Pysa
Associated Software Descriptions |
|
Name | Description |
---|---|
Mespinoza | (Citation: CERT-FR PYSA April 2020)(Citation: DFIR Pysa Nov 2020)(Citation: NHS Digital Pysa Oct 2020) |
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Pysa has used Powershell scripts to deploy its ransomware.(Citation: CERT-FR PYSA April 2020) |
.006 | Command and Scripting Interpreter: Python |
Pysa has used Python scripts to deploy ransomware.(Citation: CERT-FR PYSA April 2020) |
||
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Pysa has the capability to stop antivirus services and disable Windows Defender.(Citation: CERT-FR PYSA April 2020) |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
Pysa has deleted batch files after execution. (Citation: CERT-FR PYSA April 2020) |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Pysa has executed a malicious executable by naming it svchost.exe.(Citation: CERT-FR PYSA April 2020) |
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
Pysa can perform OS credential dumping using Mimikatz.(Citation: CERT-FR PYSA April 2020) |
Enterprise | T1021 | .001 | Remote Services: Remote Desktop Protocol |
Pysa has laterally moved using RDP connections.(Citation: CERT-FR PYSA April 2020) |
Enterprise | T1569 | .002 | System Services: Service Execution |
Pysa has used PsExec to copy and execute the ransomware.(Citation: CERT-FR PYSA April 2020) |
Enterprise | T1552 | .001 | Unsecured Credentials: Credentials In Files |
Pysa has extracted credentials from the password database before encrypting the files.(Citation: CERT-FR PYSA April 2020) |
References
- CERT-FR. (2020, April 1). ATTACKS INVOLVING THE MESPINOZA/PYSA RANSOMWARE. Retrieved March 1, 2021.
- THe DFIR Report. (2020, November 23). PYSA/Mespinoza Ransomware. Retrieved March 17, 2021.
- NHS Digital. (2020, October 10). Pysa Ransomware: Another 'big-game hunter' ransomware. Retrieved March 17, 2021.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.