G0087 APT39
APT39 is one of several names for cyber espionage activity conducted by the Iranian Ministry of Intelligence and Security (MOIS) through the front company Rana Intelligence Computing since at least 2014. APT39 has primarily targeted the travel, hospitality, academic, and telecommunications industries in Iran and across Asia, Africa, Europe, and North America to track individuals and entities considered to be a threat by the MOIS.57423
Item | Value |
---|---|
ID | G0087 |
Associated Names | ITG07, Chafer, Remix Kitten |
Version | 3.1 |
Created | 19 February 2019 |
Last Modified | 02 September 2022 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
ITG07 | 423 |
Chafer | Activities associated with APT39 largely align with a group publicly referred to as Chafer.576423 |
Remix Kitten | 1 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | APT39 has used HTTP in communications with C2.84 |
enterprise | T1071.004 | DNS | APT39 has used remote access tools that leverage DNS in communications with C2.8 |
enterprise | T1560 | Archive Collected Data | - |
enterprise | T1560.001 | Archive via Utility | APT39 has used WinRAR and 7-Zip to compress an archive stolen data.5 |
enterprise | T1197 | BITS Jobs | APT39 has used the BITS protocol to exfiltrate stolen data from a compromised host.4 |
enterprise | T1547 | Boot or Logon Autostart Execution | - |
enterprise | T1547.001 | Registry Run Keys / Startup Folder | APT39 has maintained persistence using the startup folder.5 |
enterprise | T1547.009 | Shortcut Modification | APT39 has modified LNK shortcuts.5 |
enterprise | T1110 | Brute Force | APT39 has used Ncrack to reveal credentials.5 |
enterprise | T1115 | Clipboard Data | APT39 has used tools capable of stealing contents of the clipboard.9 |
enterprise | T1059 | Command and Scripting Interpreter | APT39 has utilized AutoIt and custom scripts to perform internal reconnaissance.54 |
enterprise | T1059.001 | PowerShell | APT39 has used PowerShell to execute malicious code.89 |
enterprise | T1059.005 | Visual Basic | APT39 has utilized malicious VBS scripts in malware.4 |
enterprise | T1059.006 | Python | APT39 has used a command line utility and a network scanner written in python.84 |
enterprise | T1136 | Create Account | - |
enterprise | T1136.001 | Local Account | APT39 has created accounts on multiple compromised hosts to perform actions within the network.8 |
enterprise | T1555 | Credentials from Password Stores | APT39 has used the Smartftp Password Decryptor tool to decrypt FTP passwords.8 |
enterprise | T1005 | Data from Local System | APT39 has used various tools to steal files from the compromised host.94 |
enterprise | T1074 | Data Staged | - |
enterprise | T1074.001 | Local Data Staging | APT39 has utilized tools to aggregate data prior to exfiltration.4 |
enterprise | T1140 | Deobfuscate/Decode Files or Information | APT39 has used malware to decrypt encrypted CAB files.4 |
enterprise | T1546 | Event Triggered Execution | - |
enterprise | T1546.010 | AppInit DLLs | APT39 has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence.4 |
enterprise | T1041 | Exfiltration Over C2 Channel | APT39 has exfiltrated stolen victim data through C2 communications.4 |
enterprise | T1190 | Exploit Public-Facing Application | APT39 has used SQL injection for initial compromise.9 |
enterprise | T1083 | File and Directory Discovery | APT39 has used tools with the ability to search for files on a compromised host.4 |
enterprise | T1070 | Indicator Removal | - |
enterprise | T1070.004 | File Deletion | APT39 has used malware to delete files after they are deployed on a compromised host.4 |
enterprise | T1105 | Ingress Tool Transfer | APT39 has downloaded tools to compromised hosts.94 |
enterprise | T1056 | Input Capture | APT39 has utilized tools to capture mouse movements.4 |
enterprise | T1056.001 | Keylogging | APT39 has used tools for capturing keystrokes.94 |
enterprise | T1036 | Masquerading | - |
enterprise | T1036.005 | Match Legitimate Name or Location | APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications, closely mimicking a legitimate McAfee file mfevtps.exe.84 |
enterprise | T1046 | Network Service Discovery | APT39 has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning.58 |
enterprise | T1135 | Network Share Discovery | APT39 has used the post exploitation tool CrackMapExec to enumerate network shares.8 |
enterprise | T1027 | Obfuscated Files or Information | APT39 has used malware to drop encrypted CAB files.4 |
enterprise | T1027.002 | Software Packing | APT39 has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection.58 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.002 | Tool | APT39 has modified and used customized versions of publicly-available tools like PLINK and Mimikatz.810 |
enterprise | T1003 | OS Credential Dumping | APT39 has used different versions of Mimikatz to obtain credentials.8 |
enterprise | T1003.001 | LSASS Memory | APT39 has used Mimikatz, Windows Credential Editor and ProcDump to dump credentials.5 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.594 |
enterprise | T1566.002 | Spearphishing Link | APT39 leveraged spearphishing emails with malicious links to initially compromise victims.54 |
enterprise | T1090 | Proxy | - |
enterprise | T1090.001 | Internal Proxy | APT39 used custom tools to create SOCK5 and custom protocol proxies between infected hosts.58 |
enterprise | T1090.002 | External Proxy | APT39 has used various tools to proxy C2 communications.8 |
enterprise | T1012 | Query Registry | APT39 has used various strains of malware to query the Registry.4 |
enterprise | T1021 | Remote Services | - |
enterprise | T1021.001 | Remote Desktop Protocol | APT39 has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.58 |
enterprise | T1021.002 | SMB/Windows Admin Shares | APT39 has used SMB for lateral movement.9 |
enterprise | T1021.004 | SSH | APT39 used secure shell (SSH) to move laterally among their targets.5 |
enterprise | T1018 | Remote System Discovery | APT39 has used NBTscan and custom tools to discover remote systems.589 |
enterprise | T1053 | Scheduled Task/Job | - |
enterprise | T1053.005 | Scheduled Task | APT39 has created scheduled tasks for persistence.584 |
enterprise | T1113 | Screen Capture | APT39 has used a screen capture utility to take screenshots on a compromised host.94 |
enterprise | T1505 | Server Software Component | - |
enterprise | T1505.003 | Web Shell | APT39 has installed ANTAK and ASPXSPY web shells.5 |
enterprise | T1553 | Subvert Trust Controls | - |
enterprise | T1553.006 | Code Signing Policy Modification | APT39 has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows.4 |
enterprise | T1033 | System Owner/User Discovery | APT39 used Remexi to collect usernames from the system.7 |
enterprise | T1569 | System Services | - |
enterprise | T1569.002 | Service Execution | APT39 has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes.89 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.001 | Malicious Link | APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link.54 |
enterprise | T1204.002 | Malicious File | APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment.5894 |
enterprise | T1078 | Valid Accounts | APT39 has used stolen credentials to compromise Outlook Web Access (OWA).5 |
enterprise | T1102 | Web Service | - |
enterprise | T1102.002 | Bidirectional Communication | APT39 has communicated with C2 through files uploaded to and downloaded from DropBox.8 |
Software
References
-
Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020. ↩
-
Dept. of Treasury. (2020, September 17). Treasury Sanctions Cyber Actors Backed by Iranian Intelligence. Retrieved December 10, 2020. ↩↩↩
-
DOJ. (2020, September 17). Department of Justice and Partner Departments and Agencies Conduct Coordinated Actions to Disrupt and Deter Iranian Malicious Cyber Activities Targeting the United States and the Broader International Community. Retrieved December 10, 2020. ↩↩↩
-
FBI. (2020, September 17). Indicators of Compromise Associated with Rana Intelligence Computing, also known as Advanced Persistent Threat 39, Chafer, Cadelspy, Remexi, and ITG07. Retrieved December 10, 2020. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Hawley et al. (2019, January 29). APT39: An Iranian Cyber Espionage Group Focused on Personal Information. Retrieved February 19, 2019. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Higgins, K. (2019, January 30). Iran Ups its Traditional Cyber Espionage Tradecraft. Retrieved May 22, 2020. ↩↩↩
-
Symantec Security Response. (2015, December 7). Iran-based attackers use back door threats to spy on Middle Eastern targets. Retrieved April 17, 2019. ↩↩↩↩↩
-
Rusu, B. (2020, May 21). Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia. Retrieved May 22, 2020. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Symantec. (2018, February 28). Chafer: Latest Attacks Reveal Heightened Ambitions. Retrieved May 22, 2020. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
McMillen, D. Sperry, C. (2019, June 14). Observations of ITG07 Cyber Operations. Retrieved May 17, 2021. ↩
-
Legezo, D. (2019, January 30). Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities. Retrieved April 17, 2019. ↩
-
Falcone, R. (2019, March 4). New Python-Based Payload MechaFlounder Used by Chafer. Retrieved May 27, 2020. ↩