Rancor
Associated Group Descriptions |
|
Name | Description |
---|---|
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Rancor has used HTTP for C2.(Citation: Rancor Unit42 June 2018) |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
Rancor has used cmd.exe to execute commmands.(Citation: Rancor Unit42 June 2018) |
.005 | Command and Scripting Interpreter: Visual Basic |
Rancor has used VBS scripts as well as embedded macros for execution.(Citation: Rancor Unit42 June 2018) |
||
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
Rancor has attached a malicious document to an email to gain initial access.(Citation: Rancor Unit42 June 2018) |
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
Rancor launched a scheduled task to gain persistence using the |
Enterprise | T1218 | .007 | System Binary Proxy Execution: Msiexec |
Rancor has used |
Enterprise | T1204 | .002 | User Execution: Malicious File |
Rancor attempted to get users to click on an embedded macro within a Microsoft Office Excel document to launch their malware.(Citation: Rancor Unit42 June 2018) |
Software |
|||
ID | Name | References | Techniques |
---|---|---|---|
S0160 | certutil | (Citation: Rancor Unit42 June 2018) (Citation: TechNet Certutil) | Install Root Certificate, Deobfuscate/Decode Files or Information, Ingress Tool Transfer |
S0254 | PLAINTEE | (Citation: Rancor Unit42 June 2018) | Custom Command and Control Protocol, System Information Discovery, Modify Registry, System Network Configuration Discovery, Bypass User Account Control, Process Discovery, Registry Run Keys / Startup Folder, Symmetric Cryptography, Windows Command Shell, Ingress Tool Transfer |
S0075 | Reg | (Citation: Microsoft Reg) (Citation: Rancor Unit42 June 2018) (Citation: Windows Commands JPCERT) | Credentials in Registry, Query Registry, Modify Registry |
S0255 | DDKONG | (Citation: Rancor Unit42 June 2018) | Ingress Tool Transfer, Deobfuscate/Decode Files or Information, Rundll32, Custom Command and Control Protocol, File and Directory Discovery |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.