G0092 TA505
TA505 is a cyber criminal group that has been active since at least 2014. TA505 is known for frequently changing malware, driving global trends in criminal malware distribution, and ransomware campaigns involving Clop.34561
Item | Value |
---|---|
ID | G0092 |
Associated Names | Hive0065 |
Version | 2.1 |
Created | 28 May 2019 |
Last Modified | 22 March 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
Hive0065 | 2 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1087 | Account Discovery | - |
enterprise | T1087.003 | Email Account | TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server.7 |
enterprise | T1583 | Acquire Infrastructure | - |
enterprise | T1583.001 | Domains | TA505 has registered domains to impersonate services such as Dropbox to distribute malware.1 |
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | TA505 has used HTTP to communicate with C2 nodes.2 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.001 | PowerShell | TA505 has used PowerShell to download and execute malware and reconnaissance scripts.38910 |
enterprise | T1059.003 | Windows Command Shell | TA505 has executed commands using cmd.exe .7 |
enterprise | T1059.005 | Visual Basic | TA505 has used VBS for code execution.3472 |
enterprise | T1059.007 | JavaScript | TA505 has used JavaScript for code execution.34 |
enterprise | T1555 | Credentials from Password Stores | - |
enterprise | T1555.003 | Credentials from Web Browsers | TA505 has used malware to gather credentials from Internet Explorer.3 |
enterprise | T1486 | Data Encrypted for Impact | TA505 has used a wide variety of ransomware, such as Clop, Locky, Jaff, Bart, Philadelphia, and GlobeImposter, to encrypt victim files and demand a ransom payment.3 |
enterprise | T1140 | Deobfuscate/Decode Files or Information | TA505 has decrypted packed DLLs with an XOR key.6 |
enterprise | T1568 | Dynamic Resolution | - |
enterprise | T1568.001 | Fast Flux DNS | TA505 has used fast flux to mask botnets by distributing payloads across multiple IPs.7 |
enterprise | T1562 | Impair Defenses | - |
enterprise | T1562.001 | Disable or Modify Tools | TA505 has used malware to disable Windows Defender.1 |
enterprise | T1105 | Ingress Tool Transfer | TA505 has downloaded additional malware to execute on victim systems.9108 |
enterprise | T1559 | Inter-Process Communication | - |
enterprise | T1559.002 | Dynamic Data Exchange | TA505 has leveraged malicious Word documents that abused DDE.4 |
enterprise | T1112 | Modify Registry | TA505 has used malware to disable Windows Defender through modification of the Registry.1 |
enterprise | T1106 | Native API | TA505 has deployed payloads that use Windows API calls on a compromised host.1 |
enterprise | T1027 | Obfuscated Files or Information | TA505 has password-protected malicious Word documents.3 |
enterprise | T1027.002 | Software Packing | TA505 has used UPX to obscure malicious code.2 |
enterprise | T1027.010 | Command Obfuscation | TA505 has used base64 encoded PowerShell commands.910 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.001 | Malware | TA505 has used malware such as Azorult and Cobalt Strike in their operations.6 |
enterprise | T1588.002 | Tool | TA505 has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit.6 |
enterprise | T1069 | Permission Groups Discovery | TA505 has used TinyMet to enumerate members of privileged groups.2 TA505 has also run net group /domain .7 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | TA505 has used spearphishing emails with malicious attachments to initially compromise victims.34598127112 |
enterprise | T1566.002 | Spearphishing Link | TA505 has sent spearphishing emails containing malicious links.35711 |
enterprise | T1055 | Process Injection | - |
enterprise | T1055.001 | Dynamic-link Library Injection | TA505 has been seen injecting a DLL into winword.exe.2 |
enterprise | T1608 | Stage Capabilities | - |
enterprise | T1608.001 | Upload Malware | TA505 has staged malware on actor-controlled domains.1 |
enterprise | T1553 | Subvert Trust Controls | - |
enterprise | T1553.002 | Code Signing | TA505 has signed payloads with code signing certificates from Thawte and Sectigo.9107 |
enterprise | T1553.005 | Mark-of-the-Web Bypass | TA505 has used .iso files to deploy malicious .lnk files.13 |
enterprise | T1218 | System Binary Proxy Execution | - |
enterprise | T1218.007 | Msiexec | TA505 has used msiexec to download and execute malicious Windows Installer files.9107 |
enterprise | T1218.011 | Rundll32 | TA505 has leveraged rundll32.exe to execute malicious DLLs.910 |
enterprise | T1552 | Unsecured Credentials | - |
enterprise | T1552.001 | Credentials In Files | TA505 has used malware to gather credentials from FTP clients and Outlook.3 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.001 | Malicious Link | TA505 has used lures to get users to click links in emails and attachments. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files. 3459812711 |
enterprise | T1204.002 | Malicious File | TA505 has used lures to get users to enable content in malicious attachments and execute malicious files contained in archives. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files. 34598127112 |
enterprise | T1078 | Valid Accounts | - |
enterprise | T1078.002 | Domain Accounts | TA505 has used stolen domain admin accounts to compromise additional hosts.2 |
Software
References
-
Financial Security Institute. (2020, February 28). Profiling of TA505 Threat Group That Continues to Attack the Financial Sector. Retrieved July 14, 2022. ↩↩↩↩↩↩↩
-
Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020. ↩↩↩↩↩↩↩↩↩↩↩↩
-
Proofpoint Staff. (2017, September 27). Threat Actor Profile: TA505, From Dridex to GlobeImposter. Retrieved May 28, 2019. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Proofpoint Staff. (2018, June 8). TA505 shifts with the times. Retrieved May 28, 2019. ↩↩↩↩↩↩↩↩
-
Schwarz, D. and Proofpoint Staff. (2019, January 9). ServHelper and FlawedGrace - New malware introduced by TA505. Retrieved May 28, 2019. ↩↩↩↩↩↩↩
-
Terefos, A. (2020, November 18). TA505: A Brief History of Their Time. Retrieved July 14, 2022. ↩↩↩↩↩↩↩↩↩↩
-
Hiroaki, H. and Lu, L. (2019, June 12). Shifting Tactics: Breaking Down TA505 Group’s Use of HTML, RATs and Other Techniques in Latest Campaigns. Retrieved May 29, 2020. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Proofpoint Staff. (2018, July 19). TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RAT. Retrieved April 19, 2019. ↩↩↩↩↩
-
Salem, E. (2019, April 25). Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware. Retrieved May 28, 2019. ↩↩↩↩↩↩↩↩↩↩
-
Vilkomir-Preisman, S. (2019, April 2). New ServHelper Variant Employs Excel 4.0 Macro to Drop Signed Payload. Retrieved May 28, 2019. ↩↩↩↩↩↩↩
-
Schwarz, D. et al. (2019, October 16). TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader. Retrieved May 29, 2020. ↩↩↩↩↩↩↩↩
-
Proofpoint Staff. (2018, March 7). Leaked Ammyy Admin Source Code Turned into Malware. Retrieved May 28, 2019. ↩↩↩↩
-
Trend Micro. (2019, August 27). TA505: Variety in Use of ServHelper and FlawedAmmyy. Retrieved February 22, 2021. ↩
-
Santos, D. (2021, April 13). Threat Assessment: Clop Ransomware. Retrieved July 30, 2021. ↩
-
Cybereason Nocturnus. (2020, December 23). Cybereason vs. Clop Ransomware. Retrieved May 11, 2021. ↩
-
Kasuya, M. (2020, January 8). Threat Spotlight: Amadey Bot Targets Non-Russian Users. Retrieved July 14, 2022. ↩