Trusted Design

Adwind: another payload for botnet-based malspam

概要

Adwind is a Java-based remote access tool (RAT) used by malware authors to infect computers with backdoor access.

Created: 2026-02-23

Indicators

Indicatorsは見つかっていない。

類似Pulses

このPulseに関連する脅威アクター (事実ベース)

Cinnamon Tempest

Score: 13.57
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1090 - Proxy
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1078.002 - Domain Accounts
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Medusa Group

Score: 44.16
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1559.001 - Component Object Model
  • T1106 - Native API
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1608.002 - Upload Tool
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1136.002 - Domain Account
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1564.003 - Hidden Window
  • T1650 - Acquire Access
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
  • T1218.014 - MMC
MITREへのリンク →

menuPass

Score: 25.43
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003.002 - Security Account Manager
  • T1003.004 - LSA Secrets
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1090.002 - External Proxy
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1039 - Data from Network Shared Drive
  • T1036.003 - Rename Legitimate Utilities
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

INC Ransom

Score: 16.51
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1071 - Application Layer Protocol
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
MITREへのリンク →

Gamaredon Group

Score: 35.31
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1113 - Screen Capture
  • T1559.001 - Component Object Model
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1055 - Process Injection
  • T1112 - Modify Registry
  • T1090 - Proxy
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1039 - Data from Network Shared Drive
  • T1012 - Query Registry
  • T1564.003 - Hidden Window
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT32

Score: 43.86
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1216.001 - PubPrn
  • T1003 - OS Credential Dumping
  • T1552.002 - Credentials in Registry
  • T1055 - Process Injection
  • T1021.002 - SMB/Windows Admin Shares
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1059 - Command and Scripting Interpreter
  • T1218.005 - Mshta
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1036.003 - Rename Legitimate Utilities
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1564.003 - Hidden Window
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

Mustang Panda

Score: 39.51
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003 - OS Credential Dumping
  • T1587.001 - Malware
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1505.003 - Web Shell
  • T1059 - Command and Scripting Interpreter
  • T1219.001 - IDE Tunneling
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1678 - Delay Execution
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1219.002 - Remote Desktop Software
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1027.007 - Dynamic API Resolution
MITREへのリンク →

MuddyWater

Score: 37.03
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1113 - Screen Capture
  • T1003.004 - LSA Secrets
  • T1559.001 - Component Object Model
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1218.003 - CMSTP
  • T1090.002 - External Proxy
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Wizard Spider

Score: 27.79
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003.002 - Security Account Manager
  • T1055 - Process Injection
  • T1021.002 - SMB/Windows Admin Shares
  • T1112 - Modify Registry
  • T1021.006 - Windows Remote Management
  • T1136.002 - Domain Account
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1078.002 - Domain Accounts
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
MITREへのリンク →

Leviathan

Score: 20.84
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003 - OS Credential Dumping
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1059.001 - PowerShell
  • T1218.010 - Regsvr32
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Velvet Ant

Score: 16.50
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1071 - Application Layer Protocol
  • T1055 - Process Injection
  • T1021.002 - SMB/Windows Admin Shares
  • T1562.001 - Disable or Modify Tools
  • T1569.002 - Service Execution
  • T1090.001 - Internal Proxy
MITREへのリンク →

FIN7

Score: 36.70
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1113 - Screen Capture
  • T1587.001 - Malware
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1674 - Input Injection
  • T1059 - Command and Scripting Interpreter
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1497.002 - User Activity Based Checks
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1564.003 - Hidden Window
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
MITREへのリンク →

GALLIUM

Score: 19.27
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003.002 - Security Account Manager
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1090.002 - External Proxy
  • T1136.002 - Domain Account
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1036.003 - Rename Legitimate Utilities
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Volt Typhoon

Score: 39.97
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1113 - Screen Capture
  • T1007 - System Service Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1218 - System Binary Proxy Execution
  • T1010 - Application Window Discovery
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1090 - Proxy
  • T1584.005 - Botnet
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1012 - Query Registry
  • T1078.002 - Domain Accounts
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1090.001 - Internal Proxy
MITREへのリンク →

Blue Mockingbird

Score: 17.56
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1112 - Modify Registry
  • T1090 - Proxy
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
MITREへのリンク →

Naikon

Score: 3.83
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1078.002 - Domain Accounts
MITREへのリンク →

Lazarus Group

Score: 45.36
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1587.001 - Malware
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1218 - System Binary Proxy Execution
  • T1010 - Application Window Discovery
  • T1021.002 - SMB/Windows Admin Shares
  • T1090.002 - External Proxy
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1036.003 - Rename Legitimate Utilities
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1027.007 - Dynamic API Resolution
  • T1021.001 - Remote Desktop Protocol
  • T1090.001 - Internal Proxy
MITREへのリンク →

Lotus Blossom

Score: 12.31
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1112 - Modify Registry
  • T1482 - Domain Trust Discovery
  • T1588.002 - Tool
  • T1012 - Query Registry
  • T1090.001 - Internal Proxy
MITREへのリンク →

Sandworm Team

Score: 33.36
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1587.001 - Malware
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1021.002 - SMB/Windows Admin Shares
  • T1505.003 - Web Shell
  • T1090 - Proxy
  • T1584.005 - Botnet
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1078.002 - Domain Accounts
  • T1499 - Endpoint Denial of Service
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Earth Lusca

Score: 26.60
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1007 - System Service Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1112 - Modify Registry
  • T1090 - Proxy
  • T1482 - Domain Trust Discovery
  • T1588.001 - Malware
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1027.003 - Steganography
  • T1059.005 - Visual Basic
MITREへのリンク →

Indrik Spider

Score: 17.53
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1112 - Modify Registry
  • T1059.001 - PowerShell
  • T1562.001 - Disable or Modify Tools
  • T1012 - Query Registry
  • T1078.002 - Domain Accounts
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

TA2541

Score: 14.43
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1055 - Process Injection
  • T1588.001 - Malware
  • T1218.005 - Mshta
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Stealth Falcon

Score: 8.44
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1059 - Command and Scripting Interpreter
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1012 - Query Registry
MITREへのリンク →

Aquatic Panda

Score: 18.45
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1007 - System Service Discovery
  • T1021.002 - SMB/Windows Admin Shares
  • T1112 - Modify Registry
  • T1588.001 - Malware
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1078.002 - Domain Accounts
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT29

Score: 32.06
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003.002 - Security Account Manager
  • T1003.004 - LSA Secrets
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1090.002 - External Proxy
  • T1546.008 - Accessibility Features
  • T1553.005 - Mark-of-the-Web Bypass
  • T1218.005 - Mshta
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1573 - Encrypted Channel
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

OilRig

Score: 34.39
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1113 - Screen Capture
  • T1003.004 - LSA Secrets
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1219 - Remote Access Tools
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1059 - Command and Scripting Interpreter
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1078.002 - Domain Accounts
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Windshift

Score: 5.24
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1057 - Process Discovery
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

FIN6

Score: 11.37
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1059 - Command and Scripting Interpreter
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
MITREへのリンク →

ToddyCat

Score: 14.24
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1106 - Native API
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1078.002 - Domain Accounts
  • T1564.003 - Hidden Window
MITREへのリンク →

Deep Panda

Score: 15.99
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1021.002 - SMB/Windows Admin Shares
  • T1505.003 - Web Shell
  • T1546.008 - Accessibility Features
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1218.010 - Regsvr32
  • T1564.003 - Hidden Window
MITREへのリンク →

Threat Group-3390

Score: 27.33
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003.002 - Security Account Manager
  • T1003.004 - LSA Secrets
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1608.002 - Upload Tool
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1021.006 - Windows Remote Management
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT42

Score: 8.71
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1113 - Screen Capture
  • T1112 - Modify Registry
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1059.005 - Visual Basic
MITREへのリンク →

Ember Bear

Score: 21.17
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003 - OS Credential Dumping
  • T1003.002 - Security Account Manager
  • T1003.004 - LSA Secrets
  • T1190 - Exploit Public-Facing Application
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1588.001 - Malware
  • T1059.001 - PowerShell
  • T1562.001 - Disable or Modify Tools
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

Chimera

Score: 30.20
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1007 - System Service Discovery
  • T1106 - Native API
  • T1021.002 - SMB/Windows Admin Shares
  • T1021.006 - Windows Remote Management
  • T1482 - Domain Trust Discovery
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1039 - Data from Network Shared Drive
  • T1012 - Query Registry
  • T1078.002 - Domain Accounts
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
MITREへのリンク →

BlackByte

Score: 36.06
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003 - OS Credential Dumping
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1055 - Process Injection
  • T1021.002 - SMB/Windows Admin Shares
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1136.002 - Domain Account
  • T1482 - Domain Trust Discovery
  • T1059.001 - PowerShell
  • T1562.001 - Disable or Modify Tools
  • T1012 - Query Registry
  • T1078.002 - Domain Accounts
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
MITREへのリンク →

FIN13

Score: 29.35
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003.002 - Security Account Manager
  • T1587.001 - Malware
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1505.003 - Web Shell
  • T1021.006 - Windows Remote Management
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1556 - Modify Authentication Process
  • T1090.001 - Internal Proxy
MITREへのリンク →

Magic Hound

Score: 34.70
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1113 - Screen Capture
  • T1071 - Application Layer Protocol
  • T1190 - Exploit Public-Facing Application
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1090 - Proxy
  • T1482 - Domain Trust Discovery
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1573 - Encrypted Channel
  • T1078.002 - Domain Accounts
  • T1564.003 - Hidden Window
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT41

Score: 30.94
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1014 - Rootkit
  • T1003.002 - Security Account Manager
  • T1190 - Exploit Public-Facing Application
  • T1055 - Process Injection
  • T1021.002 - SMB/Windows Admin Shares
  • T1112 - Modify Registry
  • T1546.008 - Accessibility Features
  • T1090 - Proxy
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
MITREへのリンク →

FIN8

Score: 16.85
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1021.002 - SMB/Windows Admin Shares
  • T1112 - Modify Registry
  • T1482 - Domain Trust Discovery
  • T1055.004 - Asynchronous Procedure Call
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Dragonfly

Score: 22.92
Matched TTPs:
  • T1113 - Screen Capture
  • T1003.002 - Security Account Manager
  • T1003.004 - LSA Secrets
  • T1190 - Exploit Public-Facing Application
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1059 - Command and Scripting Interpreter
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

BRONZE BUTLER

Score: 19.56
Matched TTPs:
  • T1113 - Screen Capture
  • T1007 - System Service Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1039 - Data from Network Shared Drive
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT28

Score: 33.06
Matched TTPs:
  • T1113 - Screen Capture
  • T1003 - OS Credential Dumping
  • T1014 - Rootkit
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1505.003 - Web Shell
  • T1090.002 - External Proxy
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1039 - Data from Network Shared Drive
  • T1203 - Exploitation for Client Execution
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
  • T1669 - Wi-Fi Networks
MITREへのリンク →

MoustachedBouncer

Score: 5.43
Matched TTPs:
  • T1113 - Screen Capture
  • T1090 - Proxy
  • T1059.001 - PowerShell
MITREへのリンク →

GOLD SOUTHFIELD

Score: 7.15
Matched TTPs:
  • T1113 - Screen Capture
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1059.001 - PowerShell
MITREへのリンク →

Winter Vivern

Score: 9.24
Matched TTPs:
  • T1113 - Screen Capture
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1059 - Command and Scripting Interpreter
  • T1059.001 - PowerShell
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Silence

Score: 19.48
Matched TTPs:
  • T1113 - Screen Capture
  • T1106 - Native API
  • T1055 - Process Injection
  • T1112 - Modify Registry
  • T1090.002 - External Proxy
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
MITREへのリンク →

APT39

Score: 34.28
Matched TTPs:
  • T1113 - Screen Capture
  • T1003 - OS Credential Dumping
  • T1059.010 - AutoHotKey & AutoIT
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1505.003 - Web Shell
  • T1090.002 - External Proxy
  • T1059 - Command and Scripting Interpreter
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1012 - Query Registry
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
  • T1569.002 - Service Execution
  • T1090.001 - Internal Proxy
MITREへのリンク →

Kimsuky

Score: 37.44
Matched TTPs:
  • T1113 - Screen Capture
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1055 - Process Injection
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1218.010 - Regsvr32
  • T1012 - Query Registry
  • T1564.003 - Hidden Window
  • T1219.002 - Remote Desktop Software
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Poseidon Group

Score: 7.43
Matched TTPs:
  • T1003 - OS Credential Dumping
  • T1007 - System Service Discovery
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
MITREへのリンク →

Tonto Team

Score: 10.17
Matched TTPs:
  • T1003 - OS Credential Dumping
  • T1505.003 - Web Shell
  • T1090.002 - External Proxy
  • T1059.001 - PowerShell
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Sowbug

Score: 5.63
Matched TTPs:
  • T1003 - OS Credential Dumping
  • T1039 - Data from Network Shared Drive
MITREへのリンク →

Storm-0501

Score: 18.42
Matched TTPs:
  • T1003 - OS Credential Dumping
  • T1190 - Exploit Public-Facing Application
  • T1021.006 - Windows Remote Management
  • T1482 - Domain Trust Discovery
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1218.010 - Regsvr32
  • T1219.002 - Remote Desktop Software
MITREへのリンク →

Axiom

Score: 23.19
Matched TTPs:
  • T1003 - OS Credential Dumping
  • T1190 - Exploit Public-Facing Application
  • T1546.008 - Accessibility Features
  • T1584.005 - Botnet
  • T1203 - Exploitation for Client Execution
  • T1563.002 - RDP Hijacking
  • T1021.001 - Remote Desktop Protocol
  • T1001.002 - Steganography
MITREへのリンク →

Winnti Group

Score: 5.58
Matched TTPs:
  • T1014 - Rootkit
  • T1057 - Process Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Rocke

Score: 13.85
Matched TTPs:
  • T1014 - Rootkit
  • T1071 - Application Layer Protocol
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1057 - Process Discovery
  • T1562.001 - Disable or Modify Tools
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

TeamTNT

Score: 20.39
Matched TTPs:
  • T1014 - Rootkit
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1071 - Application Layer Protocol
  • T1140 - Deobfuscate/Decode Files or Information
  • T1219 - Remote Access Tools
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1562.001 - Disable or Modify Tools
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

UNC3886

Score: 23.99
Matched TTPs:
  • T1014 - Rootkit
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1548 - Abuse Elevation Control Mechanism
  • T1588.001 - Malware
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1212 - Exploitation for Credential Access
  • T1562.001 - Disable or Modify Tools
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

Mustard Tempest

Score: 5.31
Matched TTPs:
  • T1583.008 - Malvertising
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Daggerfly

Score: 9.69
Matched TTPs:
  • T1003.002 - Security Account Manager
  • T1059.001 - PowerShell
  • T1036.003 - Rename Legitimate Utilities
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Ke3chang

Score: 26.74
Matched TTPs:
  • T1003.002 - Security Account Manager
  • T1003.004 - LSA Secrets
  • T1587.001 - Malware
  • T1583.005 - Botnet
  • T1007 - System Service Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1059 - Command and Scripting Interpreter
  • T1057 - Process Discovery
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

Agrius

Score: 13.13
Matched TTPs:
  • T1003.002 - Security Account Manager
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1562.001 - Disable or Modify Tools
  • T1078.002 - Domain Accounts
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT5

Score: 18.38
Matched TTPs:
  • T1003.002 - Security Account Manager
  • T1583.005 - Botnet
  • T1190 - Exploit Public-Facing Application
  • T1055 - Process Injection
  • T1505.003 - Web Shell
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1078.002 - Domain Accounts
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Leafminer

Score: 3.68
Matched TTPs:
  • T1003.004 - LSA Secrets
  • T1588.002 - Tool
MITREへのリンク →

APT33

Score: 8.16
Matched TTPs:
  • T1003.004 - LSA Secrets
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Moonstone Sleet

Score: 6.84
Matched TTPs:
  • T1587.001 - Malware
  • T1140 - Deobfuscate/Decode Files or Information
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

Contagious Interview

Score: 15.95
Matched TTPs:
  • T1587.001 - Malware
  • T1090 - Proxy
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1219.002 - Remote Desktop Software
  • T1059.005 - Visual Basic
  • T1204.004 - Malicious Copy and Paste
MITREへのリンク →

LuminousMoth

Score: 8.01
Matched TTPs:
  • T1587.001 - Malware
  • T1112 - Modify Registry
  • T1588.001 - Malware
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Salt Typhoon

Score: 4.41
Matched TTPs:
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1588.002 - Tool
MITREへのリンク →

Play

Score: 13.53
Matched TTPs:
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1078.002 - Domain Accounts
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Aoqin Dragon

Score: 4.44
Matched TTPs:
  • T1587.001 - Malware
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

RedCurl

Score: 15.60
Matched TTPs:
  • T1587.001 - Malware
  • T1552.002 - Credentials in Registry
  • T1059.001 - PowerShell
  • T1056.002 - GUI Input Capture
  • T1039 - Data from Network Shared Drive
  • T1059.005 - Visual Basic
MITREへのリンク →

Moses Staff

Score: 8.89
Matched TTPs:
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1505.003 - Web Shell
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Turla

Score: 31.80
Matched TTPs:
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1055 - Process Injection
  • T1021.002 - SMB/Windows Admin Shares
  • T1112 - Modify Registry
  • T1090 - Proxy
  • T1588.001 - Malware
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1012 - Query Registry
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1090.001 - Internal Proxy
MITREへのリンク →

HAFNIUM

Score: 17.24
Matched TTPs:
  • T1583.005 - Botnet
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1136.002 - Domain Account
  • T1584.005 - Botnet
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

admin@338

Score: 4.02
Matched TTPs:
  • T1007 - System Service Discovery
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

APT1

Score: 9.00
Matched TTPs:
  • T1007 - System Service Discovery
  • T1588.001 - Malware
  • T1057 - Process Discovery
  • T1588.002 - Tool
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Molerats

Score: 9.35
Matched TTPs:
  • T1218.007 - Msiexec
  • T1140 - Deobfuscate/Decode Files or Information
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

TA505

Score: 23.19
Matched TTPs:
  • T1218.007 - Msiexec
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1112 - Modify Registry
  • T1588.001 - Malware
  • T1553.005 - Mark-of-the-Web Bypass
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1078.002 - Domain Accounts
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Rancor

Score: 5.46
Matched TTPs:
  • T1218.007 - Msiexec
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

ZIRCONIUM

Score: 7.86
Matched TTPs:
  • T1218.007 - Msiexec
  • T1140 - Deobfuscate/Decode Files or Information
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Machete

Score: 4.69
Matched TTPs:
  • T1218.007 - Msiexec
  • T1059.005 - Visual Basic
MITREへのリンク →

APT38

Score: 32.21
Matched TTPs:
  • T1218.007 - Msiexec
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1055 - Process Injection
  • T1112 - Modify Registry
  • T1505.003 - Web Shell
  • T1553.005 - Mark-of-the-Web Bypass
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1036.003 - Rename Legitimate Utilities
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

Higaisa

Score: 13.59
Matched TTPs:
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1057 - Process Discovery
  • T1203 - Exploitation for Client Execution
  • T1564.003 - Hidden Window
  • T1059.005 - Visual Basic
  • T1090.001 - Internal Proxy
MITREへのリンク →

Gorgon Group

Score: 13.71
Matched TTPs:
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1112 - Modify Registry
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1564.003 - Hidden Window
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

BlackTech

Score: 6.10
Matched TTPs:
  • T1106 - Native API
  • T1190 - Exploit Public-Facing Application
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

SideCopy

Score: 6.81
Matched TTPs:
  • T1106 - Native API
  • T1218.005 - Mshta
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Tropic Trooper

Score: 16.06
Matched TTPs:
  • T1106 - Native API
  • T1140 - Deobfuscate/Decode Files or Information
  • T1505.003 - Web Shell
  • T1057 - Process Discovery
  • T1573 - Encrypted Channel
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT37

Score: 15.31
Matched TTPs:
  • T1106 - Native API
  • T1055 - Process Injection
  • T1059 - Command and Scripting Interpreter
  • T1057 - Process Discovery
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

WIRTE

Score: 8.14
Matched TTPs:
  • T1140 - Deobfuscate/Decode Files or Information
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Darkhotel

Score: 9.49
Matched TTPs:
  • T1140 - Deobfuscate/Decode Files or Information
  • T1057 - Process Discovery
  • T1497.002 - User Activity Based Checks
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Storm-1811

Score: 11.79
Matched TTPs:
  • T1140 - Deobfuscate/Decode Files or Information
  • T1021.002 - SMB/Windows Admin Shares
  • T1482 - Domain Trust Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1219.002 - Remote Desktop Software
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT19

Score: 12.53
Matched TTPs:
  • T1140 - Deobfuscate/Decode Files or Information
  • T1112 - Modify Registry
  • T1059 - Command and Scripting Interpreter
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1564.003 - Hidden Window
MITREへのリンク →

BackdoorDiplomacy

Score: 7.32
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1588.001 - Malware
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Sea Turtle

Score: 5.58
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

Fox Kitten

Score: 21.63
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.002 - SMB/Windows Admin Shares
  • T1505.003 - Web Shell
  • T1546.008 - Accessibility Features
  • T1090 - Proxy
  • T1059 - Command and Scripting Interpreter
  • T1059.001 - PowerShell
  • T1039 - Data from Network Shared Drive
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Volatile Cedar

Score: 4.01
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

DarkVishnya

Score: 4.24
Matched TTPs:
  • T1219 - Remote Access Tools
  • T1059.001 - PowerShell
  • T1588.002 - Tool
MITREへのリンク →

Carbanak

Score: 3.44
Matched TTPs:
  • T1219 - Remote Access Tools
  • T1588.002 - Tool
MITREへのリンク →

Akira

Score: 13.90
Matched TTPs:
  • T1219 - Remote Access Tools
  • T1482 - Domain Trust Discovery
  • T1059.001 - PowerShell
  • T1562.001 - Disable or Modify Tools
  • T1531 - Account Access Removal
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Cobalt Group

Score: 18.90
Matched TTPs:
  • T1219 - Remote Access Tools
  • T1055 - Process Injection
  • T1218.003 - CMSTP
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1203 - Exploitation for Client Execution
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

PLATINUM

Score: 7.77
Matched TTPs:
  • T1055 - Process Injection
  • T1105 - Ingress Tool Transfer
  • T1056.004 - Credential API Hooking
MITREへのリンク →

HEXANE

Score: 10.84
Matched TTPs:
  • T1010 - Application Window Discovery
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Threat Group-1314

Score: 4.22
Matched TTPs:
  • T1021.002 - SMB/Windows Admin Shares
  • T1078.002 - Domain Accounts
MITREへのリンク →

APT3

Score: 18.89
Matched TTPs:
  • T1021.002 - SMB/Windows Admin Shares
  • T1090.002 - External Proxy
  • T1546.008 - Accessibility Features
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1203 - Exploitation for Client Execution
  • T1078.002 - Domain Accounts
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Patchwork

Score: 8.80
Matched TTPs:
  • T1112 - Modify Registry
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Saint Bear

Score: 8.26
Matched TTPs:
  • T1112 - Modify Registry
  • T1059 - Command and Scripting Interpreter
  • T1059.001 - PowerShell
  • T1562.001 - Disable or Modify Tools
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

FIN5

Score: 5.94
Matched TTPs:
  • T1090.002 - External Proxy
  • T1059 - Command and Scripting Interpreter
  • T1588.002 - Tool
MITREへのリンク →

CopyKittens

Score: 6.39
Matched TTPs:
  • T1090 - Proxy
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1564.003 - Hidden Window
MITREへのリンク →

LAPSUS$

Score: 9.78
Matched TTPs:
  • T1090 - Proxy
  • T1588.001 - Malware
  • T1588.002 - Tool
  • T1531 - Account Access Removal
MITREへのリンク →

Windigo

Score: 4.68
Matched TTPs:
  • T1090 - Proxy
  • T1059 - Command and Scripting Interpreter
MITREへのリンク →

POLONIUM

Score: 3.19
Matched TTPs:
  • T1090 - Proxy
  • T1588.002 - Tool
MITREへのリンク →

Scattered Spider

Score: 13.60
Matched TTPs:
  • T1090 - Proxy
  • T1588.001 - Malware
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1219.002 - Remote Desktop Software
  • T1105 - Ingress Tool Transfer
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Whitefly

Score: 3.97
Matched TTPs:
  • T1059 - Command and Scripting Interpreter
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Metador

Score: 4.08
Matched TTPs:
  • T1588.001 - Malware
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

LazyScripter

Score: 7.78
Matched TTPs:
  • T1588.001 - Malware
  • T1218.005 - Mshta
  • T1059.001 - PowerShell
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Andariel

Score: 9.28
Matched TTPs:
  • T1588.001 - Malware
  • T1057 - Process Discovery
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Sidewinder

Score: 8.33
Matched TTPs:
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1203 - Exploitation for Client Execution
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Inception

Score: 11.15
Matched TTPs:
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1203 - Exploitation for Client Execution
  • T1059.005 - Visual Basic
MITREへのリンク →

Confucius

Score: 6.81
Matched TTPs:
  • T1218.005 - Mshta
  • T1059.001 - PowerShell
  • T1203 - Exploitation for Client Execution
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

TA551

Score: 8.90
Matched TTPs:
  • T1218.005 - Mshta
  • T1218.010 - Regsvr32
  • T1027.003 - Steganography
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Thrip

Score: 4.58
Matched TTPs:
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1219.002 - Remote Desktop Software
MITREへのリンク →

FIN10

Score: 3.30
Matched TTPs:
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

TA459

Score: 3.70
Matched TTPs:
  • T1059.001 - PowerShell
  • T1203 - Exploitation for Client Execution
  • T1059.005 - Visual Basic
MITREへのリンク →

DarkHydrus

Score: 4.05
Matched TTPs:
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1564.003 - Hidden Window
MITREへのリンク →

Nomadic Octopus

Score: 3.97
Matched TTPs:
  • T1059.001 - PowerShell
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

FIN4

Score: 5.53
Matched TTPs:
  • T1056.002 - GUI Input Capture
  • T1059.005 - Visual Basic
MITREへのリンク →

BITTER

Score: 6.74
Matched TTPs:
  • T1588.002 - Tool
  • T1573 - Encrypted Channel
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT-C-36

Score: 3.03
Matched TTPs:
  • T1588.002 - Tool
  • T1059.005 - Visual Basic
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Evilnum

Score: 3.71
Matched TTPs:
  • T1219.002 - Remote Desktop Software
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

このPulseに関連する脅威アクター (推論ベース)

Medusa Group

Score: 0.80
Matched TTPs:
  • T1218.014 - MMC
  • T1608.002 - Upload Tool
  • T1057 - Process Discovery
  • T1564.003 - Hidden Window
  • T1136.002 - Domain Account
  • T1106 - Native API
  • T1650 - Acquire Access
  • T1105 - Ingress Tool Transfer
  • T1190 - Exploit Public-Facing Application
  • T1569.002 - Service Execution
  • T1505.003 - Web Shell
  • T1559.001 - Component Object Model
  • T1219 - Remote Access Tools
  • T1112 - Modify Registry
  • T1047 - Windows Management Instrumentation
  • T1562.001 - Disable or Modify Tools
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Lazarus Group

Score: 0.77
Matched TTPs:
  • T1036.003 - Rename Legitimate Utilities
  • T1027.007 - Dynamic API Resolution
  • T1059.005 - Visual Basic
  • T1057 - Process Discovery
  • T1012 - Query Registry
  • T1010 - Application Window Discovery
  • T1106 - Native API
  • T1105 - Ingress Tool Transfer
  • T1021.002 - SMB/Windows Admin Shares
  • T1140 - Deobfuscate/Decode Files or Information
  • T1090.001 - Internal Proxy
  • T1218.005 - Mshta
  • T1090.002 - External Proxy
  • T1218 - System Binary Proxy Execution
  • T1203 - Exploitation for Client Execution
  • T1047 - Windows Management Instrumentation
  • T1562.001 - Disable or Modify Tools
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1021.001 - Remote Desktop Protocol
  • T1587.001 - Malware
MITREへのリンク →

APT32

Score: 0.77
Matched TTPs:
  • T1036.003 - Rename Legitimate Utilities
  • T1059.005 - Visual Basic
  • T1564.003 - Hidden Window
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
  • T1021.002 - SMB/Windows Admin Shares
  • T1055 - Process Injection
  • T1569.002 - Service Execution
  • T1216.001 - PubPrn
  • T1505.003 - Web Shell
  • T1218.005 - Mshta
  • T1203 - Exploitation for Client Execution
  • T1112 - Modify Registry
  • T1552.002 - Credentials in Registry
  • T1047 - Windows Management Instrumentation
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1059 - Command and Scripting Interpreter
  • T1218.010 - Regsvr32
  • T1003 - OS Credential Dumping
MITREへのリンク →

Volt Typhoon

Score: 0.70
Matched TTPs:
  • T1057 - Process Discovery
  • T1078.002 - Domain Accounts
  • T1012 - Query Registry
  • T1010 - Application Window Discovery
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1505.003 - Web Shell
  • T1007 - System Service Discovery
  • T1090.001 - Internal Proxy
  • T1113 - Screen Capture
  • T1218 - System Binary Proxy Execution
  • T1112 - Modify Registry
  • T1047 - Windows Management Instrumentation
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1090 - Proxy
  • T1021.001 - Remote Desktop Protocol
  • T1584.005 - Botnet
MITREへのリンク →

Mustang Panda

Score: 0.69
Matched TTPs:
  • T1059.005 - Visual Basic
  • T1057 - Process Discovery
  • T1505.003 - Web Shell
  • T1678 - Delay Execution
  • T1219.001 - IDE Tunneling
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1219.002 - Remote Desktop Software
  • T1218.005 - Mshta
  • T1105 - Ingress Tool Transfer
  • T1106 - Native API
  • T1027.007 - Dynamic API Resolution
  • T1203 - Exploitation for Client Execution
  • T1587.001 - Malware
  • T1059 - Command and Scripting Interpreter
  • T1140 - Deobfuscate/Decode Files or Information
  • T1003 - OS Credential Dumping
  • T1047 - Windows Management Instrumentation
MITREへのリンク →

FIN7

Score: 0.69
Matched TTPs:
  • T1569.002 - Service Execution
  • T1059.005 - Visual Basic
  • T1057 - Process Discovery
  • T1113 - Screen Capture
  • T1219 - Remote Access Tools
  • T1497.002 - User Activity Based Checks
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1218.005 - Mshta
  • T1059 - Command and Scripting Interpreter
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1587.001 - Malware
  • T1674 - Input Injection
  • T1021.001 - Remote Desktop Protocol
  • T1047 - Windows Management Instrumentation
  • T1564.003 - Hidden Window
MITREへのリンク →

MuddyWater

Score: 0.68
Matched TTPs:
  • T1027.003 - Steganography
  • T1057 - Process Discovery
  • T1059.005 - Visual Basic
  • T1113 - Screen Capture
  • T1219 - Remote Access Tools
  • T1218.003 - CMSTP
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1003.004 - LSA Secrets
  • T1218.005 - Mshta
  • T1559.001 - Component Object Model
  • T1090.002 - External Proxy
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1047 - Windows Management Instrumentation
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

Kimsuky

Score: 0.65
Matched TTPs:
  • T1059.005 - Visual Basic
  • T1057 - Process Discovery
  • T1564.003 - Hidden Window
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1055 - Process Injection
  • T1505.003 - Web Shell
  • T1007 - System Service Discovery
  • T1113 - Screen Capture
  • T1219.002 - Remote Desktop Software
  • T1218.005 - Mshta
  • T1112 - Modify Registry
  • T1562.001 - Disable or Modify Tools
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1021.001 - Remote Desktop Protocol
  • T1587.001 - Malware
MITREへのリンク →

BlackByte

Score: 0.64
Matched TTPs:
  • T1055 - Process Injection
  • T1569.002 - Service Execution
  • T1505.003 - Web Shell
  • T1219 - Remote Access Tools
  • T1136.002 - Domain Account
  • T1078.002 - Domain Accounts
  • T1059.001 - PowerShell
  • T1012 - Query Registry
  • T1482 - Domain Trust Discovery
  • T1021.002 - SMB/Windows Admin Shares
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1003 - OS Credential Dumping
  • T1112 - Modify Registry
  • T1021.001 - Remote Desktop Protocol
  • T1047 - Windows Management Instrumentation
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

Magic Hound

Score: 0.64
Matched TTPs:
  • T1059.005 - Visual Basic
  • T1057 - Process Discovery
  • T1505.003 - Web Shell
  • T1113 - Screen Capture
  • T1047 - Windows Management Instrumentation
  • T1078.002 - Domain Accounts
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1482 - Domain Trust Discovery
  • T1090 - Proxy
  • T1021.001 - Remote Desktop Protocol
  • T1105 - Ingress Tool Transfer
  • T1112 - Modify Registry
  • T1190 - Exploit Public-Facing Application
  • T1573 - Encrypted Channel
  • T1071 - Application Layer Protocol
  • T1562.001 - Disable or Modify Tools
  • T1564.003 - Hidden Window
MITREへのリンク →

Turla

Score: 0.63
Matched TTPs:
  • T1055 - Process Injection
  • T1059.005 - Visual Basic
  • T1007 - System Service Discovery
  • T1090.001 - Internal Proxy
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1012 - Query Registry
  • T1106 - Native API
  • T1090 - Proxy
  • T1588.001 - Malware
  • T1021.002 - SMB/Windows Admin Shares
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1587.001 - Malware
  • T1112 - Modify Registry
  • T1057 - Process Discovery
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

Gamaredon Group

Score: 0.62
Matched TTPs:
  • T1055 - Process Injection
  • T1059.005 - Visual Basic
  • T1057 - Process Discovery
  • T1113 - Screen Capture
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1012 - Query Registry
  • T1218.005 - Mshta
  • T1106 - Native API
  • T1559.001 - Component Object Model
  • T1090 - Proxy
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1112 - Modify Registry
  • T1047 - Windows Management Instrumentation
  • T1562.001 - Disable or Modify Tools
  • T1039 - Data from Network Shared Drive
MITREへのリンク →

OilRig

Score: 0.61
Matched TTPs:
  • T1003.004 - LSA Secrets
  • T1059.005 - Visual Basic
  • T1057 - Process Discovery
  • T1078.002 - Domain Accounts
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1505.003 - Web Shell
  • T1007 - System Service Discovery
  • T1113 - Screen Capture
  • T1219 - Remote Access Tools
  • T1203 - Exploitation for Client Execution
  • T1112 - Modify Registry
  • T1047 - Windows Management Instrumentation
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1059 - Command and Scripting Interpreter
  • T1021.001 - Remote Desktop Protocol
  • T1587.001 - Malware
MITREへのリンク →

Sandworm Team

Score: 0.61
Matched TTPs:
  • T1499 - Endpoint Denial of Service
  • T1059.005 - Visual Basic
  • T1505.003 - Web Shell
  • T1219 - Remote Access Tools
  • T1078.002 - Domain Accounts
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1106 - Native API
  • T1090 - Proxy
  • T1203 - Exploitation for Client Execution
  • T1021.002 - SMB/Windows Admin Shares
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1587.001 - Malware
  • T1584.005 - Botnet
  • T1047 - Windows Management Instrumentation
MITREへのリンク →

APT39

Score: 0.60
Matched TTPs:
  • T1569.002 - Service Execution
  • T1059.005 - Visual Basic
  • T1505.003 - Web Shell
  • T1090.001 - Internal Proxy
  • T1113 - Screen Capture
  • T1059.010 - AutoHotKey & AutoIT
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
  • T1090.002 - External Proxy
  • T1021.002 - SMB/Windows Admin Shares
  • T1059 - Command and Scripting Interpreter
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1003 - OS Credential Dumping
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT28

Score: 0.59
Matched TTPs:
  • T1669 - Wi-Fi Networks
  • T1014 - Rootkit
  • T1505.003 - Web Shell
  • T1113 - Screen Capture
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1090.002 - External Proxy
  • T1203 - Exploitation for Client Execution
  • T1021.002 - SMB/Windows Admin Shares
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1003 - OS Credential Dumping
  • T1057 - Process Discovery
  • T1564.003 - Hidden Window
  • T1039 - Data from Network Shared Drive
MITREへのリンク →

APT29

Score: 0.57
Matched TTPs:
  • T1505.003 - Web Shell
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1003.002 - Security Account Manager
  • T1003.004 - LSA Secrets
  • T1546.008 - Accessibility Features
  • T1218.005 - Mshta
  • T1090.002 - External Proxy
  • T1553.005 - Mark-of-the-Web Bypass
  • T1105 - Ingress Tool Transfer
  • T1203 - Exploitation for Client Execution
  • T1190 - Exploit Public-Facing Application
  • T1587.001 - Malware
  • T1573 - Encrypted Channel
  • T1047 - Windows Management Instrumentation
MITREへのリンク →

APT41

Score: 0.57
Matched TTPs:
  • T1055 - Process Injection
  • T1569.002 - Service Execution
  • T1014 - Rootkit
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1003.002 - Security Account Manager
  • T1546.008 - Accessibility Features
  • T1012 - Query Registry
  • T1090 - Proxy
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
  • T1105 - Ingress Tool Transfer
  • T1021.002 - SMB/Windows Admin Shares
  • T1190 - Exploit Public-Facing Application
  • T1112 - Modify Registry
  • T1047 - Windows Management Instrumentation
MITREへのリンク →

APT38

Score: 0.55
Matched TTPs:
  • T1055 - Process Injection
  • T1059.005 - Visual Basic
  • T1569.002 - Service Execution
  • T1505.003 - Web Shell
  • T1218.007 - Msiexec
  • T1036.003 - Rename Legitimate Utilities
  • T1059.001 - PowerShell
  • T1588.002 - Tool
  • T1218.005 - Mshta
  • T1106 - Native API
  • T1553.005 - Mark-of-the-Web Bypass
  • T1105 - Ingress Tool Transfer
  • T1140 - Deobfuscate/Decode Files or Information
  • T1112 - Modify Registry
  • T1057 - Process Discovery
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

Related CVEs

このPulseに見つかったCVEはありません。

Pulse – 脅威アクター グラフ


← Pulse一覧に戻る