APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Data from Cloud Storage - T1530 (3298ce88-1628-43b1-87d9-0b5336b193d7) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Asymmetric Cryptography - T1573.002 (bf176076-b789-408e-8cba-7275e81c0ada) |
Attack Pattern |
1 |
Domains - T1583.001 (40f5caa0-4cb7-4117-89fc-d421bb493df3) |
Attack Pattern |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Boot or Logon Autostart Execution - T1547 (1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Windows Management Instrumentation - T1047 (01a5a209-b94c-450b-b7f9-946497d91055) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Security Software Discovery - T1518.001 (cba37adb-d6fb-4610-b069-dd04c0643384) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Virtual Private Server - T1583.003 (79da0971-3147-4af6-a4f5-e8cd447cd795) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Indicator Removal - T1070 (799ace7f-e227-4411-baa0-8868704f2a69) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Credentials from Web Browsers - T1555.003 (58a3e6aa-4453-4cc8-a51f-4befe80b31a8) |
Attack Pattern |
1 |
Keylogging - T1056.001 (09a60ea3-a8d1-4ae5-976e-5783248b72a4) |
Attack Pattern |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Input Capture - T1056 (bb5a00de-e086-4859-a231-fa793f6797e2) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Email Accounts - T1585.002 (65013dd2-bc61-43e3-afb5-a14c4fa7437a) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Web Service - T1102 (830c9528-df21-472c-8c14-a036bf17d665) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Tool - T1588.002 (a2fdce72-04b2-409a-ac10-cc1695f4fce0) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Multi-Factor Authentication Interception - T1111 (dd43c543-bb85-4a6f-aa6e-160d90d06a49) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Spearphishing Link - T1566.002 (2b742742-28c3-4e1b-bab7-8350d6300fa7) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Modify Registry - T1112 (57340c81-c025-4189-8fa0-fc7ede51bae4) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) |
Malware |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Visual Basic - T1059.005 (dfd7cc1d-e1d8-4394-a198-97c4cab8aa67) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Screen Capture - T1113 (0259baeb-9f63-4c69-bf10-eb038c390688) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Steal Web Session Cookie - T1539 (10ffac09-e42d-4f56-ab20-db94c67d76ff) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Impersonation - T1656 (c9e0c59e-162e-40a4-b8b1-78fab4329ada) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Match Legitimate Resource Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Standard Encoding - T1132.001 (04fd5427-79c7-44ea-ae13-11b24778ff1c) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
System Network Configuration Discovery - T1016 (707399d6-ab3e-4963-9315-d9d3818cd6a0) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Clear Mailbox Data - T1070.008 (438c967d-3996-4870-bfc2-3954752a1927) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Upload Malware - T1608.001 (3ee16395-03f0-4690-a32e-69ce9ada0f9e) |
Attack Pattern |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
1 |
APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) |
Intrusion Set |
Local Account - T1087.001 (25659dd6-ea12-45c4-97e6-381e3e4b593e) |
Attack Pattern |
1 |
Encrypted Channel - T1573 (b8902400-e6c5-4ba2-95aa-2d35b442b118) |
Attack Pattern |
Asymmetric Cryptography - T1573.002 (bf176076-b789-408e-8cba-7275e81c0ada) |
Attack Pattern |
2 |
Domains - T1583.001 (40f5caa0-4cb7-4117-89fc-d421bb493df3) |
Attack Pattern |
Acquire Infrastructure - T1583 (0458aab9-ad42-4eac-9e22-706a95bafee2) |
Attack Pattern |
2 |
Software Discovery - T1518 (e3b6daca-e963-4a69-aee6-ed4fd653ad58) |
Attack Pattern |
Security Software Discovery - T1518.001 (cba37adb-d6fb-4610-b069-dd04c0643384) |
Attack Pattern |
2 |
Virtual Private Server - T1583.003 (79da0971-3147-4af6-a4f5-e8cd447cd795) |
Attack Pattern |
Acquire Infrastructure - T1583 (0458aab9-ad42-4eac-9e22-706a95bafee2) |
Attack Pattern |
2 |
Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) |
Attack Pattern |
Scheduled Task/Job - T1053 (35dd844a-b219-4e2b-a6bb-efa9a75995a9) |
Attack Pattern |
2 |
Credentials from Password Stores - T1555 (3fc9b85a-2862-4363-a64d-d692e3ffbee0) |
Attack Pattern |
Credentials from Web Browsers - T1555.003 (58a3e6aa-4453-4cc8-a51f-4befe80b31a8) |
Attack Pattern |
2 |
Keylogging - T1056.001 (09a60ea3-a8d1-4ae5-976e-5783248b72a4) |
Attack Pattern |
Input Capture - T1056 (bb5a00de-e086-4859-a231-fa793f6797e2) |
Attack Pattern |
2 |
Establish Accounts - T1585 (cdfc5f0a-9bb9-4352-b896-553cfa2d8fd8) |
Attack Pattern |
Email Accounts - T1585.002 (65013dd2-bc61-43e3-afb5-a14c4fa7437a) |
Attack Pattern |
2 |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) |
Attack Pattern |
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) |
Attack Pattern |
2 |
Obtain Capabilities - T1588 (ce0687a0-e692-4b77-964a-0784a8e54ff1) |
Attack Pattern |
Tool - T1588.002 (a2fdce72-04b2-409a-ac10-cc1695f4fce0) |
Attack Pattern |
2 |
Spearphishing Link - T1566.002 (2b742742-28c3-4e1b-bab7-8350d6300fa7) |
Attack Pattern |
Phishing - T1566 (a62a8db3-f23a-4d8f-afd6-9dbc77e7813b) |
Attack Pattern |
2 |
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) |
Attack Pattern |
Application Layer Protocol - T1071 (355be19c-ffc9-46d5-8d50-d6a036c675b6) |
Attack Pattern |
2 |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) |
Attack Pattern |
NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) |
Malware |
2 |
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) |
Attack Pattern |
NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) |
Malware |
2 |
Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) |
Attack Pattern |
NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) |
Malware |
2 |
NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) |
Malware |
Asymmetric Cryptography - T1573.002 (bf176076-b789-408e-8cba-7275e81c0ada) |
Attack Pattern |
2 |
NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) |
Malware |
File Deletion - T1070.004 (d63a3fb8-9452-4e9d-a60a-54be68d5998c) |
Attack Pattern |
2 |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) |
Attack Pattern |
Visual Basic - T1059.005 (dfd7cc1d-e1d8-4394-a198-97c4cab8aa67) |
Attack Pattern |
2 |
Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) |
Attack Pattern |
Match Legitimate Resource Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) |
Attack Pattern |
2 |
Data Encoding - T1132 (cc7b8c4e-9be0-47ca-b0bb-83915ec3ee2f) |
Attack Pattern |
Standard Encoding - T1132.001 (04fd5427-79c7-44ea-ae13-11b24778ff1c) |
Attack Pattern |
2 |
Indicator Removal - T1070 (799ace7f-e227-4411-baa0-8868704f2a69) |
Attack Pattern |
Clear Mailbox Data - T1070.008 (438c967d-3996-4870-bfc2-3954752a1927) |
Attack Pattern |
2 |
Stage Capabilities - T1608 (84771bc3-f6a0-403e-b144-01af70e5fda0) |
Attack Pattern |
Upload Malware - T1608.001 (3ee16395-03f0-4690-a32e-69ce9ada0f9e) |
Attack Pattern |
2 |
Windows Management Instrumentation - T1047 (01a5a209-b94c-450b-b7f9-946497d91055) |
Attack Pattern |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
2 |
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) |
Attack Pattern |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
2 |
Security Software Discovery - T1518.001 (cba37adb-d6fb-4610-b069-dd04c0643384) |
Attack Pattern |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
2 |
Standard Encoding - T1132.001 (04fd5427-79c7-44ea-ae13-11b24778ff1c) |
Attack Pattern |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
2 |
Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) |
Attack Pattern |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
2 |
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) |
Attack Pattern |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
2 |
Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) |
Attack Pattern |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
2 |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
Symmetric Cryptography - T1573.001 (24bfaeba-cb0d-4525-b3dc-507c77ecec41) |
Attack Pattern |
2 |
Visual Basic - T1059.005 (dfd7cc1d-e1d8-4394-a198-97c4cab8aa67) |
Attack Pattern |
TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) |
Malware |
2 |
Local Account - T1087.001 (25659dd6-ea12-45c4-97e6-381e3e4b593e) |
Attack Pattern |
Account Discovery - T1087 (72b74d71-8169-42aa-92e0-e7b04b9f5a08) |
Attack Pattern |
2 |
Indicator Removal - T1070 (799ace7f-e227-4411-baa0-8868704f2a69) |
Attack Pattern |
File Deletion - T1070.004 (d63a3fb8-9452-4e9d-a60a-54be68d5998c) |
Attack Pattern |
3 |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) |
Attack Pattern |
Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) |
Attack Pattern |
3 |
Encrypted Channel - T1573 (b8902400-e6c5-4ba2-95aa-2d35b442b118) |
Attack Pattern |
Symmetric Cryptography - T1573.001 (24bfaeba-cb0d-4525-b3dc-507c77ecec41) |
Attack Pattern |
3 |