G0008 Carbanak
Carbanak is a cybercriminal group that has used Carbanak malware to target financial institutions since at least 2013. Carbanak may be linked to groups tracked separately as Cobalt Group and FIN7 that have also used Carbanak malware.12345
Item | Value |
---|---|
ID | G0008 |
Associated Names | Anunak |
Version | 2.0 |
Created | 31 May 2017 |
Last Modified | 18 October 2021 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
Anunak | 6 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1543 | Create or Modify System Process | - |
enterprise | T1543.003 | Windows Service | Carbanak malware installs itself as a service to provide persistence and SYSTEM privileges.1 |
enterprise | T1562 | Impair Defenses | - |
enterprise | T1562.004 | Disable or Modify System Firewall | Carbanak may use netsh to add local firewall rule exceptions.7 |
enterprise | T1036 | Masquerading | - |
enterprise | T1036.004 | Masquerade Task or Service | Carbanak has copied legitimate service names to use for malicious services.1 |
enterprise | T1036.005 | Match Legitimate Name or Location | Carbanak has named malware “svchost.exe,” which is the name of the Windows shared service host program.1 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.002 | Tool | Carbanak has obtained and used open-source tools such as PsExec and Mimikatz.1 |
enterprise | T1219 | Remote Access Software | Carbanak used legitimate programs such as AmmyyAdmin and Team Viewer for remote interactive C2 to target systems.7 |
enterprise | T1218 | System Binary Proxy Execution | - |
enterprise | T1218.011 | Rundll32 | Carbanak installs VNC server software that executes through rundll32.1 |
enterprise | T1078 | Valid Accounts | Carbanak actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars.1 |
enterprise | T1102 | Web Service | - |
enterprise | T1102.002 | Bidirectional Communication | Carbanak has used a VBScript named “ggldr” that uses Google Apps Script, Sheets, and Forms services for C2.8 |
Software
References
-
Kaspersky Lab’s Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018. ↩↩↩↩↩↩↩↩↩↩
-
Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017. ↩
-
Europol. (2018, March 26). Mastermind Behind EUR 1 Billion Cyber Bank Robbery Arrested in Spain. Retrieved October 10, 2018. ↩
-
Secureworks. (n.d.). GOLD KINGSWOOD. Retrieved October 18, 2021. ↩
-
Prins, R. (2015, February 16). Anunak (aka Carbanak) Update. Retrieved January 20, 2017. ↩
-
Group-IB and Fox-IT. (2014, December). Anunak: APT against financial institutions. Retrieved April 20, 2016. ↩↩↩
-
Griffin, N. (2017, January 17). CARBANAK GROUP USES GOOGLE FOR MALWARE COMMAND-AND-CONTROL. Retrieved February 15, 2017. ↩