Skip to content

G0138 Andariel

Andariel is a North Korean state-sponsored threat group that has been active since at least 2009. Andariel has primarily focused its operations–which have included destructive attacks–against South Korean government agencies, military organizations, and a variety of domestic companies; they have also conducted cyber financial operations against ATMs, banks, and cryptocurrency exchanges. Andariel‘s notable activity includes Operation Black Mine, Operation GoldenAxe, and Campaign Rifle.12345

Andariel is considered a sub-set of Lazarus Group, and has been attributed to North Korea’s Reconnaissance General Bureau.6

North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups.

Item Value
ID G0138
Associated Names Silent Chollima
Version 1.0
Created 29 September 2021
Last Modified 15 October 2021
Navigation Layer View In ATT&CK® Navigator

Associated Group Descriptions

Name Description
Silent Chollima 5

Techniques Used

Domain ID Name Use
enterprise T1005 Data from Local System Andariel has collected large numbers of files from compromised network systems for later extraction.1
enterprise T1189 Drive-by Compromise Andariel has used watering hole attacks, often with zero-day exploits, to gain initial access to victims within a specific IP range.34
enterprise T1203 Exploitation for Client Execution Andariel has exploited numerous ActiveX vulnerabilities, including zero-days.124
enterprise T1592 Gather Victim Host Information -
enterprise T1592.002 Software Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.4
enterprise T1590 Gather Victim Network Information -
enterprise T1590.005 IP Addresses Andariel has limited its watering hole attacks to specific IP address ranges.3
enterprise T1105 Ingress Tool Transfer Andariel has downloaded additional tools and malware onto compromised hosts.3
enterprise T1027 Obfuscated Files or Information -
enterprise T1027.003 Steganography Andariel has hidden malicious executables within PNG files.87
enterprise T1588 Obtain Capabilities -
enterprise T1588.001 Malware Andariel has used a variety of publicly-available remote access Trojans (RATs) for its operations.1
enterprise T1566 Phishing -
enterprise T1566.001 Spearphishing Attachment Andariel has conducted spearphishing campaigns that included malicious Word or Excel attachments.38
enterprise T1057 Process Discovery Andariel has used tasklist to enumerate processes and find a specific string.7
enterprise T1049 System Network Connections Discovery Andariel has used the netstat -naop tcp command to display TCP connections on a victim’s machine.7
enterprise T1204 User Execution -
enterprise T1204.002 Malicious File Andariel has attempted to lure victims into enabling malicious macros within email attachments.3


ID Name References Techniques
S0032 gh0st RAT - Registry Run Keys / Startup Folder:Boot or Logon Autostart Execution Command and Scripting Interpreter Windows Service:Create or Modify System Process Standard Encoding:Data Encoding Deobfuscate/Decode Files or Information Fast Flux DNS:Dynamic Resolution Symmetric Cryptography:Encrypted Channel Encrypted Channel DLL Side-Loading:Hijack Execution Flow Clear Windows Event Logs:Indicator Removal on Host File Deletion:Indicator Removal on Host Ingress Tool Transfer Keylogging:Input Capture Modify Registry Native API Non-Application Layer Protocol Process Discovery Process Injection Query Registry Screen Capture Shared Modules Rundll32:System Binary Proxy Execution System Information Discovery Service Execution:System Services
S0433 Rifdoor - Registry Run Keys / Startup Folder:Boot or Logon Autostart Execution Symmetric Cryptography:Encrypted Channel Obfuscated Files or Information Binary Padding:Obfuscated Files or Information Spearphishing Attachment:Phishing System Information Discovery System Network Configuration Discovery System Owner/User Discovery Malicious File:User Execution


Back to top