enterprise |
T1110 |
Brute Force |
- |
enterprise |
T1110.003 |
Password Spraying |
Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.007 |
JavaScript |
Leafminer infected victims using JavaScript code. |
enterprise |
T1136 |
Create Account |
- |
enterprise |
T1136.001 |
Local Account |
Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine. |
enterprise |
T1555 |
Credentials from Password Stores |
Leafminer used several tools for retrieving login and password information, including LaZagne. |
enterprise |
T1555.003 |
Credentials from Web Browsers |
Leafminer used several tools for retrieving login and password information, including LaZagne. |
enterprise |
T1189 |
Drive-by Compromise |
Leafminer has infected victims using watering holes. |
enterprise |
T1114 |
Email Collection |
- |
enterprise |
T1114.002 |
Remote Email Collection |
Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords. |
enterprise |
T1083 |
File and Directory Discovery |
Leafminer used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files. |
enterprise |
T1046 |
Network Service Discovery |
Leafminer scanned network services to search for vulnerabilities in the victim system. |
enterprise |
T1027 |
Obfuscated Files or Information |
- |
enterprise |
T1027.010 |
Command Obfuscation |
Leafminer obfuscated scripts that were used on victim machines. |
enterprise |
T1588 |
Obtain Capabilities |
- |
enterprise |
T1588.002 |
Tool |
Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper. |
enterprise |
T1003 |
OS Credential Dumping |
- |
enterprise |
T1003.001 |
LSASS Memory |
Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz. |
enterprise |
T1003.004 |
LSA Secrets |
Leafminer used several tools for retrieving login and password information, including LaZagne. |
enterprise |
T1003.005 |
Cached Domain Credentials |
Leafminer used several tools for retrieving login and password information, including LaZagne. |
enterprise |
T1055 |
Process Injection |
- |
enterprise |
T1055.013 |
Process Doppelgänging |
Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems. |
enterprise |
T1018 |
Remote System Discovery |
Leafminer used Microsoft’s Sysinternals tools to gather detailed information about remote systems. |
enterprise |
T1552 |
Unsecured Credentials |
- |
enterprise |
T1552.001 |
Credentials In Files |
Leafminer used several tools for retrieving login and password information, including LaZagne. |