HOPLIGHT
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
HOPLIGHT can launch cmd.exe to execute commands on the system.(Citation: US-CERT HOPLIGHT Apr 2019) |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding |
HOPLIGHT has utilized Zlib compression to obfuscate the communications payload. (Citation: US-CERT HOPLIGHT Apr 2019) |
Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall |
HOPLIGHT has modified the firewall using netsh.(Citation: US-CERT HOPLIGHT Apr 2019) |
Enterprise | T1003 | .002 | OS Credential Dumping: Security Account Manager |
HOPLIGHT has the capability to harvest credentials and passwords from the SAM database.(Citation: US-CERT HOPLIGHT Apr 2019) |
Enterprise | T1569 | .002 | System Services: Service Execution |
HOPLIGHT has used svchost.exe to execute a malicious DLL .(Citation: US-CERT HOPLIGHT Apr 2019) |
Enterprise | T1550 | .002 | Use Alternate Authentication Material: Pass the Hash |
HOPLIGHT has been observed loading several APIs associated with Pass the Hash.(Citation: US-CERT HOPLIGHT Apr 2019) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G0032 | Lazarus Group |
(Citation: US-CERT HOPLIGHT Apr 2019) |
G0082 | APT38 |
(Citation: CISA AA20-239A BeagleBoyz August 2020) |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.