Leafminer
                                        Associated Group Descriptions | 
                                |
| Name | Description | 
|---|---|
| Raspite | (Citation: Dragos Raspite Aug 2018) | 
                                        Techniques Used | 
                                ||||
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1110 | .003 | Brute Force: Password Spraying | 
                                                 Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying.(Citation: Symantec Leafminer July 2018)  | 
                                        
| Enterprise | T1059 | .007 | Command and Scripting Interpreter: JavaScript | 
                                                 Leafminer infected victims using JavaScript code.(Citation: Symantec Leafminer July 2018)  | 
                                        
| Enterprise | T1136 | .001 | Create Account: Local Account | 
                                                 Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine.(Citation: Symantec Leafminer July 2018)  | 
                                        
| Enterprise | T1555 | .003 | Credentials from Password Stores: Credentials from Web Browsers | 
                                                 Leafminer used several tools for retrieving login and password information, including LaZagne.(Citation: Symantec Leafminer July 2018)  | 
                                        
| Enterprise | T1114 | .002 | Email Collection: Remote Email Collection | 
                                                 Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords.(Citation: Symantec Leafminer July 2018)  | 
                                        
| Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory | 
                                                 Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz.(Citation: Symantec Leafminer July 2018)  | 
                                        
| .004 | OS Credential Dumping: LSA Secrets | 
                                                         Leafminer used several tools for retrieving login and password information, including LaZagne.(Citation: Symantec Leafminer July 2018)  | 
                                                ||
| .005 | OS Credential Dumping: Cached Domain Credentials | 
                                                         Leafminer used several tools for retrieving login and password information, including LaZagne.(Citation: Symantec Leafminer July 2018)  | 
                                                ||
| Enterprise | T1027 | .010 | Obfuscated Files or Information: Command Obfuscation | 
                                                 Leafminer obfuscated scripts that were used on victim machines.(Citation: Symantec Leafminer July 2018)  | 
                                        
| Enterprise | T1588 | .002 | Obtain Capabilities: Tool | 
                                                 Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.(Citation: Symantec Leafminer July 2018)  | 
                                        
| Enterprise | T1055 | .013 | Process Injection: Process Doppelgänging | 
                                                 Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems.(Citation: Symantec Leafminer July 2018)  | 
                                        
| Enterprise | T1552 | .001 | Unsecured Credentials: Credentials In Files | 
                                                 Leafminer used several tools for retrieving login and password information, including LaZagne.(Citation: Symantec Leafminer July 2018)  | 
                                        
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.