G0119 Indrik Spider
Indrik Spider is a Russia-based cybercriminal group that has been active since at least 2014. Indrik Spider initially started with the Dridex banking Trojan, and then by 2017 they began running ransomware operations using BitPaymer, WastedLocker, and Hades ransomware. Following U.S. sanctions and an indictment in 2019, Indrik Spider changed their tactics and diversified their toolset.145
| Item | Value |
|---|---|
| ID | G0119 |
| Associated Names | Evil Corp, Manatee Tempest, DEV-0243, UNC2165 |
| Version | 4.1 |
| Created | 06 January 2021 |
| Last Modified | 28 October 2024 |
| Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
| Name | Description |
|---|---|
| Evil Corp | 45 |
| Manatee Tempest | 3 |
| DEV-0243 | 3 |
| UNC2165 | 2 |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1583 | Acquire Infrastructure | Indrik Spider has purchased access to victim VPNs to facilitate access to victim environments.2 |
| enterprise | T1059 | Command and Scripting Interpreter | - |
| enterprise | T1059.001 | PowerShell | Indrik Spider has used PowerShell Empire for execution of malware.16 |
| enterprise | T1059.003 | Windows Command Shell | Indrik Spider has used batch scripts on victim’s machines.12 |
| enterprise | T1059.007 | JavaScript | Indrik Spider has used malicious JavaScript files for several components of their attack.6 |
| enterprise | T1584 | Compromise Infrastructure | - |
| enterprise | T1584.004 | Server | Indrik Spider has served fake updates via legitimate websites that have been compromised.1 |
| enterprise | T1136 | Create Account | Indrik Spider used wmic.exe to add a new user to the system.6 |
| enterprise | T1136.001 | Local Account | Indrik Spider has created local system accounts and has added the accounts to privileged groups.2 |
| enterprise | T1555 | Credentials from Password Stores | - |
| enterprise | T1555.005 | Password Managers | Indrik Spider has accessed and exported passwords from password managers.2 |
| enterprise | T1486 | Data Encrypted for Impact | Indrik Spider has encrypted domain-controlled systems using BitPaymer.1 Additionally, Indrik Spider used PsExec to execute a ransomware script.2 |
| enterprise | T1074 | Data Staged | - |
| enterprise | T1074.001 | Local Data Staging | Indrik Spider has stored collected data in a .tmp file.6 |
| enterprise | T1587 | Develop Capabilities | - |
| enterprise | T1587.001 | Malware | Indrik Spider has developed malware for their operations, including ransomware such as BitPaymer and WastedLocker.1 |
| enterprise | T1484 | Domain or Tenant Policy Modification | - |
| enterprise | T1484.001 | Group Policy Modification | Indrik Spider has used Group Policy Objects to deploy batch scripts.12 |
| enterprise | T1585 | Establish Accounts | - |
| enterprise | T1585.002 | Email Accounts | Indrik Spider has created email accounts to communicate with their ransomware victims, to include providing payment and decryption details.1 |
| enterprise | T1567 | Exfiltration Over Web Service | - |
| enterprise | T1567.002 | Exfiltration to Cloud Storage | Indrik Spider has exfiltrated data using Rclone or MEGASync prior to deploying ransomware.2 |
| enterprise | T1590 | Gather Victim Network Information | Indrik Spider has downloaded tools, such as the Advanced Port Scanner utility and Lansweeper, to conduct internal reconnaissance of the victim network. Indrik Spider has also accessed the victim’s VMware VCenter, which had information about host configuration, clusters, etc.2 |
| enterprise | T1562 | Impair Defenses | - |
| enterprise | T1562.001 | Disable or Modify Tools | Indrik Spider used PsExec to leverage Windows Defender to disable scanning of all downloaded files and to restrict real-time monitoring.6 Indrik Spider has used MpCmdRun to revert the definitions in Microsoft Defender.2 Additionally, Indrik Spider has used WMI to stop or uninstall and reset anti-virus products and other defensive services.2 |
| enterprise | T1070 | Indicator Removal | - |
| enterprise | T1070.001 | Clear Windows Event Logs | Indrik Spider has used Cobalt Strike to empty log files.6 Additionally, Indrik Spider has cleared all event logs using wevutil.2 |
| enterprise | T1105 | Ingress Tool Transfer | Indrik Spider has downloaded additional scripts, malware, and tools onto a compromised host.162 |
| enterprise | T1036 | Masquerading | - |
| enterprise | T1036.005 | Match Legitimate Resource Name or Location | Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors.1 |
| enterprise | T1112 | Modify Registry | Indrik Spider has modified registry keys to prepare for ransomware execution and to disable common administrative utilities.2 |
| enterprise | T1003 | OS Credential Dumping | - |
| enterprise | T1003.001 | LSASS Memory | Indrik Spider used Cobalt Strike to carry out credential dumping using ProcDump.6 |
| enterprise | T1012 | Query Registry | Indrik Spider has used a service account to extract copies of the Security Registry hive.2 |
| enterprise | T1021 | Remote Services | - |
| enterprise | T1021.001 | Remote Desktop Protocol | Indrik Spider has used RDP for lateral movement.2 |
| enterprise | T1021.004 | SSH | Indrik Spider has used SSH for lateral movement.2 |
| enterprise | T1018 | Remote System Discovery | Indrik Spider has used PowerView to enumerate all Windows Server, Windows Server 2003, and Windows 7 instances in the Active Directory database.6 |
| enterprise | T1489 | Service Stop | Indrik Spider has used PsExec to stop services prior to the execution of ransomware.6 |
| enterprise | T1558 | Steal or Forge Kerberos Tickets | - |
| enterprise | T1558.003 | Kerberoasting | Indrik Spider has conducted Kerberoasting attacks using a module from GitHub.2 |
| enterprise | T1007 | System Service Discovery | Indrik Spider has used the win32_service WMI class to retrieve a list of services from the system.6 |
| enterprise | T1552 | Unsecured Credentials | - |
| enterprise | T1552.001 | Credentials In Files | Indrik Spider has searched files to obtain and exfiltrate credentials.2 |
| enterprise | T1204 | User Execution | - |
| enterprise | T1204.002 | Malicious File | Indrik Spider has attempted to get users to click on a malicious zipped file.6 |
| enterprise | T1078 | Valid Accounts | Indrik Spider has used valid accounts for initial access and lateral movement.2 Indrik Spider has also maintained access to the victim environment through the VPN infrastructure.2 |
| enterprise | T1078.002 | Domain Accounts | Indrik Spider has collected credentials from infected systems, including domain accounts.1 |
| enterprise | T1047 | Windows Management Instrumentation | Indrik Spider has used WMIC to execute commands on remote computers.6 |
Software
References
-
Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Mandiant Intelligence. (2022, June 2). To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions. Retrieved July 29, 2024. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023. ↩↩
-
Podlosky, A., Feeley, B. (2021, March 17). INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions. Retrieved September 15, 2021. ↩↩↩↩↩↩
-
U.S. Department of Treasury. (2019, December 5). Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware. Retrieved September 15, 2021. ↩↩↩
-
Symantec Threat Intelligence. (2020, June 25). WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations. Retrieved May 20, 2021. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Antenucci, S., Pantazopoulos, N., Sandee, M. (2020, June 23). WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group. Retrieved September 14, 2021. ↩↩
-
Microsoft. (2022, May 9). Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself. Retrieved March 10, 2023. ↩↩
-
Milenkoski, A. (2022, November 7). SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders. Retrieved March 22, 2024. ↩