Skip to content

Hide Navigation Hide TOC

POORAIM (fe97ace3-9a80-42af-9eae-1f9245927e5d)

POORAIM malware is designed with basic backdoor functionality and leverages AOL Instant Messenger for command and control communications. POORAIM includes the following capabilities: System information enumeration, File browsing, manipulation and exfiltration, Process enumeration, Screen capture, File execution, Exfiltration of browser favorites, and battery status. Exfiltrated data is sent via files over AIM. POORAIM has been involved in campaigns against South Korean media organizations and sites relating to North Korean refugees and defectors since early 2014. Compromised sites have acted as watering holes to deliver newer variants of POORAIM.

Cluster A Galaxy A Cluster B Galaxy B Level
POORAIM - S0216 (53d47b09-09c2-4015-8d37-6633ecd53f79) Malware POORAIM (fe97ace3-9a80-42af-9eae-1f9245927e5d) Tool 1
System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) Attack Pattern POORAIM - S0216 (53d47b09-09c2-4015-8d37-6633ecd53f79) Malware 2
POORAIM - S0216 (53d47b09-09c2-4015-8d37-6633ecd53f79) Malware File and Directory Discovery - T1083 (7bc57495-ea59-4380-be31-a64af124ef18) Attack Pattern 2
POORAIM - S0216 (53d47b09-09c2-4015-8d37-6633ecd53f79) Malware Screen Capture - T1113 (0259baeb-9f63-4c69-bf10-eb038c390688) Attack Pattern 2
POORAIM - S0216 (53d47b09-09c2-4015-8d37-6633ecd53f79) Malware Drive-by Compromise - T1189 (d742a578-d70e-4d0e-96a6-02a9c30204e6) Attack Pattern 2
POORAIM - S0216 (53d47b09-09c2-4015-8d37-6633ecd53f79) Malware Process Discovery - T1057 (8f4a33ec-8b1f-4b80-a2f6-642b2e479580) Attack Pattern 2
POORAIM - S0216 (53d47b09-09c2-4015-8d37-6633ecd53f79) Malware Bidirectional Communication - T1102.002 (be055942-6e63-49d7-9fa1-9cb7d8a8f3f4) Attack Pattern 2
Web Service - T1102 (830c9528-df21-472c-8c14-a036bf17d665) Attack Pattern Bidirectional Communication - T1102.002 (be055942-6e63-49d7-9fa1-9cb7d8a8f3f4) Attack Pattern 3