Trusted Design

Chasing an Angry Spark

概要

In spring 2022, a highly sophisticated backdoor named AngrySpark was discovered on a single machine in the United Kingdom. The malware employed a three-stage architecture: a DLL masquerading as a Windows Task Scheduler component, a custom virtual machine interpreter running bytecode instructions, and a beacon that profiles systems while disguising C2 communications as PNG image requests. The malware featured VM-based obfuscation, dual encrypted C2 channels using RSA-4096 and XXTEA encryption, direct syscalls bypassing usermode hooks, hypervisor detection, and CET-aware anti-analysis capabilities. It operated for approximately one year with active maintenance visible through syscall table updates and configuration changes between May 2022 and January 2023. The infrastructure expired in mid-2023 and the operation ceased, with no additional samples or victims identified despite the significant engineering effort invested in its development.

Created: 2026-04-15

Indicators

類似Pulses

類似するPulseは見つかりませんでした。

このPulseに関連する脅威アクター (事実ベース)

APT3

Score: 16.93
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1555.003 - Credentials from Web Browsers
  • T1016 - System Network Configuration Discovery
  • T1546.008 - Accessibility Features
  • T1083 - File and Directory Discovery
  • T1552.001 - Credentials In Files
  • T1018 - Remote System Discovery
MITREへのリンク →

Cobalt Group

Score: 11.68
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1055 - Process Injection
  • T1218.003 - CMSTP
  • T1068 - Exploitation for Privilege Escalation
  • T1046 - Network Service Discovery
MITREへのリンク →

Silence

Score: 6.65
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1055 - Process Injection
  • T1078 - Valid Accounts
  • T1018 - Remote System Discovery
MITREへのリンク →

Chimera

Score: 21.21
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1114.001 - Local Email Collection
  • T1007 - System Service Discovery
  • T1110.003 - Password Spraying
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1078 - Valid Accounts
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1003.003 - NTDS
MITREへのリンク →

Patchwork

Score: 8.80
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1598.003 - Spearphishing Link
  • T1555.003 - Credentials from Web Browsers
  • T1083 - File and Directory Discovery
  • T1189 - Drive-by Compromise
MITREへのリンク →

Daggerfly

Score: 8.87
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1003.002 - Security Account Manager
  • T1036.003 - Rename Legitimate Utilities
  • T1189 - Drive-by Compromise
MITREへのリンク →

FIN7

Score: 33.53
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1587.001 - Malware
  • T1091 - Replication Through Removable Media
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1027.016 - Junk Code Insertion
  • T1218.005 - Mshta
  • T1608.005 - Link Target
  • T1591 - Gather Victim Org Information
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1591.004 - Identify Roles
  • T1008 - Fallback Channels
MITREへのリンク →

TA2541

Score: 11.39
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1027.013 - Encrypted/Encoded File
  • T1608.001 - Upload Malware
  • T1055 - Process Injection
  • T1218.005 - Mshta
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

GALLIUM

Score: 14.60
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1003.002 - Security Account Manager
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1078 - Valid Accounts
  • T1036.003 - Rename Legitimate Utilities
  • T1018 - Remote System Discovery
MITREへのリンク →

Sandworm Team

Score: 32.50
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1056.001 - Keylogging
  • T1587.001 - Malware
  • T1213.006 - Databases
  • T1598.003 - Spearphishing Link
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1555.003 - Credentials from Web Browsers
  • T1083 - File and Directory Discovery
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1499 - Endpoint Denial of Service
  • T1018 - Remote System Discovery
  • T1003.003 - NTDS
MITREへのリンク →

BlackByte

Score: 27.54
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1055 - Process Injection
  • T1016 - System Network Configuration Discovery
  • T1491.001 - Internal Defacement
  • T1134.003 - Make and Impersonate Token
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1486 - Data Encrypted for Impact
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
MITREへのリンク →

HEXANE

Score: 25.86
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1056.001 - Keylogging
  • T1583.002 - DNS Server
  • T1608.001 - Upload Malware
  • T1589 - Gather Victim Identity Information
  • T1555.003 - Credentials from Web Browsers
  • T1110.003 - Password Spraying
  • T1016 - System Network Configuration Discovery
  • T1110 - Brute Force
  • T1591.004 - Identify Roles
  • T1018 - Remote System Discovery
MITREへのリンク →

Mustang Panda

Score: 33.86
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1560.003 - Archive via Custom Method
  • T1587.001 - Malware
  • T1598.003 - Spearphishing Link
  • T1091 - Replication Through Removable Media
  • T1608.001 - Upload Malware
  • T1027.016 - Junk Code Insertion
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1218.005 - Mshta
  • T1052.001 - Exfiltration over USB
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1003.003 - NTDS
MITREへのリンク →

Magic Hound

Score: 34.61
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
  • T1114.001 - Local Email Collection
  • T1598.003 - Spearphishing Link
  • T1190 - Exploit Public-Facing Application
  • T1589 - Gather Victim Identity Information
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1562.001 - Disable or Modify Tools
  • T1486 - Data Encrypted for Impact
  • T1573 - Encrypted Channel
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

FIN13

Score: 29.56
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1589 - Gather Victim Identity Information
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1552.001 - Credentials In Files
  • T1134.003 - Make and Impersonate Token
  • T1046 - Network Service Discovery
  • T1003.003 - NTDS
MITREへのリンク →

ToddyCat

Score: 9.65
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1190 - Exploit Public-Facing Application
  • T1083 - File and Directory Discovery
  • T1018 - Remote System Discovery
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Blue Mockingbird

Score: 8.13
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1027.013 - Encrypted/Encoded File
  • T1190 - Exploit Public-Facing Application
  • T1134 - Access Token Manipulation
MITREへのリンク →

Molerats

Score: 3.28
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1555.003 - Credentials from Web Browsers
MITREへのリンク →

Storm-0501

Score: 15.82
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1484.002 - Trust Modification
  • T1190 - Exploit Public-Facing Application
  • T1110 - Brute Force
  • T1486 - Data Encrypted for Impact
  • T1556.009 - Conditional Access Policies
MITREへのリンク →

APT29

Score: 42.88
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1003.002 - Security Account Manager
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1110.003 - Password Spraying
  • T1546.008 - Accessibility Features
  • T1550.003 - Pass the Ticket
  • T1649 - Steal or Forge Authentication Certificates
  • T1098.005 - Device Registration
  • T1218.005 - Mshta
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1573 - Encrypted Channel
  • T1027.006 - HTML Smuggling
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

APT39

Score: 16.37
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
  • T1190 - Exploit Public-Facing Application
  • T1083 - File and Directory Discovery
  • T1110 - Brute Force
  • T1078 - Valid Accounts
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
MITREへのリンク →

FIN8

Score: 10.22
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1486 - Data Encrypted for Impact
  • T1018 - Remote System Discovery
MITREへのリンク →

Wizard Spider

Score: 24.60
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1003.002 - Security Account Manager
  • T1055 - Process Injection
  • T1518.002 - Backup Software Discovery
  • T1016 - System Network Configuration Discovery
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1555.004 - Windows Credential Manager
  • T1018 - Remote System Discovery
  • T1003.003 - NTDS
MITREへのリンク →

Higaisa

Score: 4.29
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1027.013 - Encrypted/Encoded File
  • T1016 - System Network Configuration Discovery
MITREへのリンク →

APT41

Score: 50.49
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1190 - Exploit Public-Facing Application
  • T1055 - Process Injection
  • T1555.003 - Credentials from Web Browsers
  • T1016 - System Network Configuration Discovery
  • T1546.008 - Accessibility Features
  • T1083 - File and Directory Discovery
  • T1071.002 - File Transfer Protocols
  • T1110 - Brute Force
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1595.003 - Wordlist Scanning
  • T1213.003 - Code Repositories
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1596.005 - Scan Databases
  • T1003.003 - NTDS
  • T1008 - Fallback Channels
MITREへのリンク →

Earth Lusca

Score: 19.52
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1007 - System Service Discovery
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1218.005 - Mshta
  • T1584.006 - Web Services
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
MITREへのリンク →

Ember Bear

Score: 24.50
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1003.002 - Security Account Manager
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1110.003 - Password Spraying
  • T1552.001 - Credentials In Files
  • T1110 - Brute Force
  • T1562.001 - Disable or Modify Tools
  • T1595.001 - Scanning IP Blocks
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
MITREへのリンク →

APT42

Score: 12.79
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1056.001 - Keylogging
  • T1608.001 - Upload Malware
  • T1070.008 - Clear Mailbox Data
  • T1555.003 - Credentials from Web Browsers
  • T1016 - System Network Configuration Discovery
MITREへのリンク →

Naikon

Score: 6.00
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1016 - System Network Configuration Discovery
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
MITREへのリンク →

RedCurl

Score: 15.84
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1114.001 - Local Email Collection
  • T1587.001 - Malware
  • T1555.003 - Credentials from Web Browsers
  • T1083 - File and Directory Discovery
  • T1552.001 - Credentials In Files
  • T1046 - Network Service Discovery
MITREへのリンク →

Moonstone Sleet

Score: 18.96
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1027.013 - Encrypted/Encoded File
  • T1587.001 - Malware
  • T1598.003 - Spearphishing Link
  • T1608.001 - Upload Malware
  • T1016 - System Network Configuration Discovery
  • T1591 - Gather Victim Org Information
  • T1486 - Data Encrypted for Impact
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

APT32

Score: 39.61
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
  • T1598.003 - Spearphishing Link
  • T1608.001 - Upload Malware
  • T1036 - Masquerading
  • T1055 - Process Injection
  • T1589 - Gather Victim Identity Information
  • T1027.016 - Junk Code Insertion
  • T1016 - System Network Configuration Discovery
  • T1550.003 - Pass the Ticket
  • T1083 - File and Directory Discovery
  • T1218.005 - Mshta
  • T1068 - Exploitation for Privilege Escalation
  • T1036.003 - Rename Legitimate Utilities
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
MITREへのリンク →

Fox Kitten

Score: 22.58
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1027.013 - Encrypted/Encoded File
  • T1190 - Exploit Public-Facing Application
  • T1546.008 - Accessibility Features
  • T1083 - File and Directory Discovery
  • T1552.001 - Credentials In Files
  • T1110 - Brute Force
  • T1078 - Valid Accounts
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1003.003 - NTDS
MITREへのリンク →

APT33

Score: 15.25
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1027.013 - Encrypted/Encoded File
  • T1555.003 - Credentials from Web Browsers
  • T1110.003 - Password Spraying
  • T1552.001 - Credentials In Files
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
MITREへのリンク →

OilRig

Score: 41.51
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1608.001 - Upload Malware
  • T1036 - Masquerading
  • T1555.003 - Credentials from Web Browsers
  • T1016 - System Network Configuration Discovery
  • T1552.001 - Credentials In Files
  • T1110 - Brute Force
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1137.004 - Outlook Home Page
  • T1555.004 - Windows Credential Manager
  • T1046 - Network Service Discovery
  • T1008 - Fallback Channels
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

APT38

Score: 20.97
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1056.001 - Keylogging
  • T1055 - Process Injection
  • T1083 - File and Directory Discovery
  • T1218.005 - Mshta
  • T1110 - Brute Force
  • T1562.001 - Disable or Modify Tools
  • T1486 - Data Encrypted for Impact
  • T1036.003 - Rename Legitimate Utilities
  • T1189 - Drive-by Compromise
MITREへのリンク →

menuPass

Score: 25.72
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
  • T1003.002 - Security Account Manager
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1078 - Valid Accounts
  • T1036.003 - Rename Legitimate Utilities
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1003.003 - NTDS
MITREへのリンク →

FIN6

Score: 27.38
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.003 - Archive via Custom Method
  • T1213.006 - Databases
  • T1555.003 - Credentials from Web Browsers
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1134 - Access Token Manipulation
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1003.003 - NTDS
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

LuminousMoth

Score: 13.47
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1587.001 - Malware
  • T1091 - Replication Through Removable Media
  • T1608.001 - Upload Malware
  • T1083 - File and Directory Discovery
  • T1608.005 - Link Target
MITREへのリンク →

Lazarus Group

Score: 40.99
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
  • T1560.003 - Archive via Custom Method
  • T1587.001 - Malware
  • T1110.003 - Password Spraying
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1218.005 - Mshta
  • T1491.001 - Internal Defacement
  • T1591 - Gather Victim Org Information
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1036.003 - Rename Legitimate Utilities
  • T1189 - Drive-by Compromise
  • T1046 - Network Service Discovery
  • T1008 - Fallback Channels
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

BRONZE BUTLER

Score: 21.62
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1007 - System Service Discovery
  • T1036 - Masquerading
  • T1550.003 - Pass the Ticket
  • T1083 - File and Directory Discovery
  • T1562.001 - Disable or Modify Tools
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
  • T1053.002 - At
MITREへのリンク →

Winter Vivern

Score: 14.85
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1114.001 - Local Email Collection
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1083 - File and Directory Discovery
  • T1584.006 - Web Services
  • T1189 - Drive-by Compromise
MITREへのリンク →

Dragonfly

Score: 31.49
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1003.002 - Security Account Manager
  • T1598.003 - Spearphishing Link
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1598.002 - Spearphishing Attachment
  • T1071.002 - File Transfer Protocols
  • T1110 - Brute Force
  • T1078 - Valid Accounts
  • T1187 - Forced Authentication
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
  • T1003.003 - NTDS
MITREへのリンク →

MuddyWater

Score: 23.52
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1190 - Exploit Public-Facing Application
  • T1218.003 - CMSTP
  • T1555.003 - Credentials from Web Browsers
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1552.001 - Credentials In Files
  • T1218.005 - Mshta
  • T1562.001 - Disable or Modify Tools
  • T1027.004 - Compile After Delivery
MITREへのリンク →

Gamaredon Group

Score: 25.03
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1091 - Replication Through Removable Media
  • T1608.001 - Upload Malware
  • T1055 - Process Injection
  • T1027.016 - Junk Code Insertion
  • T1083 - File and Directory Discovery
  • T1218.005 - Mshta
  • T1491.001 - Internal Defacement
  • T1562.001 - Disable or Modify Tools
  • T1027.004 - Compile After Delivery
MITREへのリンク →

Kimsuky

Score: 46.56
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1560.003 - Archive via Custom Method
  • T1587.001 - Malware
  • T1598.003 - Spearphishing Link
  • T1007 - System Service Discovery
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1055 - Process Injection
  • T1555.003 - Credentials from Web Browsers
  • T1027.016 - Junk Code Insertion
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1552.001 - Credentials In Files
  • T1218.005 - Mshta
  • T1591 - Gather Victim Org Information
  • T1071.002 - File Transfer Protocols
  • T1562.001 - Disable or Modify Tools
  • T1593.001 - Social Media
MITREへのリンク →

Stealth Falcon

Score: 8.37
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1555.003 - Credentials from Web Browsers
  • T1016 - System Network Configuration Discovery
  • T1555.004 - Windows Credential Manager
MITREへのリンク →

BITTER

Score: 10.51
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1027.013 - Encrypted/Encoded File
  • T1608.001 - Upload Malware
  • T1068 - Exploitation for Privilege Escalation
  • T1573 - Encrypted Channel
MITREへのリンク →

Confucius

Score: 4.86
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1083 - File and Directory Discovery
  • T1218.005 - Mshta
MITREへのリンク →

APT37

Score: 7.50
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1055 - Process Injection
  • T1555.003 - Credentials from Web Browsers
  • T1189 - Drive-by Compromise
MITREへのリンク →

HAFNIUM

Score: 18.40
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1583.005 - Botnet
  • T1190 - Exploit Public-Facing Application
  • T1110.003 - Password Spraying
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1068 - Exploitation for Privilege Escalation
  • T1018 - Remote System Discovery
  • T1003.003 - NTDS
MITREへのリンク →

CopyKittens

Score: 4.75
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1560.003 - Archive via Custom Method
MITREへのリンク →

Volt Typhoon

Score: 43.46
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1007 - System Service Discovery
  • T1584.003 - Virtual Private Server
  • T1190 - Exploit Public-Facing Application
  • T1589 - Gather Victim Identity Information
  • T1555.003 - Credentials from Web Browsers
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1591 - Gather Victim Org Information
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1587.004 - Exploits
  • T1591.004 - Identify Roles
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1596.005 - Scan Databases
  • T1003.003 - NTDS
MITREへのリンク →

APT1

Score: 8.87
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1114.001 - Local Email Collection
  • T1007 - System Service Discovery
  • T1016 - System Network Configuration Discovery
MITREへのリンク →

Play

Score: 12.69
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1018 - Remote System Discovery
MITREへのリンク →

Sea Turtle

Score: 27.53
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1583.002 - DNS Server
  • T1114.001 - Local Email Collection
  • T1213.006 - Databases
  • T1190 - Exploit Public-Facing Application
  • T1078 - Valid Accounts
  • T1608.003 - Install Digital Certificate
  • T1584.002 - DNS Server
  • T1027.004 - Compile After Delivery
MITREへのリンク →

APT5

Score: 15.19
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1583.005 - Botnet
  • T1190 - Exploit Public-Facing Application
  • T1055 - Process Injection
  • T1083 - File and Directory Discovery
MITREへのリンク →

Agrius

Score: 18.22
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1003.002 - Security Account Manager
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1110.003 - Password Spraying
  • T1110 - Brute Force
  • T1562.001 - Disable or Modify Tools
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
MITREへのリンク →

APT28

Score: 40.83
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
  • T1598.003 - Spearphishing Link
  • T1091 - Replication Through Removable Media
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1110.003 - Password Spraying
  • T1083 - File and Directory Discovery
  • T1591 - Gather Victim Org Information
  • T1110 - Brute Force
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1189 - Drive-by Compromise
  • T1498 - Network Denial of Service
  • T1137.002 - Office Test
  • T1003.003 - NTDS
MITREへのリンク →

Turla

Score: 36.16
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1587.001 - Malware
  • T1213.006 - Databases
  • T1007 - System Service Discovery
  • T1584.003 - Virtual Private Server
  • T1055 - Process Injection
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1110 - Brute Force
  • T1562.001 - Disable or Modify Tools
  • T1584.006 - Web Services
  • T1068 - Exploitation for Privilege Escalation
  • T1555.004 - Windows Credential Manager
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
MITREへのリンク →

Sowbug

Score: 4.83
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1083 - File and Directory Discovery
MITREへのリンク →

UNC3886

Score: 30.88
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1560.003 - Archive via Custom Method
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1681 - Search Threat Vendor Data
  • T1083 - File and Directory Discovery
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1587.004 - Exploits
  • T1059.012 - Hypervisor CLI
  • T1008 - Fallback Channels
MITREへのリンク →

Ke3chang

Score: 24.13
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1056.001 - Keylogging
  • T1003.002 - Security Account Manager
  • T1587.001 - Malware
  • T1583.005 - Botnet
  • T1007 - System Service Discovery
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1078 - Valid Accounts
  • T1018 - Remote System Discovery
  • T1003.003 - NTDS
MITREへのリンク →

Lotus Blossom

Score: 14.67
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1560.003 - Archive via Custom Method
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1134 - Access Token Manipulation
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
MITREへのリンク →

Aquatic Panda

Score: 5.91
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1007 - System Service Discovery
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

INC Ransom

Score: 10.39
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1190 - Exploit Public-Facing Application
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1046 - Network Service Discovery
MITREへのリンク →

Akira

Score: 13.24
Matched TTPs:
  • T1560.001 - Archive via Utility
  • T1558 - Steal or Forge Kerberos Tickets
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1018 - Remote System Discovery
MITREへのリンク →

Ajax Security Team

Score: 6.51
Matched TTPs:
  • T1056.001 - Keylogging
  • T1555.003 - Credentials from Web Browsers
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Darkhotel

Score: 11.10
Matched TTPs:
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
  • T1091 - Replication Through Removable Media
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1189 - Drive-by Compromise
MITREへのリンク →

Tonto Team

Score: 4.03
Matched TTPs:
  • T1056.001 - Keylogging
  • T1068 - Exploitation for Privilege Escalation
MITREへのリンク →

Threat Group-3390

Score: 23.47
Matched TTPs:
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
  • T1003.002 - Security Account Manager
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1053.002 - At
MITREへのリンク →

Group5

Score: 3.53
Matched TTPs:
  • T1056.001 - Keylogging
  • T1027.013 - Encrypted/Encoded File
MITREへのリンク →

PLATINUM

Score: 10.44
Matched TTPs:
  • T1056.001 - Keylogging
  • T1036 - Masquerading
  • T1055 - Process Injection
  • T1068 - Exploitation for Privilege Escalation
  • T1189 - Drive-by Compromise
MITREへのリンク →

FIN4

Score: 3.36
Matched TTPs:
  • T1056.001 - Keylogging
  • T1078 - Valid Accounts
MITREへのリンク →

Contagious Interview

Score: 28.91
Matched TTPs:
  • T1588.007 - Artificial Intelligence
  • T1027.013 - Encrypted/Encoded File
  • T1587.001 - Malware
  • T1608.001 - Upload Malware
  • T1036 - Masquerading
  • T1589 - Gather Victim Identity Information
  • T1681 - Search Threat Vendor Data
  • T1083 - File and Directory Discovery
  • T1562.001 - Disable or Modify Tools
  • T1593.001 - Social Media
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Inception

Score: 7.29
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1555.003 - Credentials from Web Browsers
  • T1083 - File and Directory Discovery
  • T1218.005 - Mshta
MITREへのリンク →

Dark Caracal

Score: 7.18
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1083 - File and Directory Discovery
  • T1189 - Drive-by Compromise
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Elderwood

Score: 3.36
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1189 - Drive-by Compromise
MITREへのリンク →

Transparent Tribe

Score: 3.36
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1189 - Drive-by Compromise
MITREへのリンク →

APT18

Score: 8.16
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1083 - File and Directory Discovery
  • T1078 - Valid Accounts
  • T1053.002 - At
MITREへのリンク →

Leviathan

Score: 10.10
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1190 - Exploit Public-Facing Application
  • T1078 - Valid Accounts
  • T1587.004 - Exploits
  • T1189 - Drive-by Compromise
MITREへのリンク →

Sidewinder

Score: 12.78
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1598.003 - Spearphishing Link
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1218.005 - Mshta
  • T1598.002 - Spearphishing Attachment
MITREへのリンク →

Saint Bear

Score: 5.36
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1608.001 - Upload Malware
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

TA505

Score: 12.28
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1608.001 - Upload Malware
  • T1555.003 - Credentials from Web Browsers
  • T1552.001 - Credentials In Files
  • T1562.001 - Disable or Modify Tools
  • T1486 - Data Encrypted for Impact
MITREへのリンク →

APT19

Score: 4.83
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1016 - System Network Configuration Discovery
  • T1189 - Drive-by Compromise
MITREへのリンク →

Malteiro

Score: 3.65
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1555.003 - Credentials from Web Browsers
MITREへのリンク →

Storm-1811

Score: 8.64
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1036 - Masquerading
  • T1486 - Data Encrypted for Impact
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Tropic Trooper

Score: 16.92
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1091 - Replication Through Removable Media
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1052.001 - Exfiltration over USB
  • T1573 - Encrypted Channel
  • T1046 - Network Service Discovery
MITREへのリンク →

Whitefly

Score: 3.69
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1068 - Exploitation for Privilege Escalation
MITREへのリンク →

Moses Staff

Score: 6.63
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
MITREへのリンク →

TeamTNT

Score: 23.36
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1608.001 - Upload Malware
  • T1036 - Masquerading
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1552.001 - Credentials In Files
  • T1562.001 - Disable or Modify Tools
  • T1595.001 - Scanning IP Blocks
  • T1046 - Network Service Discovery
MITREへのリンク →

Putter Panda

Score: 3.39
Matched TTPs:
  • T1027.013 - Encrypted/Encoded File
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

Mustard Tempest

Score: 8.28
Matched TTPs:
  • T1583.008 - Malvertising
  • T1608.001 - Upload Malware
  • T1189 - Drive-by Compromise
MITREへのリンク →

Axiom

Score: 11.79
Matched TTPs:
  • T1583.002 - DNS Server
  • T1190 - Exploit Public-Facing Application
  • T1546.008 - Accessibility Features
  • T1078 - Valid Accounts
  • T1189 - Drive-by Compromise
MITREへのリンク →

Indrik Spider

Score: 14.25
Matched TTPs:
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1552.001 - Credentials In Files
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1018 - Remote System Discovery
MITREへのリンク →

Salt Typhoon

Score: 3.57
Matched TTPs:
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
MITREへのリンク →

Aoqin Dragon

Score: 8.62
Matched TTPs:
  • T1587.001 - Malware
  • T1091 - Replication Through Removable Media
  • T1036 - Masquerading
  • T1083 - File and Directory Discovery
MITREへのリンク →

Scattered Spider

Score: 47.13
Matched TTPs:
  • T1484.002 - Trust Modification
  • T1598.003 - Spearphishing Link
  • T1070.008 - Clear Mailbox Data
  • T1589 - Gather Victim Identity Information
  • T1598.004 - Spearphishing Voice
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1552.001 - Credentials In Files
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1486 - Data Encrypted for Impact
  • T1556.009 - Conditional Access Policies
  • T1213.003 - Code Repositories
  • T1018 - Remote System Discovery
  • T1538 - Cloud Service Dashboard
  • T1003.003 - NTDS
MITREへのリンク →

Silent Librarian

Score: 10.47
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1110.003 - Password Spraying
  • T1608.005 - Link Target
  • T1078 - Valid Accounts
MITREへのリンク →

ZIRCONIUM

Score: 10.26
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1036 - Masquerading
  • T1555.003 - Credentials from Web Browsers
  • T1016 - System Network Configuration Discovery
  • T1068 - Exploitation for Privilege Escalation
MITREへのリンク →

Star Blizzard

Score: 12.41
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1608.001 - Upload Malware
  • T1589 - Gather Victim Identity Information
  • T1598.002 - Spearphishing Attachment
  • T1078 - Valid Accounts
MITREへのリンク →

CURIUM

Score: 10.37
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1584.006 - Web Services
  • T1189 - Drive-by Compromise
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

admin@338

Score: 5.29
Matched TTPs:
  • T1007 - System Service Discovery
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
MITREへのリンク →

LazyScripter

Score: 6.50
Matched TTPs:
  • T1608.001 - Upload Malware
  • T1036 - Masquerading
  • T1218.005 - Mshta
MITREへのリンク →

SideCopy

Score: 9.41
Matched TTPs:
  • T1608.001 - Upload Malware
  • T1016 - System Network Configuration Discovery
  • T1218.005 - Mshta
  • T1598.002 - Spearphishing Attachment
MITREへのリンク →

EXOTIC LILY

Score: 8.34
Matched TTPs:
  • T1608.001 - Upload Malware
  • T1593.001 - Social Media
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

Rocke

Score: 10.20
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1562.001 - Disable or Modify Tools
  • T1027.004 - Compile After Delivery
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
MITREへのリンク →

BackdoorDiplomacy

Score: 3.24
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1046 - Network Service Discovery
MITREへのリンク →

BlackTech

Score: 3.24
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1046 - Network Service Discovery
MITREへのリンク →

Medusa Group

Score: 19.99
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1016 - System Network Configuration Discovery
  • T1083 - File and Directory Discovery
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1486 - Data Encrypted for Impact
  • T1650 - Acquire Access
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
  • T1003.003 - NTDS
MITREへのリンク →

Volatile Cedar

Score: 5.60
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1595.003 - Wordlist Scanning
MITREへのリンク →

Windshift

Score: 6.48
Matched TTPs:
  • T1036 - Masquerading
  • T1189 - Drive-by Compromise
  • T1566.003 - Spearphishing via Service
MITREへのリンク →

TA551

Score: 4.53
Matched TTPs:
  • T1036 - Masquerading
  • T1218.005 - Mshta
MITREへのリンク →

Velvet Ant

Score: 5.55
Matched TTPs:
  • T1055 - Process Injection
  • T1083 - File and Directory Discovery
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

LAPSUS$

Score: 26.57
Matched TTPs:
  • T1589 - Gather Victim Identity Information
  • T1555.003 - Credentials from Web Browsers
  • T1598.004 - Spearphishing Voice
  • T1078 - Valid Accounts
  • T1068 - Exploitation for Privilege Escalation
  • T1584.002 - DNS Server
  • T1591.004 - Identify Roles
  • T1213.003 - Code Repositories
  • T1003.003 - NTDS
MITREへのリンク →

Leafminer

Score: 18.23
Matched TTPs:
  • T1555.003 - Credentials from Web Browsers
  • T1110.003 - Password Spraying
  • T1055.013 - Process Doppelgänging
  • T1083 - File and Directory Discovery
  • T1552.001 - Credentials In Files
  • T1189 - Drive-by Compromise
  • T1018 - Remote System Discovery
  • T1046 - Network Service Discovery
MITREへのリンク →

Deep Panda

Score: 4.83
Matched TTPs:
  • T1546.008 - Accessibility Features
  • T1018 - Remote System Discovery
MITREへのリンク →

Windigo

Score: 3.06
Matched TTPs:
  • T1083 - File and Directory Discovery
  • T1189 - Drive-by Compromise
MITREへのリンク →

SilverTerrier

Score: 3.62
Matched TTPs:
  • T1071.002 - File Transfer Protocols
MITREへのリンク →

DarkVishnya

Score: 4.29
Matched TTPs:
  • T1110 - Brute Force
  • T1046 - Network Service Discovery
MITREへのリンク →

FIN5

Score: 5.49
Matched TTPs:
  • T1110 - Brute Force
  • T1078 - Valid Accounts
  • T1018 - Remote System Discovery
MITREへのリンク →

Suckfly

Score: 3.19
Matched TTPs:
  • T1078 - Valid Accounts
  • T1046 - Network Service Discovery
MITREへのリンク →

DarkHydrus

Score: 4.13
Matched TTPs:
  • T1187 - Forced Authentication
MITREへのリンク →

Equation

Score: 4.13
Matched TTPs:
  • T1564.005 - Hidden File System
MITREへのリンク →

Strider

Score: 4.13
Matched TTPs:
  • T1564.005 - Hidden File System
MITREへのリンク →

このPulseに関連する脅威アクター (推論ベース)

APT41

Score: 0.70
Matched TTPs:
  • T1018 - Remote System Discovery
  • T1003.003 - NTDS
  • T1560.001 - Archive via Utility
  • T1213.003 - Code Repositories
  • T1078 - Valid Accounts
  • T1071.002 - File Transfer Protocols
  • T1053.005 - Scheduled Task
  • T1596.005 - Scan Databases
  • T1056.001 - Keylogging
  • T1110 - Brute Force
  • T1595.003 - Wordlist Scanning
  • T1083 - File and Directory Discovery
  • T1003.002 - Security Account Manager
  • T1046 - Network Service Discovery
  • T1555.003 - Credentials from Web Browsers
  • T1486 - Data Encrypted for Impact
  • T1016 - System Network Configuration Discovery
  • T1190 - Exploit Public-Facing Application
  • T1008 - Fallback Channels
  • T1546.008 - Accessibility Features
  • T1055 - Process Injection
MITREへのリンク →

Scattered Spider

Score: 0.65
Matched TTPs:
  • T1083 - File and Directory Discovery
  • T1068 - Exploitation for Privilege Escalation
  • T1018 - Remote System Discovery
  • T1589 - Gather Victim Identity Information
  • T1538 - Cloud Service Dashboard
  • T1003.003 - NTDS
  • T1484.002 - Trust Modification
  • T1486 - Data Encrypted for Impact
  • T1562.001 - Disable or Modify Tools
  • T1213.003 - Code Repositories
  • T1016 - System Network Configuration Discovery
  • T1556.009 - Conditional Access Policies
  • T1552.001 - Credentials In Files
  • T1070.008 - Clear Mailbox Data
  • T1078 - Valid Accounts
  • T1598.004 - Spearphishing Voice
  • T1598.003 - Spearphishing Link
MITREへのリンク →

Kimsuky

Score: 0.65
Matched TTPs:
  • T1007 - System Service Discovery
  • T1593.001 - Social Media
  • T1560.001 - Archive via Utility
  • T1552.001 - Credentials In Files
  • T1071.002 - File Transfer Protocols
  • T1053.005 - Scheduled Task
  • T1591 - Gather Victim Org Information
  • T1056.001 - Keylogging
  • T1083 - File and Directory Discovery
  • T1608.001 - Upload Malware
  • T1555.003 - Credentials from Web Browsers
  • T1218.005 - Mshta
  • T1016 - System Network Configuration Discovery
  • T1598.003 - Spearphishing Link
  • T1027.016 - Junk Code Insertion
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1562.001 - Disable or Modify Tools
  • T1560.003 - Archive via Custom Method
  • T1055 - Process Injection
MITREへのリンク →

Volt Typhoon

Score: 0.60
Matched TTPs:
  • T1083 - File and Directory Discovery
  • T1068 - Exploitation for Privilege Escalation
  • T1018 - Remote System Discovery
  • T1596.005 - Scan Databases
  • T1007 - System Service Discovery
  • T1589 - Gather Victim Identity Information
  • T1046 - Network Service Discovery
  • T1591 - Gather Victim Org Information
  • T1003.003 - NTDS
  • T1056.001 - Keylogging
  • T1555.003 - Credentials from Web Browsers
  • T1591.004 - Identify Roles
  • T1190 - Exploit Public-Facing Application
  • T1584.003 - Virtual Private Server
  • T1560.001 - Archive via Utility
  • T1016 - System Network Configuration Discovery
  • T1078 - Valid Accounts
  • T1587.004 - Exploits
MITREへのリンク →

APT29

Score: 0.59
Matched TTPs:
  • T1068 - Exploitation for Privilege Escalation
  • T1566.003 - Spearphishing via Service
  • T1003.002 - Security Account Manager
  • T1649 - Steal or Forge Authentication Certificates
  • T1110.003 - Password Spraying
  • T1587.001 - Malware
  • T1550.003 - Pass the Ticket
  • T1098.005 - Device Registration
  • T1190 - Exploit Public-Facing Application
  • T1218.005 - Mshta
  • T1027.006 - HTML Smuggling
  • T1573 - Encrypted Channel
  • T1546.008 - Accessibility Features
  • T1078 - Valid Accounts
  • T1053.005 - Scheduled Task
MITREへのリンク →

OilRig

Score: 0.58
Matched TTPs:
  • T1068 - Exploitation for Privilege Escalation
  • T1566.003 - Spearphishing via Service
  • T1007 - System Service Discovery
  • T1046 - Network Service Discovery
  • T1608.001 - Upload Malware
  • T1056.001 - Keylogging
  • T1587.001 - Malware
  • T1555.003 - Credentials from Web Browsers
  • T1137.004 - Outlook Home Page
  • T1110 - Brute Force
  • T1555.004 - Windows Credential Manager
  • T1078 - Valid Accounts
  • T1016 - System Network Configuration Discovery
  • T1008 - Fallback Channels
  • T1552.001 - Credentials In Files
  • T1027.013 - Encrypted/Encoded File
  • T1053.005 - Scheduled Task
  • T1036 - Masquerading
MITREへのリンク →

Lazarus Group

Score: 0.57
Matched TTPs:
  • T1083 - File and Directory Discovery
  • T1566.003 - Spearphishing via Service
  • T1189 - Drive-by Compromise
  • T1491.001 - Internal Defacement
  • T1046 - Network Service Discovery
  • T1591 - Gather Victim Org Information
  • T1056.001 - Keylogging
  • T1587.001 - Malware
  • T1110.003 - Password Spraying
  • T1218.005 - Mshta
  • T1562.001 - Disable or Modify Tools
  • T1078 - Valid Accounts
  • T1016 - System Network Configuration Discovery
  • T1008 - Fallback Channels
  • T1036.003 - Rename Legitimate Utilities
  • T1027.013 - Encrypted/Encoded File
  • T1560.003 - Archive via Custom Method
  • T1053.005 - Scheduled Task
MITREへのリンク →

APT28

Score: 0.57
Matched TTPs:
  • T1083 - File and Directory Discovery
  • T1068 - Exploitation for Privilege Escalation
  • T1189 - Drive-by Compromise
  • T1498 - Network Denial of Service
  • T1003.003 - NTDS
  • T1591 - Gather Victim Org Information
  • T1137.002 - Office Test
  • T1056.001 - Keylogging
  • T1110.003 - Password Spraying
  • T1110 - Brute Force
  • T1190 - Exploit Public-Facing Application
  • T1560.001 - Archive via Utility
  • T1091 - Replication Through Removable Media
  • T1078 - Valid Accounts
  • T1027.013 - Encrypted/Encoded File
  • T1036 - Masquerading
  • T1598.003 - Spearphishing Link
MITREへのリンク →

Related CVEs

このPulseに見つかったCVEはありません。

Pulse – 脅威アクター グラフ


← Pulse一覧に戻る