| enterprise |
T1071 |
Application Layer Protocol |
- |
| enterprise |
T1071.001 |
Web Protocols |
During Juicy Mix, OilRig used a VBS script to send POST requests to register installed malware with C2. |
| enterprise |
T1217 |
Browser Information Discovery |
During Juicy Mix, OilRig used the CDumper (Chrome browser) and EDumper (Edge browser) data stealers to collect cookies, browsing history, and credentials. |
| enterprise |
T1059 |
Command and Scripting Interpreter |
- |
| enterprise |
T1059.001 |
PowerShell |
During Juicy Mix, OilRig used a PowerShell script to steal credentials. |
| enterprise |
T1059.005 |
Visual Basic |
During Juicy Mix, OilRig used VBS droppers to deliver and establish persistence for the Mango backdoor. |
| enterprise |
T1584 |
Compromise Infrastructure |
- |
| enterprise |
T1584.004 |
Server |
During Juicy Mix, OilRig compromised an Israeli job portal to use for a C2 server. |
| enterprise |
T1555 |
Credentials from Password Stores |
- |
| enterprise |
T1555.003 |
Credentials from Web Browsers |
During Juicy Mix, OilRig used the CDumper (Chrome browser) and EDumper (Edge browser) to collect credentials. |
| enterprise |
T1555.004 |
Windows Credential Manager |
During Juicy Mix, OilRig used a Windows Credential Manager stealer for credential access. |
| enterprise |
T1132 |
Data Encoding |
- |
| enterprise |
T1132.001 |
Standard Encoding |
During Juicy Mix, OilRig used a VBS script to send the Base64-encoded name of the compromised computer to C2. |
| enterprise |
T1074 |
Data Staged |
- |
| enterprise |
T1074.001 |
Local Data Staging |
During Juicy Mix, OilRig used browser data and credential stealer tools to stage stolen files named Cupdate, Eupdate, and IUpdate in the %TEMP% directory. |
| enterprise |
T1140 |
Deobfuscate/Decode Files or Information |
During Juicy Mix, OilRig used a script to concatenate and deobfuscate encoded strings in Mango. |
| enterprise |
T1587 |
Develop Capabilities |
- |
| enterprise |
T1587.001 |
Malware |
For Juicy Mix, OilRig improved on Solar by developing the Mango backdoor. |
| enterprise |
T1053 |
Scheduled Task/Job |
- |
| enterprise |
T1053.005 |
Scheduled Task |
During Juicy Mix, OilRig used VBS droppers to schedule tasks for persistence. |
| enterprise |
T1518 |
Software Discovery |
During Juicy Mix, OilRig used browser data dumper tools to create a list of users with Google Chrome installed. |
| enterprise |
T1082 |
System Information Discovery |
During Juicy Mix, OilRig used a script to send the name of the compromised host via HTTP POST to register it with C2. |