APT18
Associated Group Descriptions |
|
Name | Description |
---|---|
TG-0416 | (Citation: ThreatStream Evasion Analysis)(Citation: Anomali Evasive Maneuvers July 2015) |
Dynamite Panda | (Citation: ThreatStream Evasion Analysis)(Citation: Anomali Evasive Maneuvers July 2015) |
Threat Group-0416 | (Citation: ThreatStream Evasion Analysis) |
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
APT18 uses HTTP for C2 communications.(Citation: PaloAlto DNS Requests May 2016) |
.004 | Application Layer Protocol: DNS |
APT18 uses DNS for C2 communications.(Citation: PaloAlto DNS Requests May 2016) |
||
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
APT18 establishes persistence via the |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
APT18 uses cmd.exe to execute commands on the victim’s machine.(Citation: PaloAlto DNS Requests May 2016)(Citation: Anomali Evasive Maneuvers July 2015) |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
APT18 actors deleted tools and batch files from victim systems.(Citation: Dell Lateral Movement) |
Enterprise | T1053 | .002 | Scheduled Task/Job: At |
APT18 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network.(Citation: Dell Lateral Movement) |
References
- Grunzweig, J., et al. (2016, May 24). New Wekby Attacks Use DNS Requests As Command and Control Mechanism. Retrieved November 15, 2018.
- Shelmire, A. (2015, July 06). Evasive Maneuvers by the Wekby group with custom ROP-packing and DNS covert channels. Retrieved November 15, 2018.
- Adair, S. (2017, February 17). Detecting and Responding to Advanced Threats within Exchange Environments. Retrieved March 20, 2017.
- Carvey, H.. (2014, September 2). Where you AT?: Indicators of lateral movement using at.exe on Windows 7 systems. Retrieved January 25, 2016.
- Shelmire, A.. (2015, July 6). Evasive Maneuvers. Retrieved January 22, 2016.
- Grunzweig, J., et al. (2016, May 24). New Wekby Attacks Use DNS Requests As Command and Control Mechanism. Retrieved August 17, 2016.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.