Ferocious Kitten
Associated Group Descriptions |
|
Name | Description |
---|---|
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
Ferocious Kitten has acquired domains imitating legitimate sites.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
Enterprise | T1036 | .002 | Masquerading: Right-to-Left Override |
Ferocious Kitten has used right-to-left override to reverse executables’ names to make them appear to have different file extensions, rather than their real ones.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
.005 | Masquerading: Match Legitimate Resource Name or Location |
Ferocious Kitten has named malicious files |
||
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Ferocious Kitten has obtained open source tools for its operations, including JsonCPP and Psiphon.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
Ferocious Kitten has conducted spearphishing campaigns containing malicious documents to lure victims to open the attachments.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
Enterprise | T1204 | .002 | User Execution: Malicious File |
Ferocious Kitten has attempted to convince victims to enable malicious content within a spearphishing email by including an odd decoy message.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
Software |
|||
ID | Name | References | Techniques |
---|---|---|---|
S0652 | MarkiRAT | (Citation: Kaspersky Ferocious Kitten Jun 2021) | Screen Capture, System Owner/User Discovery, Keylogging, Local Data Staging, Match Legitimate Resource Name or Location, Clipboard Data, Password Managers, System Information Discovery, Native API, Data from Local System, Shortcut Modification, File and Directory Discovery, Process Discovery, Exfiltration Over C2 Channel, Registry Run Keys / Startup Folder, System Language Discovery, BITS Jobs, Security Software Discovery, Windows Command Shell, Web Protocols, Software Discovery, Ingress Tool Transfer |
S0190 | BITSAdmin | (Citation: Kaspersky Ferocious Kitten Jun 2021) (Citation: Microsoft BITSAdmin) | Lateral Tool Transfer, BITS Jobs, Ingress Tool Transfer, Exfiltration Over Unencrypted Non-C2 Protocol |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.