama, NEC Corporation Aliases Ferocious Kitten Description Ferocious Kitten is a threat group that has primarily targeted Persian-speaking individuals in Iran since at least 2015.(Citation: Kaspersky Ferocious Kitten Jun 2021) Techniques Used Ferocious Kitten has obtained open source tools for its operations, including JsonCPP and Psiphon.(Citation: Kaspersky Ferocious Kitten Jun 2021)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| Ferocious Kitten has conducted spearphishing campaigns containing malicious documents to lure victims to open the attachments.(Citation: Kaspersky Ferocious Kitten Jun 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1036.005|Match Legitimate Name or Location| Ferocious Kitten has named malicious files Ferocious Kitten has used right-to-left override to reverse executables’ names to make them appear to have different file extensions, rather than their real ones.(Citation: Kaspersky Ferocious Kitten Jun 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| Ferocious Kitten has attempted to convince victims to enable malicious content within a spearphishing email by including an odd decoy message.(Citation: Kaspersky Ferocious Kitten Jun 2021)| |mitre-attack|enterprise-attack|PRE|T1583.001|Domains| Ferocious Kitten has acquired domains imitating legitimate sites.(Citation: Kaspersky Ferocious Kitten Jun 2021)|
Ferocious_Kitten.md
99ce417f05b9-0
FIN10 - G0051 Created: 2017-12-14T16:46:06.044Z Modified: 2021-05-26T12:35:39.400Z Contributors: Aliases FIN10 Description FIN10 is a financially motivated threat group that has targeted organizations in North America since at least 2013 through 2016. The group uses stolen data exfiltrated from victims to extort organizations. (Citation: FireEye FIN10 June 2017) Techniques Used FIN10 has relied on publicly-available software to gain footholds and establish persistence in victim environments.(Citation: FireEye FIN10 June 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Containers|T1078.003|Local Accounts| FIN10 has moved laterally using the Local Administrator account.(Citation: FireEye FIN10 June 2017)| |mitre-attack|enterprise-attack|Windows|T1053.005|Scheduled Task| FIN10 has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire.(Citation: FireEye FIN10 June 2017)(Citation: Github PowerShell Empire)| |mitre-attack|enterprise-attack|Windows|T1059.001|PowerShell| FIN10 uses PowerShell for execution as well as PowerShell Empire to establish persistence.(Citation: FireEye FIN10 June 2017)(Citation: Github PowerShell Empire)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| FIN10 has used batch scripts and scheduled tasks to delete critical system files.(Citation: FireEye FIN10 June 2017)| |mitre-attack|enterprise-attack|Windows|T1547.001|Registry Run Keys / Startup Folder| FIN10 has established persistence by using the Registry option in PowerShell Empire to add a Run key.(Citation: FireEye FIN10 June 2017)(Citation: Github PowerShell Empire)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts|
FIN10.md
99ce417f05b9-1
FIN10 has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor.(Citation: FireEye FIN10 June 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1570|Lateral Tool Transfer| FIN10 has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally.(Citation: FireEye FIN10 June 2017)| |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol| FIN10 has used RDP to move laterally to systems in the victim environment.(Citation: FireEye FIN10 June 2017)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| FIN10 has executed malicious .bat files containing PowerShell commands.(Citation: FireEye FIN10 June 2017)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1033|System Owner/User Discovery| FIN10 has used Meterpreter to enumerate users on remote systems.(Citation: FireEye FIN10 June 2017)|
FIN10.md
3d04ca35ddd6-0
FIN4 - G0085 Created: 2019-01-31T02:01:45.129Z Modified: 2023-02-01T21:27:44.778Z Contributors: Aliases FIN4 Description FIN4 is a financially-motivated threat group that has targeted confidential information related to the public financial market, particularly regarding healthcare and pharmaceutical companies, since at least 2013.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye FIN4 Stealing Insider NOV 2014) FIN4 is unique in that they do not infect victims with typical persistent malware, but rather they focus on capturing credentials authorized to access email and other non-public correspondence.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014) Techniques Used FIN4 has lured victims to click malicious links delivered via spearphishing emails (often sent from compromised accounts).(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)| |mitre-attack|enterprise-attack|Windows,Office 365,Linux,macOS,Google Workspace|T1564.008|Email Hiding Rules| FIN4 has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such as “hacked," "phish," and “malware" in a likely attempt to prevent organizations from communicating about their activities.(Citation: FireEye Hacking FIN4 Dec 2014)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| FIN4 has used spearphishing emails containing attachments (which are often stolen, legitimate documents sent from compromised accounts) with embedded malicious macros.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|
FIN4.md
3d04ca35ddd6-1
FIN4 has lured victims to launch malicious attachments delivered via spearphishing emails (often sent from compromised accounts).(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic| FIN4 has used VBA macros to display a dialog box and collect victim credentials.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)| |mitre-attack|enterprise-attack|Windows,macOS,Linux,Network|T1056.001|Keylogging| FIN4 has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)| |mitre-attack|enterprise-attack|macOS,Windows,Linux|T1056.002|GUI Input Capture| FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| FIN4 has used spearphishing emails (often sent from compromised accounts) containing malicious links.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)| |mitre-attack|enterprise-attack|Office 365,Windows,Google Workspace|T1114.002|Remote Email Collection| FIN4 has accessed and hijacked online email communications using stolen credentials.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1090.003|Multi-hop Proxy|
FIN4.md
3d04ca35ddd6-2
FIN4 has used Tor to log in to victims' email accounts.(Citation: FireEye Hacking FIN4 Dec 2014)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| FIN4 has used legitimate credentials to hijack email communications.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| FIN4 has used HTTP POST requests to transmit data.(Citation: FireEye Hacking FIN4 Dec 2014)(Citation: FireEye Hacking FIN4 Video Dec 2014)|
FIN4.md
d2e0e1c26b1d-0
FIN5 - G0053 Created: 2018-01-16T16:13:52.465Z Modified: 2021-10-16T19:48:37.809Z Contributors: Walker Johnson Aliases FIN5 Description FIN5 is a financially motivated threat group that has targeted personally identifiable information and payment card information. The group has been active since at least 2008 and has targeted the restaurant, gaming, and hotel industries. The group is made up of actors who likely speak Russian. (Citation: FireEye Respond Webinar July 2017) (Citation: Mandiant FIN5 GrrCON Oct 2016) (Citation: DarkReading FireEye FIN5 Oct 2015) Techniques Used FIN5 has obtained and used a customized version of PsExec, as well as use other tools such as pwdump, SDelete, and Windows Credential Editor.(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1074.001|Local Data Staging| FIN5 scripts save memory dump data into a specific directory on hosts in the victim environment.(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1070.004|File Deletion| FIN5 uses SDelete to clean up the environment and attempt to prevent detection.(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| FIN5 has used legitimate VPN, Citrix, or VNC credentials to maintain access to a victim environment.(Citation: FireEye Respond Webinar July 2017)(Citation: DarkReading FireEye FIN5 Oct 2015)(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network,Office 365,Azure AD,IaaS,Google Workspace|T1059|Command and Scripting Interpreter|
FIN5.md
d2e0e1c26b1d-1
FIN5 scans processes on all victim systems in the environment and uses automated scripts to pull back the results.(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1018|Remote System Discovery| FIN5 has used the open source tool Essential NetTools to map the network and build a list of targets.(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts| FIN5 has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment.(Citation: FireEye Respond Webinar July 2017)(Citation: DarkReading FireEye FIN5 Oct 2015)(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,IaaS,SaaS|T1119|Automated Collection| FIN5 scans processes on all victim systems in the environment and uses automated scripts to pull back the results.(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1090.002|External Proxy| FIN5 maintains access to victim environments by using FLIPSIDE to create a proxy for a backup RDP tunnel.(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1110|Brute Force| FIN5 has has used the tool GET2 Penetrator to look for remote login and hard-coded credentials.(Citation: DarkReading FireEye FIN5 Oct 2015)(Citation: Mandiant FIN5 GrrCON Oct 2016)| |mitre-attack|enterprise-attack|Windows|T1070.001|Clear Windows Event Logs| FIN5 has cleared event logs from victims.(Citation: Mandiant FIN5 GrrCON Oct 2016)|
FIN5.md
9d1ad4ec8c47-0
FIN6 - G0037 Created: 2017-05-31T21:32:06.015Z Modified: 2023-03-22T03:50:17.471Z Contributors: Center for Threat-Informed Defense (CTID),Drew Church, Splunk Aliases FIN6,Magecart Group 6,ITG08,Skeleton Spider Description FIN6 is a cyber crime group that has stolen payment card data and sold it for profit on underground marketplaces. This group has aggressively targeted and compromised point of sale (PoS) systems in the hospitality and retail sectors.(Citation: FireEye FIN6 April 2016)(Citation: FireEye FIN6 Apr 2019) Techniques Used FIN6 has obtained and used tools such as Mimikatz, Cobalt Strike, and AdFind.(Citation: Security Intelligence More Eggs Aug 2019)(Citation: FireEye FIN6 Apr 2019)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1059.003|Windows Command Shell| FIN6 has used FIN6 has used Metasploit Bind and Reverse TCP stagers.(Citation: Trend Micro FIN6 October 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS,SaaS,Office 365,Google Workspace,IaaS|T1213|Data from Information Repositories| FIN6 has collected schemas and user accounts from systems running SQL Server.(Citation: Visa FIN6 Feb 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1048.003|Exfiltration Over Unencrypted Non-C2 Protocol| FIN6 has sent stolen payment card data to remote servers via HTTP POSTs.(Citation: Trend Micro FIN6 October 2019)| |mitre-attack|enterprise-attack,ics-attack|Windows,macOS,Linux|T1059.007|JavaScript| FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.(Citation: Trend Micro FIN6 October 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1070.004|File Deletion|
FIN6.md
9d1ad4ec8c47-1
FIN6 has removed files from victim machines.(Citation: FireEye FIN6 April 2016)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1027.010|Command Obfuscation| FIN6 has used encoded PowerShell commands.(Citation: Visa FIN6 Feb 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1555|Credentials from Password Stores| FIN6 has used the Stealer One credential stealer to target e-mail and file transfer utilities including FTP.(Citation: Visa FIN6 Feb 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1555.003|Credentials from Web Browsers| FIN6 has used the Stealer One credential stealer to target web browsers.(Citation: Visa FIN6 Feb 2019)| |mitre-attack|enterprise-attack,ics-attack|macOS,Windows,Linux|T1566.001|Spearphishing Attachment| FIN6 has targeted victims with e-mails containing malicious attachments.(Citation: Visa FIN6 Feb 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1204.002|Malicious File| FIN6 has used malicious documents to lure victims into allowing execution of PowerShell scripts.(Citation: Visa FIN6 Feb 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Network|T1005|Data from Local System| FIN6 has collected and exfiltrated payment card data from compromised systems.(Citation: Trend Micro FIN6 October 2019)(Citation: RiskIQ British Airways September 2018)(Citation: RiskIQ Newegg September 2018)| |mitre-attack|enterprise-attack,ics-attack|Windows,macOS,Linux,Containers,IaaS|T1562.001|Disable or Modify Tools| FIN6 has deployed a utility script named
FIN6.md
9d1ad4ec8c47-2
FIN6 has deployed a utility script named FIN6 has used has used Metasploit’s named-pipe impersonation technique to escalate privileges.(Citation: FireEye FIN6 Apr 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,Office 365,Azure AD,Network|T1110.002|Password Cracking| FIN6 has extracted password hashes from ntds.dit to crack offline.(Citation: FireEye FIN6 April 2016)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1003.003|NTDS| FIN6 has used Metasploit’s PsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database.(Citation: FireEye FIN6 April 2016)(Citation: FireEye FIN6 Apr 2019) | |mitre-attack|enterprise-attack,ics-attack|Windows,IaaS,Linux,macOS|T1074.002|Remote Data Staging| FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration.(Citation: FireEye FIN6 April 2016)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1566.003|Spearphishing via Service| FIN6 has used fake job advertisements sent via LinkedIn to spearphish targets.(Citation: Security Intelligence More Eggs Aug 2019)| |mitre-attack|enterprise-attack,ics-attack|Windows|T1047|Windows Management Instrumentation| FIN6 has used WMI to automate the remote execution of PowerShell scripts.(Citation: Security Intelligence More Eggs Aug 2019) | |mitre-attack|enterprise-attack,ics-attack|macOS,Windows|T1553.002|Code Signing| FIN6 has used Comodo code-signing certificates.(Citation: Security Intelligence More Eggs Aug 2019) | |mitre-attack|enterprise-attack,ics-attack|Windows|T1569.002|Service Execution|
FIN6.md
9d1ad4ec8c47-3
FIN6 has used Comodo code-signing certificates.(Citation: Security Intelligence More Eggs Aug 2019) | |mitre-attack|enterprise-attack,ics-attack|Windows|T1569.002|Service Execution| FIN6 has created Windows services to execute encoded PowerShell commands.(Citation: FireEye FIN6 Apr 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1102|Web Service| FIN6 has used Pastebin and Google Storage to host content for their operations.(Citation: FireEye FIN6 Apr 2019) FIN6 has renamed the "psexec" service name to "mstdc" to masquerade as a legitimate Windows service.(Citation: FireEye FIN6 Apr 2019) | |mitre-attack|enterprise-attack,ics-attack|Windows|T1021.001|Remote Desktop Protocol| FIN6 used RDP to move laterally in victim networks.(Citation: FireEye FIN6 April 2016)(Citation: FireEye FIN6 Apr 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1572|Protocol Tunneling| FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.(Citation: FireEye FIN6 April 2016)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows,IaaS,SaaS|T1119|Automated Collection| FIN6 has used a script to iterate through a list of compromised PoS systems, copy and remove data to a log file, and to bind to events from the submit payment button.(Citation: FireEye FIN6 April 2016)(Citation: Trend Micro FIN6 October 2019)| |mitre-attack|enterprise-attack,ics-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace,Containers,Network|T1078|Valid Accounts|To move laterally on a victim network,
FIN6.md