Indrik Spider
Associated Group Descriptions |
|
Name | Description |
---|---|
Evil Corp | (Citation: Crowdstrike EvilCorp March 2021)(Citation: Treasury EvilCorp Dec 2019) |
UNC2165 | (Citation: Mandiant_UNC2165) |
Manatee Tempest | (Citation: Microsoft Threat Actor Naming July 2023) |
DEV-0243 | (Citation: Microsoft Threat Actor Naming July 2023) |
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Indrik Spider has used PowerShell Empire for execution of malware.(Citation: Crowdstrike Indrik November 2018)(Citation: Symantec WastedLocker June 2020) |
.003 | Command and Scripting Interpreter: Windows Command Shell |
Indrik Spider has used batch scripts on victim's machines.(Citation: Crowdstrike Indrik November 2018)(Citation: Mandiant_UNC2165) |
||
.007 | Command and Scripting Interpreter: JavaScript |
Indrik Spider has used malicious JavaScript files for several components of their attack.(Citation: Symantec WastedLocker June 2020) |
||
Enterprise | T1584 | .004 | Compromise Infrastructure: Server |
Indrik Spider has served fake updates via legitimate websites that have been compromised.(Citation: Crowdstrike Indrik November 2018) |
Enterprise | T1136 | .001 | Create Account: Local Account |
Indrik Spider has created local system accounts and has added the accounts to privileged groups.(Citation: Mandiant_UNC2165) |
Enterprise | T1555 | .005 | Credentials from Password Stores: Password Managers |
Indrik Spider has accessed and exported passwords from password managers.(Citation: Mandiant_UNC2165) |
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
Indrik Spider has stored collected data in a .tmp file.(Citation: Symantec WastedLocker June 2020) |
Enterprise | T1587 | .001 | Develop Capabilities: Malware |
Indrik Spider has developed malware for their operations, including ransomware such as BitPaymer and WastedLocker.(Citation: Crowdstrike Indrik November 2018) |
Enterprise | T1484 | .001 | Domain or Tenant Policy Modification: Group Policy Modification |
Indrik Spider has used Group Policy Objects to deploy batch scripts.(Citation: Crowdstrike Indrik November 2018)(Citation: Mandiant_UNC2165) |
Enterprise | T1585 | .002 | Establish Accounts: Email Accounts |
Indrik Spider has created email accounts to communicate with their ransomware victims, to include providing payment and decryption details.(Citation: Crowdstrike Indrik November 2018) |
Enterprise | T1567 | .002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage |
Indrik Spider has exfiltrated data using Rclone or MEGASync prior to deploying ransomware.(Citation: Mandiant_UNC2165) |
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Indrik Spider used PsExec to leverage Windows Defender to disable scanning of all downloaded files and to restrict real-time monitoring.(Citation: Symantec WastedLocker June 2020) Indrik Spider has used `MpCmdRun` to revert the definitions in Microsoft Defender.(Citation: Mandiant_UNC2165) Additionally, Indrik Spider has used WMI to stop or uninstall and reset anti-virus products and other defensive services.(Citation: Mandiant_UNC2165) |
Enterprise | T1070 | .001 | Indicator Removal: Clear Windows Event Logs |
Indrik Spider has used Cobalt Strike to empty log files.(Citation: Symantec WastedLocker June 2020) Additionally, Indrik Spider has cleared all event logs using `wevutil`.(Citation: Mandiant_UNC2165) |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors.(Citation: Crowdstrike Indrik November 2018) |
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
Indrik Spider used Cobalt Strike to carry out credential dumping using ProcDump.(Citation: Symantec WastedLocker June 2020) |
Enterprise | T1021 | .001 | Remote Services: Remote Desktop Protocol |
Indrik Spider has used RDP for lateral movement.(Citation: Mandiant_UNC2165) |
.004 | Remote Services: SSH |
Indrik Spider has used SSH for lateral movement.(Citation: Mandiant_UNC2165) |
||
Enterprise | T1558 | .003 | Steal or Forge Kerberos Tickets: Kerberoasting |
Indrik Spider has conducted Kerberoasting attacks using a module from GitHub.(Citation: Mandiant_UNC2165) |
Enterprise | T1552 | .001 | Unsecured Credentials: Credentials In Files |
Indrik Spider has searched files to obtain and exfiltrate credentials.(Citation: Mandiant_UNC2165) |
Enterprise | T1204 | .002 | User Execution: Malicious File |
Indrik Spider has attempted to get users to click on a malicious zipped file.(Citation: Symantec WastedLocker June 2020) |
Enterprise | T1078 | .002 | Valid Accounts: Domain Accounts |
Indrik Spider has collected credentials from infected systems, including domain accounts.(Citation: Crowdstrike Indrik November 2018) |
References
- Symantec Threat Intelligence. (2020, June 25). WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations. Retrieved May 20, 2021.
- Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021.
- Mandiant Intelligence. (2022, June 2). To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions. Retrieved July 29, 2024.
- Antenucci, S., Pantazopoulos, N., Sandee, M. (2020, June 23). WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group. Retrieved September 14, 2021.
- Podlosky, A., Feeley, B. (2021, March 17). INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions. Retrieved September 15, 2021.
- U.S. Department of Treasury. (2019, December 5). Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware. Retrieved September 15, 2021.
- Microsoft. (2022, May 9). Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself. Retrieved March 10, 2023.
- Milenkoski, A. (2022, November 7). SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders. Retrieved March 22, 2024.
- Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.