S0012 PoisonIvy
PoisonIvy is a popular remote access tool (RAT) that has been used by many groups.142
Item | Value |
---|---|
ID | S0012 |
Associated Names | Breut, Poison Ivy, Darkmoon |
Type | MALWARE |
Version | 2.1 |
Created | 31 May 2017 |
Last Modified | 20 March 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Software Descriptions
Name | Description |
---|---|
Breut | 3 |
Poison Ivy | 1 5 |
Darkmoon | 5 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1010 | Application Window Discovery | PoisonIvy captures window titles.2 |
enterprise | T1547 | Boot or Logon Autostart Execution | - |
enterprise | T1547.001 | Registry Run Keys / Startup Folder | PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.2 |
enterprise | T1547.014 | Active Setup | PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.678 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.003 | Windows Command Shell | PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.2 |
enterprise | T1543 | Create or Modify System Process | - |
enterprise | T1543.003 | Windows Service | PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk.2 |
enterprise | T1005 | Data from Local System | PoisonIvy creates a backdoor through which remote attackers can steal system information.2 |
enterprise | T1074 | Data Staged | - |
enterprise | T1074.001 | Local Data Staging | PoisonIvy stages collected data in a text file.2 |
enterprise | T1573 | Encrypted Channel | - |
enterprise | T1573.001 | Symmetric Cryptography | PoisonIvy uses the Camellia cipher to encrypt communications.1 |
enterprise | T1105 | Ingress Tool Transfer | PoisonIvy creates a backdoor through which remote attackers can upload files.2 |
enterprise | T1056 | Input Capture | - |
enterprise | T1056.001 | Keylogging | PoisonIvy contains a keylogger.12 |
enterprise | T1112 | Modify Registry | PoisonIvy creates a Registry subkey that registers a new system device.2 |
enterprise | T1027 | Obfuscated Files or Information | PoisonIvy hides any strings related to its own indicators of compromise.2 |
enterprise | T1055 | Process Injection | - |
enterprise | T1055.001 | Dynamic-link Library Injection | PoisonIvy can inject a malicious DLL into a process.12 |
enterprise | T1014 | Rootkit | PoisonIvy starts a rootkit from a malicious file dropped to disk.2 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0093 | GALLIUM | 1011 |
G0018 | admin@338 | 12 |
G0002 | Moafee | 13 |
G0006 | APT1 | 14 |
G0136 | IndigoZebra | 15 |
G0021 | Molerats | 161718 |
G0017 | DragonOK | 19 |
G0045 | menuPass | 2021 |
G0066 | Elderwood | 4 |
G0011 | PittyTiger | 22 |
G0129 | Mustang Panda | 2324 |
G0081 | Tropic Trooper | 25 |
G0001 | Axiom | 263 |
References
-
FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014. ↩↩↩↩↩
-
Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014. ↩↩
-
O’Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018. ↩↩
-
Payet, L. (2014, September 19). Life on Mars: How attackers took advantage of hope for alien existance in new Darkmoon campaign. Retrieved September 13, 2018. ↩↩
-
McCormack, M. (2017, September 15). Backdoor:Win32/Poisonivy.E. Retrieved December 21, 2020. ↩
-
Ray, V., et al. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved December 18, 2020. ↩
-
Anubhav, A., Kizhakkinan, D. (2017, February 22). Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government. Retrieved February 24, 2017. ↩
-
Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021. ↩
-
Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019. ↩
-
MSTIC. (2019, December 12). GALLIUM: Targeting global telecom. Retrieved January 13, 2021. ↩
-
FireEye Threat Intelligence. (2015, December 1). China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets. Retrieved December 4, 2015. ↩
-
Haq, T., Moran, N., Scott, M., & Vashisht, S. O. (2014, September 10). The Path to Mass-Producing Cyber Attacks [Blog]. Retrieved November 12, 2014. ↩
-
Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016. ↩
-
Kaspersky Lab’s Global Research & Analysis Team. (2017, August 8). APT Trends report Q2 2017. Retrieved February 15, 2018. ↩
-
ClearSky. (2016, January 7). Operation DustySky. Retrieved January 8, 2016. ↩
-
ClearSky Cybersecurity. (2016, June 9). Operation DustySky - Part 2. Retrieved August 3, 2016. ↩
-
Villeneuve, N., Haq, H., Moran, N. (2013, August 23). OPERATION MOLERATS: MIDDLE EAST CYBER ATTACKS USING POISON IVY. Retrieved April 1, 2016. ↩
-
Haq, T., Moran, N., Vashisht, S., Scott, M. (2014, September). OPERATION QUANTUM ENTANGLEMENT. Retrieved November 4, 2015. ↩
-
PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017. ↩
-
US District Court Southern District of New York. (2018, December 17). United States v. Zhu Hua Indictment. Retrieved December 17, 2020. ↩
-
Villeneuve, N., Homan, J. (2014, July 31). Spy of the Tiger. Retrieved September 29, 2015. ↩
-
Meyers, A. (2018, June 15). Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA. Retrieved April 12, 2021. ↩
-
Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021. ↩
-
Ray, V. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved November 9, 2018. ↩
-
Esler, J., Lee, M., and Williams, C. (2014, October 14). Threat Spotlight: Group 72. Retrieved January 14, 2016. ↩