Ixeshe
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Ixeshe uses HTTP for command and control.(Citation: Moran 2013)(Citation: Trend Micro IXESHE 2012) |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Ixeshe can achieve persistence by adding itself to the |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
Ixeshe is capable of executing commands via cmd.(Citation: Trend Micro IXESHE 2012) |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding |
Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests.(Citation: Moran 2013)(Citation: Trend Micro IXESHE 2012) |
Enterprise | T1564 | .001 | Hide Artifacts: Hidden Files and Directories |
Ixeshe sets its own executable file's attributes to hidden.(Citation: Trend Micro IXESHE 2012) |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
Ixeshe has a command to delete a file from the machine.(Citation: Trend Micro IXESHE 2012) |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Ixeshe has used registry values and file names associated with Adobe software, such as AcroRd32.exe.(Citation: Trend Micro IXESHE 2012) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G0005 | APT12 |
(Citation: Moran 2013) (Citation: Moran 2014) |
References
- Sancho, D., et al. (2012, May 22). IXESHE An APT Campaign. Retrieved June 7, 2019.
- Moran, N., & Villeneuve, N. (2013, August 12). Survival of the Fittest: New York Times Attackers Evolve Quickly [Blog]. Retrieved November 12, 2014.
- Moran, N., Oppenheim, M., Engle, S., & Wartell, R.. (2014, September 3). Darwin’s Favorite APT Group [Blog]. Retrieved November 12, 2014.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.