Moses Staff
Associated Group Descriptions |
|
Name | Description |
---|---|
DEV-0500 | (Citation: Microsoft Threat Actor Naming July 2023) |
Marigold Sandstorm | (Citation: Microsoft Threat Actor Naming July 2023) |
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .001 | Account Discovery: Local Account |
Moses Staff has collected the administrator username from a compromised host.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1587 | .001 | Develop Capabilities: Malware |
Moses Staff has built malware, such as DCSrv and PyDCrypt, for targeting victims' machines.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall |
Moses Staff has used batch scripts that can disable the Windows firewall on specific remote machines.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
Moses Staff has used obfuscated web shells in their operations.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Moses Staff has used the commercial tool DiskCryptor.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares |
Moses Staff has used batch scripts that can enable SMB on a compromised host.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1505 | .003 | Server Software Component: Web Shell |
Moses Staff has dropped a web shell onto a compromised system.(Citation: Checkpoint MosesStaff Nov 2021) |
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
Moses Staff has used signed drivers from an open source tool called DiskCryptor to evade detection.(Citation: Checkpoint MosesStaff Nov 2021) |
References
- Checkpoint Research. (2021, November 15). Uncovering MosesStaff techniques: Ideology over Money. Retrieved August 11, 2022.
- Cybereason Nocturnus. (2022, February 1). StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations. Retrieved August 15, 2022.
- Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.