Skip to content

G1016 FIN13

FIN13 is a financially motivated cyber threat group that has targeted the financial, retail, and hospitality industries in Mexico and Latin America, as early as 2016. FIN13 achieves its objectives by stealing intellectual property, financial data, mergers and acquisition information, or PII.21

Item Value
ID G1016
Associated Names Elephant Beetle
Version 1.0
Created 27 July 2023
Last Modified 29 September 2023
Navigation Layer View In ATT&CK® Navigator

Associated Group Descriptions

Name Description
Elephant Beetle 1

Techniques Used

Domain ID Name Use
enterprise T1134 Access Token Manipulation -
enterprise T1134.003 Make and Impersonate Token FIN13 has utilized tools such as Incognito V2 for token manipulation and impersonation.1
enterprise T1087 Account Discovery FIN13 has enumerated all users and their roles from a victim’s main treasury system.2
enterprise T1087.002 Domain Account FIN13 can identify user accounts associated with a Service Principal Name and query Service Principal Names within the domain by utilizing the following scripts: GetUserSPNs.vbs and querySpn.vbs.21
enterprise T1098 Account Manipulation -
enterprise T1098.007 Additional Local or Domain Groups FIN13 has assigned newly created accounts the sysadmin role to maintain persistence.1
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols FIN13 has used HTTP requests to chain multiple web shells and to contact actor-controlled C2 servers prior to exfiltrating stolen data.21
enterprise T1560 Archive Collected Data -
enterprise T1560.001 Archive via Utility FIN13 has compressed the dump output of compromised credentials with a 7zip binary.1
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder FIN13 has used Windows Registry run keys such as, HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hosts to maintain persistence.2
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.001 PowerShell FIN13 has used PowerShell commands to obtain DNS data from a compromised network.2
enterprise T1059.003 Windows Command Shell FIN13 has leveraged xp_cmdshell and Windows Command Shell to execute commands on a compromised machine. FIN13 has also attempted to leverage the ‘xp_cmdshell’ SQL procedure to execute remote commands on internal MS-SQL servers.21
enterprise T1059.005 Visual Basic FIN13 has used VBS scripts for code execution on comrpomised machines.1
enterprise T1136 Create Account -
enterprise T1136.001 Local Account FIN13 has created MS-SQL local accounts in a compromised network.1
enterprise T1005 Data from Local System FIN13 has gathered stolen credentials, sensitive data such as point-of-sale (POS), and ATM data from a compromised network before exfiltration.21
enterprise T1565 Data Manipulation FIN13 has injected fraudulent transactions into compromised networks that mimic legitimate behavior to siphon off incremental amounts of money.1
enterprise T1074 Data Staged -
enterprise T1074.001 Local Data Staging FIN13 has utilized the following temporary folders on compromised Windows and Linux systems for their operations prior to exfiltration: C:\Windows\Temp and /tmp.21
enterprise T1140 Deobfuscate/Decode Files or Information FIN13 has utilized certutil to decode base64 encoded versions of custom malware.2
enterprise T1587 Develop Capabilities -
enterprise T1587.001 Malware FIN13 has utilized custom malware to maintain persistence in a compromised environment.21
enterprise T1190 Exploit Public-Facing Application FIN13 has exploited known vulnerabilities such as CVE-2017-1000486 (Primefaces Application Expression Language Injection), CVE-2015-7450 (WebSphere Application Server SOAP Deserialization Exploit), CVE-2010-5326 (SAP NewWeaver Invoker Servlet Exploit), and EDB-ID-24963 (SAP NetWeaver ConfigServlet Remote Code Execution) to gain initial access.21
enterprise T1133 External Remote Services FIN13 has gained access to compromised environments via remote access services such as the corporate virtual private network (VPN).2
enterprise T1083 File and Directory Discovery FIN13 has used the Windows dir command to enumerate files and directories in a victim’s network.2
enterprise T1657 Financial Theft FIN13 has observed the victim’s software and infrastructure over several months to understand the technical process of legitimate financial transactions, prior to attempting to conduct fraudulent transactions.1
enterprise T1589 Gather Victim Identity Information FIN13 has researched employees to target for social engineering attacks.2
enterprise T1590 Gather Victim Network Information -
enterprise T1590.004 Network Topology FIN13 has searched for infrastructure that can provide remote access to an environment for targeting efforts.2
enterprise T1564 Hide Artifacts -
enterprise T1564.001 Hidden Files and Directories FIN13 has created hidden files and folders within a compromised Linux system /tmp directory. FIN13 also has used attrib.exe to hide gathered local host information.21
enterprise T1574 Hijack Execution Flow -
enterprise T1574.001 DLL FIN13 has used IISCrack.dll as a side-loading technique to load a malicious version of httpodbc.dll on old IIS Servers (CVE-2001-0507).1
enterprise T1105 Ingress Tool Transfer FIN13 has downloaded additional tools and malware to compromised systems.21
enterprise T1056 Input Capture -
enterprise T1056.001 Keylogging FIN13 has logged the keystrokes of victims to escalate privileges.2
enterprise T1036 Masquerading FIN13 has masqueraded staged data by using the Windows certutil utility to generate fake Base64 encoded certificates with the input file.21
enterprise T1036.004 Masquerade Task or Service FIN13 has used scheduled tasks names such as acrotyr and AppServicesr to mimic the same names in a compromised network’s C:\Windows directory.2
enterprise T1036.005 Match Legitimate Resource Name or Location FIN13 has masqueraded WAR files to look like legitimate packages such as, wsexample.war, wsexamples.com, examples.war, and exampl3s.war.1
enterprise T1556 Modify Authentication Process FIN13 has replaced legitimate KeePass binaries with trojanized versions to collect passwords from numerous applications.2
enterprise T1046 Network Service Discovery FIN13 has utilized nmap for reconnaissance efforts. FIN13 has also scanned for internal MS-SQL servers in a compromised network.21
enterprise T1135 Network Share Discovery FIN13 has executed net view commands for enumeration of open shares on compromised machines.21
enterprise T1588 Obtain Capabilities -
enterprise T1588.002 Tool FIN13 has utilized publicly available tools such as Mimikatz, Impacket, PWdump7, ProcDump, Nmap, and Incognito V2 for targeting efforts.1
enterprise T1003 OS Credential Dumping -
enterprise T1003.001 LSASS Memory FIN13 has obtained memory dumps with ProcDump to parse and extract credentials from a victim’s LSASS process memory with Mimikatz.21
enterprise T1003.002 Security Account Manager FIN13 has extracted the SAM and SYSTEM registry hives using the reg.exe binary for obtaining password hashes from a compromised machine.1
enterprise T1003.003 NTDS FIN13 has harvested the NTDS.DIT file and leveraged the Impacket tool on the compromised domain controller to locally decrypt it.1
enterprise T1069 Permission Groups Discovery FIN13 has enumerated all users and roles from a victim’s main treasury system.2
enterprise T1572 Protocol Tunneling FIN13 has utilized web shells and Java tools for tunneling capabilities to and from compromised assets.1
enterprise T1090 Proxy -
enterprise T1090.001 Internal Proxy FIN13 has utilized a proxy tool to communicate between compromised assets.1
enterprise T1021 Remote Services -
enterprise T1021.001 Remote Desktop Protocol FIN13 has remotely accessed compromised environments via Remote Desktop Services (RDS) for lateral movement.2
enterprise T1021.002 SMB/Windows Admin Shares FIN13 has leveraged SMB to move laterally within a compromised network via application servers and SQL servers.1
enterprise T1021.004 SSH FIN13 has remotely accessed compromised environments via secure shell (SSH) for lateral movement.2
enterprise T1021.006 Windows Remote Management FIN13 has leveraged WMI to move laterally within a compromised network via application servers and SQL servers.1
enterprise T1053 Scheduled Task/Job -
enterprise T1053.005 Scheduled Task FIN13 has created scheduled tasks in the C:\Windows directory of the compromised network.2
enterprise T1505 Server Software Component -
enterprise T1505.003 Web Shell FIN13 has utilized obfuscated and open-source web shells such as JspSpy, reGeorg, MiniWebCmdShell, and Vonloesch Jsp File Browser 1.2 to enable remote code execution and to execute commands on compromised web server.1
enterprise T1082 System Information Discovery FIN13 has collected local host information by utilizing Windows commands systeminfo, fsutil, and fsinfo. FIN13 has also utilized a compromised Symantex Altiris console and LanDesk account to retrieve host information.21
enterprise T1016 System Network Configuration Discovery FIN13 has used nslookup and ipconfig for network reconnaissance efforts. FIN13 has also utilized a compromised Symantec Altiris console and LanDesk account to retrieve network information.21
enterprise T1016.001 Internet Connection Discovery FIN13 has used Ping and tracert for network reconnaissance efforts.2
enterprise T1049 System Network Connections Discovery FIN13 has used netstat and other net commands for network reconnaissance efforts.2
enterprise T1552 Unsecured Credentials -
enterprise T1552.001 Credentials In Files FIN13 has obtained administrative credentials by browsing through local files on a compromised machine.1
enterprise T1550 Use Alternate Authentication Material -
enterprise T1550.002 Pass the Hash FIN13 has used the PowerShell utility Invoke-SMBExec to execute the pass the hash method for lateral movement within an compromised environment.2
enterprise T1078 Valid Accounts -
enterprise T1078.001 Default Accounts FIN13 has leveraged default credentials for authenticating myWebMethods (WMS) and QLogic web management interface to gain initial access.1
enterprise T1047 Windows Management Instrumentation FIN13 has utilized WMI to execute commands and move laterally on compromised Windows machines.21

Software

ID Name References Techniques
S0160 certutil 1 Archive via Utility:Archive Collected Data Deobfuscate/Decode Files or Information Ingress Tool Transfer Install Root Certificate:Subvert Trust Controls
S0363 Empire 1 Bypass User Account Control:Abuse Elevation Control Mechanism SID-History Injection:Access Token Manipulation Access Token Manipulation Create Process with Token:Access Token Manipulation Domain Account:Account Discovery Local Account:Account Discovery LLMNR/NBT-NS Poisoning and SMB Relay:Adversary-in-the-Middle Web Protocols:Application Layer Protocol Archive Collected Data Automated Collection Automated Exfiltration Security Support Provider:Boot or Logon Autostart Execution Registry Run Keys / Startup Folder:Boot or Logon Autostart Execution Shortcut Modification:Boot or Logon Autostart Execution Browser Information Discovery Clipboard Data PowerShell:Command and Scripting Interpreter Windows Command Shell:Command and Scripting Interpreter Command and Scripting Interpreter Local Account:Create Account Domain Account:Create Account Windows Service:Create or Modify System Process Keychain:Credentials from Password Stores Credentials from Web Browsers:Credentials from Password Stores Group Policy Modification:Domain or Tenant Policy Modification Domain Trust Discovery Local Email Collection:Email Collection Asymmetric Cryptography:Encrypted Channel Accessibility Features:Event Triggered Execution Exfiltration Over C2 Channel Exfiltration to Code Repository:Exfiltration Over Web Service Exfiltration to Cloud Storage:Exfiltration Over Web Service Exploitation for Privilege Escalation Exploitation of Remote Services File and Directory Discovery Group Policy Discovery Path Interception by Unquoted Path:Hijack Execution Flow Path Interception by Search Order Hijacking:Hijack Execution Flow Path Interception by PATH Environment Variable:Hijack Execution Flow Dylib Hijacking:Hijack Execution Flow DLL:Hijack Execution Flow Timestomp:Indicator Removal Ingress Tool Transfer Keylogging:Input Capture Credential API Hooking:Input Capture Native API Network Service Discovery Network Share Discovery Network Sniffing Command Obfuscation:Obfuscated Files or Information LSASS Memory:OS Credential Dumping Process Discovery Process Injection Distributed Component Object Model:Remote Services SSH:Remote Services Scheduled Task:Scheduled Task/Job Screen Capture Security Software Discovery:Software Discovery Kerberoasting:Steal or Forge Kerberos Tickets Golden Ticket:Steal or Forge Kerberos Tickets Silver Ticket:Steal or Forge Kerberos Tickets System Information Discovery System Network Configuration Discovery System Network Connections Discovery System Owner/User Discovery Service Execution:System Services MSBuild:Trusted Developer Utilities Proxy Execution Credentials In Files:Unsecured Credentials Private Keys:Unsecured Credentials Pass the Hash:Use Alternate Authentication Material Video Capture Bidirectional Communication:Web Service Windows Management Instrumentation
S0357 Impacket 1 LLMNR/NBT-NS Poisoning and SMB Relay:Adversary-in-the-Middle Lateral Tool Transfer Network Sniffing NTDS:OS Credential Dumping LSASS Memory:OS Credential Dumping Security Account Manager:OS Credential Dumping LSA Secrets:OS Credential Dumping Kerberoasting:Steal or Forge Kerberos Tickets Ccache Files:Steal or Forge Kerberos Tickets Service Execution:System Services Windows Management Instrumentation
S0002 Mimikatz 2 SID-History Injection:Access Token Manipulation Account Manipulation Security Support Provider:Boot or Logon Autostart Execution Credentials from Password Stores Credentials from Web Browsers:Credentials from Password Stores Windows Credential Manager:Credentials from Password Stores DCSync:OS Credential Dumping Security Account Manager:OS Credential Dumping LSASS Memory:OS Credential Dumping LSA Secrets:OS Credential Dumping Rogue Domain Controller Steal or Forge Authentication Certificates Golden Ticket:Steal or Forge Kerberos Tickets Silver Ticket:Steal or Forge Kerberos Tickets Private Keys:Unsecured Credentials Pass the Hash:Use Alternate Authentication Material Pass the Ticket:Use Alternate Authentication Material

References