Leafminer
Associated Group Descriptions |
|
Name | Description |
---|---|
Raspite | (Citation: Dragos Raspite Aug 2018) |
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1110 | .003 | Brute Force: Password Spraying |
Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying.(Citation: Symantec Leafminer July 2018) |
Enterprise | T1059 | .007 | Command and Scripting Interpreter: JavaScript |
Leafminer infected victims using JavaScript code.(Citation: Symantec Leafminer July 2018) |
Enterprise | T1136 | .001 | Create Account: Local Account |
Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine.(Citation: Symantec Leafminer July 2018) |
Enterprise | T1555 | .003 | Credentials from Password Stores: Credentials from Web Browsers |
Leafminer used several tools for retrieving login and password information, including LaZagne.(Citation: Symantec Leafminer July 2018) |
Enterprise | T1114 | .002 | Email Collection: Remote Email Collection |
Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords.(Citation: Symantec Leafminer July 2018) |
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz.(Citation: Symantec Leafminer July 2018) |
.004 | OS Credential Dumping: LSA Secrets |
Leafminer used several tools for retrieving login and password information, including LaZagne.(Citation: Symantec Leafminer July 2018) |
||
.005 | OS Credential Dumping: Cached Domain Credentials |
Leafminer used several tools for retrieving login and password information, including LaZagne.(Citation: Symantec Leafminer July 2018) |
||
Enterprise | T1027 | .010 | Obfuscated Files or Information: Command Obfuscation |
Leafminer obfuscated scripts that were used on victim machines.(Citation: Symantec Leafminer July 2018) |
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.(Citation: Symantec Leafminer July 2018) |
Enterprise | T1055 | .013 | Process Injection: Process Doppelgänging |
Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems.(Citation: Symantec Leafminer July 2018) |
Enterprise | T1552 | .001 | Unsecured Credentials: Credentials In Files |
Leafminer used several tools for retrieving login and password information, including LaZagne.(Citation: Symantec Leafminer July 2018) |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.