Skip to content

G1030 Agrius

Agrius is an Iranian threat actor active since 2020 notable for a series of ransomware and wiper operations in the Middle East, with an emphasis on Israeli targets.12 Public reporting has linked Agrius to Iran’s Ministry of Intelligence and Security (MOIS).4

Item Value
ID G1030
Associated Names Pink Sandstorm, AMERICIUM, Agonizing Serpens, BlackShadow
Version 1.0
Created 21 May 2024
Last Modified 29 August 2024
Navigation Layer View In ATT&CK® Navigator

Associated Group Descriptions

Name Description
Pink Sandstorm 3
AMERICIUM 3
Agonizing Serpens 5
BlackShadow 2

Techniques Used

Domain ID Name Use
enterprise T1583 Acquire Infrastructure Agrius typically uses commercial VPN services for anonymizing last-hop traffic to victim networks, such as ProtonVPN.1
enterprise T1560 Archive Collected Data -
enterprise T1560.001 Archive via Utility Agrius used 7zip to archive extracted data in preparation for exfiltration.5
enterprise T1119 Automated Collection Agrius used a custom tool, sql.net4.exe, to query SQL databases and then identify and extract personally identifiable information.5
enterprise T1110 Brute Force Agrius engaged in various brute forcing activities via SMB in victim environments.5
enterprise T1110.003 Password Spraying Agrius engaged in password spraying via SMB in victim environments.5
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell Agrius uses ASPXSpy web shells to enable follow-on command execution via cmd.exe.1
enterprise T1543 Create or Modify System Process -
enterprise T1543.003 Windows Service Agrius has deployed IPsec Helper malware post-exploitation and registered it as a service for persistence.1
enterprise T1005 Data from Local System Agrius gathered data from database and other critical servers in victim environments, then used wiping mechanisms as an anti-analysis and anti-forensics mechanism.5
enterprise T1074 Data Staged -
enterprise T1074.001 Local Data Staging Agrius has used the folder, C:\windows\temp\s\, to stage data for exfiltration.5
enterprise T1140 Deobfuscate/Decode Files or Information Agrius has deployed base64-encoded variants of ASPXSpy to evade detection.1
enterprise T1041 Exfiltration Over C2 Channel Agrius exfiltrated staged data using tools such as Putty and WinSCP, communicating with command and control servers.5
enterprise T1190 Exploit Public-Facing Application Agrius exploits public-facing applications for initial access to victim environments. Examples include widespread attempts to exploit CVE-2018-13379 in FortiOS devices and SQL injection activity.1
enterprise T1562 Impair Defenses -
enterprise T1562.001 Disable or Modify Tools Agrius used several mechanisms to try to disable security tools. Agrius attempted to modify EDR-related services to disable auto-start on system reboot. Agrius used a publicly available driver, GMER64.sys typically used for anti-rootkit functionality, to selectively stop and remove security software processes.5
enterprise T1570 Lateral Tool Transfer Agrius downloaded some payloads for follow-on execution from legitimate filesharing services such as ufile.io and easyupload.io.2
enterprise T1036 Masquerading Agrius used the Plink tool for tunneling and connections to remote machines, renaming it systems.exe in some instances.5
enterprise T1046 Network Service Discovery Agrius used the open-source port scanner WinEggDrop to perform detailed scans of hosts of interest in victim networks.5
enterprise T1003 OS Credential Dumping -
enterprise T1003.001 LSASS Memory Agrius used tools such as Mimikatz to dump LSASS memory to capture credentials in victim environments.5
enterprise T1003.002 Security Account Manager Agrius dumped the SAM file on victim machines to capture credentials.5
enterprise T1021 Remote Services -
enterprise T1021.001 Remote Desktop Protocol Agrius tunnels RDP traffic through deployed web shells to access victim environments via compromised accounts.1 Agrius used the Plink tool to tunnel RDP connections for remote access and lateral movement in victim environments.5
enterprise T1018 Remote System Discovery Agrius used the tool NBTscan to scan for remote, accessible hosts in victim environments.5
enterprise T1505 Server Software Component -
enterprise T1505.003 Web Shell Agrius typically deploys a variant of the ASPXSpy web shell following initial access via exploitation.1
enterprise T1078 Valid Accounts -
enterprise T1078.002 Domain Accounts Agrius attempted to acquire valid credentials for victim environments through various means to enable follow-on lateral movement.5

Software

ID Name References Techniques
S1133 Apostle Agrius has used Apostle as both a wiper and ransomware-like effects capability in intrusions.1 Data Destruction Data Encrypted for Impact Deobfuscate/Decode Files or Information Disk Content Wipe:Disk Wipe Execution Guardrails Clear Windows Event Logs:Indicator Removal File Deletion:Indicator Removal Process Discovery Scheduled Task:Scheduled Task/Job System Shutdown/Reboot
S0073 ASPXSpy Agrius relies on web shells for persistent access post exploitation, with an emphasis on variants of ASPXSpy.1 Web Shell:Server Software Component
S1136 BFG Agonizer BFG Agonizer has been used by Agrius for wiping operations.5 Compromise Host Software Binary Disk Structure Wipe:Disk Wipe Inhibit System Recovery System Shutdown/Reboot
S1134 DEADWOOD DEADWOOD has been used by Agrius in wiping operations.1 Account Access Removal Data Destruction Deobfuscate/Decode Files or Information Disk Content Wipe:Disk Wipe Disk Structure Wipe:Disk Wipe Masquerade Task or Service:Masquerading Embedded Payloads:Obfuscated Files or Information Encrypted/Encoded File:Obfuscated Files or Information Service Execution:System Services System Time Discovery
S1132 IPsec Helper Agrius uses IPsec Helper as a post-exploitation remote access tool framework.1 Web Protocols:Application Layer Protocol PowerShell:Command and Scripting Interpreter Visual Basic:Command and Scripting Interpreter Windows Command Shell:Command and Scripting Interpreter Data from Local System Exfiltration Over C2 Channel Indicator Removal Clear Persistence:Indicator Removal File Deletion:Indicator Removal Lateral Tool Transfer Modify Registry Encrypted/Encoded File:Obfuscated Files or Information Process Discovery Service Execution:System Services Time Based Checks:Virtualization/Sandbox Evasion
S0002 Mimikatz Agrius used Mimikatz to dump credentials from LSASS memory.5 SID-History Injection:Access Token Manipulation Account Manipulation Security Support Provider:Boot or Logon Autostart Execution Credentials from Password Stores Credentials from Web Browsers:Credentials from Password Stores Windows Credential Manager:Credentials from Password Stores DCSync:OS Credential Dumping Security Account Manager:OS Credential Dumping LSASS Memory:OS Credential Dumping LSA Secrets:OS Credential Dumping Rogue Domain Controller Steal or Forge Authentication Certificates Golden Ticket:Steal or Forge Kerberos Tickets Silver Ticket:Steal or Forge Kerberos Tickets Private Keys:Unsecured Credentials Pass the Hash:Use Alternate Authentication Material Pass the Ticket:Use Alternate Authentication Material
S1137 Moneybird Moneybird is associated with ransomware operations launched by Agrius.2 Data Encrypted for Impact Embedded Payloads:Obfuscated Files or Information
S1135 MultiLayer Wiper MultiLayer Wiper is associated with wiping operations linked to Agrius.5 Windows Command Shell:Command and Scripting Interpreter Data Destruction Stored Data Manipulation:Data Manipulation Disk Structure Wipe:Disk Wipe File and Directory Discovery Disable or Modify Tools:Impair Defenses Indicator Removal File Deletion:Indicator Removal Clear Windows Event Logs:Indicator Removal Timestomp:Indicator Removal Inhibit System Recovery Embedded Payloads:Obfuscated Files or Information Scheduled Task:Scheduled Task/Job System Shutdown/Reboot
S0590 NBTscan Agrius used NBTscan to scan victim networks for existing and accessible hosts.5 Network Service Discovery Network Sniffing Remote System Discovery System Network Configuration Discovery System Owner/User Discovery

References