Skip to content

G0077 Leafminer

Leafminer is an Iranian threat group that has targeted government organizations and business entities in the Middle East since at least early 2017. 1

Item Value
ID G0077
Associated Names Raspite
Version 2.3
Created 17 October 2018
Last Modified 12 October 2021
Navigation Layer View In ATT&CK® Navigator

Associated Group Descriptions

Name Description
Raspite 2

Techniques Used

Domain ID Name Use
enterprise T1110 Brute Force -
enterprise T1110.003 Password Spraying Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.007 JavaScript Leafminer infected victims using JavaScript code.1
enterprise T1136 Create Account -
enterprise T1136.001 Local Account Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine.1
enterprise T1555 Credentials from Password Stores Leafminer used several tools for retrieving login and password information, including LaZagne.1
enterprise T1555.003 Credentials from Web Browsers Leafminer used several tools for retrieving login and password information, including LaZagne.1
enterprise T1189 Drive-by Compromise Leafminer has infected victims using watering holes.1
enterprise T1114 Email Collection -
enterprise T1114.002 Remote Email Collection Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords.1
enterprise T1083 File and Directory Discovery Leafminer used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files.1
enterprise T1046 Network Service Discovery Leafminer scanned network services to search for vulnerabilities in the victim system.1
enterprise T1027 Obfuscated Files or Information Leafminer obfuscated scripts that were used on victim machines.1
enterprise T1588 Obtain Capabilities -
enterprise T1588.002 Tool Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.1
enterprise T1003 OS Credential Dumping -
enterprise T1003.001 LSASS Memory Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz.1
enterprise T1003.004 LSA Secrets Leafminer used several tools for retrieving login and password information, including LaZagne.1
enterprise T1003.005 Cached Domain Credentials Leafminer used several tools for retrieving login and password information, including LaZagne.1
enterprise T1055 Process Injection -
enterprise T1055.013 Process Doppelgänging Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems.1
enterprise T1018 Remote System Discovery Leafminer used Microsoft’s Sysinternals tools to gather detailed information about remote systems.1
enterprise T1552 Unsecured Credentials -
enterprise T1552.001 Credentials In Files Leafminer used several tools for retrieving login and password information, including LaZagne.1

Software

ID Name References Techniques
S0349 LaZagne - Keychain:Credentials from Password Stores Credentials from Web Browsers:Credentials from Password Stores Windows Credential Manager:Credentials from Password Stores Credentials from Password Stores Cached Domain Credentials:OS Credential Dumping LSASS Memory:OS Credential Dumping Proc Filesystem:OS Credential Dumping LSA Secrets:OS Credential Dumping /etc/passwd and /etc/shadow:OS Credential Dumping Credentials In Files:Unsecured Credentials
S0413 MailSniper - Email Account:Account Discovery Password Spraying:Brute Force Remote Email Collection:Email Collection
S0002 Mimikatz - SID-History Injection:Access Token Manipulation Account Manipulation Security Support Provider:Boot or Logon Autostart Execution Credentials from Password Stores Credentials from Web Browsers:Credentials from Password Stores Windows Credential Manager:Credentials from Password Stores LSA Secrets:OS Credential Dumping DCSync:OS Credential Dumping Security Account Manager:OS Credential Dumping LSASS Memory:OS Credential Dumping Rogue Domain Controller Silver Ticket:Steal or Forge Kerberos Tickets Golden Ticket:Steal or Forge Kerberos Tickets Private Keys:Unsecured Credentials Pass the Hash:Use Alternate Authentication Material Pass the Ticket:Use Alternate Authentication Material
S0029 PsExec - Domain Account:Create Account Windows Service:Create or Modify System Process Lateral Tool Transfer SMB/Windows Admin Shares:Remote Services Service Execution:System Services

References

Back to top