Indrik Spider
Associated Group Descriptions |
|
Name | Description |
---|---|
Evil Corp | (Citation: Crowdstrike EvilCorp March 2021)(Citation: Treasury EvilCorp Dec 2019) |
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Indrik Spider has used PowerShell Empire for execution of malware.(Citation: Crowdstrike Indrik November 2018)(Citation: Symantec WastedLocker June 2020) |
.003 | Command and Scripting Interpreter: Windows Command Shell |
Indrik Spider has used batch scripts on victim's machines.(Citation: Crowdstrike Indrik November 2018) |
||
.007 | Command and Scripting Interpreter: JavaScript |
Indrik Spider has used malicious JavaScript files for several components of their attack.(Citation: Symantec WastedLocker June 2020) |
||
Enterprise | T1584 | .004 | Compromise Infrastructure: Server |
Indrik Spider has served fake updates via legitimate websites that have been compromised.(Citation: Crowdstrike Indrik November 2018) |
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
Indrik Spider has stored collected date in a .tmp file.(Citation: Symantec WastedLocker June 2020) |
Enterprise | T1484 | .001 | Domain Policy Modification: Group Policy Modification |
Indrik Spider has used Group Policy Objects to deploy batch scripts.(Citation: Crowdstrike Indrik November 2018) |
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Indrik Spider used PsExec to leverage Windows Defender to disable scanning of all downloaded files and to restrict real-time monitoring.(Citation: Symantec WastedLocker June 2020) |
Enterprise | T1070 | .001 | Indicator Removal: Clear Windows Event Logs |
Indrik Spider has used Cobalt Strike to empty log files.(Citation: Symantec WastedLocker June 2020) |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors.(Citation: Crowdstrike Indrik November 2018) |
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
Indrik Spider used Cobalt Strike to carry out credential dumping using ProcDump.(Citation: Symantec WastedLocker June 2020) |
Enterprise | T1204 | .002 | User Execution: Malicious File |
Indrik Spider has attempted to get users to click on a malicious zipped file.(Citation: Symantec WastedLocker June 2020) |
Enterprise | T1078 | .002 | Valid Accounts: Domain Accounts |
Indrik Spider has collected credentials from infected systems, including domain accounts.(Citation: Crowdstrike Indrik November 2018) |
References
- Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021.
- Antenucci, S., Pantazopoulos, N., Sandee, M. (2020, June 23). WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group. Retrieved September 14, 2021.
- Symantec Threat Intelligence. (2020, June 25). WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations. Retrieved May 20, 2021.
- Podlosky, A., Feeley, B. (2021, March 17). INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions. Retrieved September 15, 2021.
- U.S. Department of Treasury. (2019, December 5). Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware. Retrieved September 15, 2021.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.