enterprise |
T1583 |
Acquire Infrastructure |
- |
enterprise |
T1583.001 |
Domains |
LazyScripter has used dynamic DNS providers to create legitimate-looking subdomains for C2. |
enterprise |
T1583.006 |
Web Services |
LazyScripter has established GitHub accounts to host its toolsets. |
enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.004 |
DNS |
LazyScripter has leveraged dynamic DNS providers for C2 communications. |
enterprise |
T1547 |
Boot or Logon Autostart Execution |
- |
enterprise |
T1547.001 |
Registry Run Keys / Startup Folder |
LazyScripter has achieved persistence via writing a PowerShell script to the autorun registry key. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.001 |
PowerShell |
LazyScripter has used PowerShell scripts to execute malicious code. |
enterprise |
T1059.003 |
Windows Command Shell |
LazyScripter has used batch files to deploy open-source and multi-stage RATs. |
enterprise |
T1059.005 |
Visual Basic |
LazyScripter has used VBScript to execute malicious code. |
enterprise |
T1059.007 |
JavaScript |
LazyScripter has used JavaScript in its attacks. |
enterprise |
T1105 |
Ingress Tool Transfer |
LazyScripter had downloaded additional tools to a compromised host. |
enterprise |
T1036 |
Masquerading |
LazyScripter has used several different security software icons to disguise executables. |
enterprise |
T1027 |
Obfuscated Files or Information |
- |
enterprise |
T1027.010 |
Command Obfuscation |
LazyScripter has leveraged the BatchEncryption tool to perform advanced batch script obfuscation and encoding techniques. |
enterprise |
T1588 |
Obtain Capabilities |
- |
enterprise |
T1588.001 |
Malware |
LazyScripter has used a variety of open-source remote access Trojans for its operations. |
enterprise |
T1566 |
Phishing |
- |
enterprise |
T1566.001 |
Spearphishing Attachment |
LazyScripter has used spam emails weaponized with archive or document files as its initial infection vector. |
enterprise |
T1566.002 |
Spearphishing Link |
LazyScripter has used spam emails that contain a link that redirects the victim to download a malicious document. |
enterprise |
T1608 |
Stage Capabilities |
- |
enterprise |
T1608.001 |
Upload Malware |
LazyScripter has hosted open-source remote access Trojans used in its operations in GitHub. |
enterprise |
T1218 |
System Binary Proxy Execution |
- |
enterprise |
T1218.005 |
Mshta |
LazyScripter has used mshta.exe to execute Koadic stagers. |
enterprise |
T1218.011 |
Rundll32 |
LazyScripter has used rundll32.exe to execute Koadic stagers. |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.001 |
Malicious Link |
LazyScripter has relied upon users clicking on links to malicious files. |
enterprise |
T1204.002 |
Malicious File |
LazyScripter has lured users to open malicious email attachments. |
enterprise |
T1102 |
Web Service |
LazyScripter has used GitHub to host its payloads to operate spam campaigns. |