enterprise |
T1557 |
Adversary-in-the-Middle |
- |
enterprise |
T1557.002 |
ARP Cache Poisoning |
LuminousMoth has used ARP spoofing to redirect a compromised machine to an actor-controlled website. |
enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
LuminousMoth has used HTTP for C2. |
enterprise |
T1560 |
Archive Collected Data |
LuminousMoth has manually archived stolen files from victim machines before exfiltration. |
enterprise |
T1547 |
Boot or Logon Autostart Execution |
- |
enterprise |
T1547.001 |
Registry Run Keys / Startup Folder |
LuminousMoth has used malicious DLLs that setup persistence in the Registry Key HKCU\Software\Microsoft\Windows\Current Version\Run . |
enterprise |
T1005 |
Data from Local System |
LuminousMoth has collected files and data from compromised machines. |
enterprise |
T1030 |
Data Transfer Size Limits |
LuminousMoth has split archived files into multiple parts to bypass a 5MB limit. |
enterprise |
T1587 |
Develop Capabilities |
- |
enterprise |
T1587.001 |
Malware |
LuminousMoth has used unique malware for information theft and exfiltration. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
LuminousMoth has used malware that exfiltrates stolen data to its C2 server. |
enterprise |
T1567 |
Exfiltration Over Web Service |
- |
enterprise |
T1567.002 |
Exfiltration to Cloud Storage |
LuminousMoth has exfiltrated data to Google Drive. |
enterprise |
T1083 |
File and Directory Discovery |
LuminousMoth has used malware that scans for files in the Documents, Desktop, and Download folders and in other drives. |
enterprise |
T1564 |
Hide Artifacts |
- |
enterprise |
T1564.001 |
Hidden Files and Directories |
LuminousMoth has used malware to store malicious binaries in hidden directories on victim’s USB drives. |
enterprise |
T1574 |
Hijack Execution Flow |
- |
enterprise |
T1574.002 |
DLL Side-Loading |
LuminousMoth has used legitimate executables such as winword.exe and igfxem.exe to side-load their malware. |
enterprise |
T1105 |
Ingress Tool Transfer |
LuminousMoth has downloaded additional malware and tools onto a compromised host. |
enterprise |
T1036 |
Masquerading |
- |
enterprise |
T1036.005 |
Match Legitimate Name or Location |
LuminousMoth has disguised their exfiltration malware as ZoomVideoApp.exe . |
enterprise |
T1112 |
Modify Registry |
LuminousMoth has used malware that adds Registry keys for persistence. |
enterprise |
T1588 |
Obtain Capabilities |
- |
enterprise |
T1588.001 |
Malware |
LuminousMoth has obtained and used malware such as Cobalt Strike. |
enterprise |
T1588.002 |
Tool |
LuminousMoth has obtained an ARP spoofing tool from GitHub. |
enterprise |
T1588.004 |
Digital Certificates |
LuminousMoth has used a valid digital certificate for some of their malware. |
enterprise |
T1566 |
Phishing |
- |
enterprise |
T1566.002 |
Spearphishing Link |
LuminousMoth has sent spearphishing emails containing a malicious Dropbox download link. |
enterprise |
T1091 |
Replication Through Removable Media |
LuminousMoth has used malicious DLLs to spread malware to connected removable USB drives on infected machines. |
enterprise |
T1053 |
Scheduled Task/Job |
- |
enterprise |
T1053.005 |
Scheduled Task |
LuminousMoth has created scheduled tasks to establish persistence for their tools. |
enterprise |
T1608 |
Stage Capabilities |
- |
enterprise |
T1608.001 |
Upload Malware |
LuminousMoth has hosted malicious payloads on Dropbox. |
enterprise |
T1608.004 |
Drive-by Target |
LuminousMoth has redirected compromised machines to an actor-controlled webpage through HTML injection. |
enterprise |
T1608.005 |
Link Target |
LuminousMoth has created a link to a Dropbox file that has been used in their spear-phishing operations. |
enterprise |
T1539 |
Steal Web Session Cookie |
LuminousMoth has used an unnamed post-exploitation tool to steal cookies from the Chrome browser. |
enterprise |
T1553 |
Subvert Trust Controls |
- |
enterprise |
T1553.002 |
Code Signing |
LuminousMoth has signed their malware with a valid digital signature. |
enterprise |
T1033 |
System Owner/User Discovery |
LuminousMoth has used a malicious DLL to collect the username from compromised hosts. |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.001 |
Malicious Link |
LuminousMoth has lured victims into clicking malicious Dropbox download links delivered through spearphishing. |