Ferocious Kitten
Associated Group Descriptions |
|
Name | Description |
---|---|
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
Ferocious Kitten has acquired domains imitating legitimate sites.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
Enterprise | T1036 | .002 | Masquerading: Right-to-Left Override |
Ferocious Kitten has used right-to-left override to reverse executables’ names to make them appear to have different file extensions, rather than their real ones.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
.005 | Masquerading: Match Legitimate Name or Location |
Ferocious Kitten has named malicious files |
||
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Ferocious Kitten has obtained open source tools for its operations, including JsonCPP and Psiphon.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
Ferocious Kitten has conducted spearphishing campaigns containing malicious documents to lure victims to open the attachments.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
Enterprise | T1204 | .002 | User Execution: Malicious File |
Ferocious Kitten has attempted to convince victims to enable malicious content within a spearphishing email by including an odd decoy message.(Citation: Kaspersky Ferocious Kitten Jun 2021) |
Software |
|||
ID | Name | References | Techniques |
---|---|---|---|
S0652 | MarkiRAT | (Citation: Kaspersky Ferocious Kitten Jun 2021) | BITS Jobs, System Language Discovery, System Owner/User Discovery, File and Directory Discovery, Native API, Ingress Tool Transfer, Shortcut Modification, Data from Local System, Keylogging, Registry Run Keys / Startup Folder, Windows Command Shell, Security Software Discovery, System Information Discovery, Exfiltration Over C2 Channel, Password Managers, Match Legitimate Name or Location, Process Discovery, Local Data Staging, Web Protocols, Software Discovery, Clipboard Data, Screen Capture |
S0190 | BITSAdmin | (Citation: Kaspersky Ferocious Kitten Jun 2021) (Citation: Microsoft BITSAdmin) | Lateral Tool Transfer, Exfiltration Over Unencrypted Non-C2 Protocol, Ingress Tool Transfer, BITS Jobs |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.