POWERTON
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
POWERTON has used HTTP/HTTPS for C2 traffic.(Citation: FireEye APT33 Guardrail) |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
POWERTON can install a Registry Run key for persistence.(Citation: FireEye APT33 Guardrail) |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
POWERTON is written in PowerShell.(Citation: FireEye APT33 Guardrail) |
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
POWERTON has used AES for encrypting C2 traffic.(Citation: FireEye APT33 Guardrail) |
Enterprise | T1546 | .003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
POWERTON can use WMI for persistence.(Citation: FireEye APT33 Guardrail) |
Enterprise | T1003 | .002 | OS Credential Dumping: Security Account Manager |
POWERTON has the ability to dump password hashes.(Citation: FireEye APT33 Guardrail) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G0064 | APT33 |
(Citation: FireEye APT33 Guardrail) (Citation: Microsoft Holmium June 2020) |
References
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.