Skip to content

S0012 PoisonIvy

PoisonIvy is a popular remote access tool (RAT) that has been used by many groups.142

Item Value
ID S0012
Associated Names Breut, Poison Ivy, Darkmoon
Version 2.0
Created 31 May 2017
Last Modified 15 April 2022
Navigation Layer View In ATT&CK® Navigator

Associated Software Descriptions

Name Description
Breut 3
Poison Ivy 1 5
Darkmoon 5

Techniques Used

Domain ID Name Use
enterprise T1010 Application Window Discovery PoisonIvy captures window titles.2
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.2
enterprise T1547.014 Active Setup PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.678
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.2
enterprise T1543 Create or Modify System Process -
enterprise T1543.003 Windows Service PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk.2
enterprise T1005 Data from Local System PoisonIvy creates a backdoor through which remote attackers can steal system information.2
enterprise T1074 Data Staged -
enterprise T1074.001 Local Data Staging PoisonIvy stages collected data in a text file.2
enterprise T1573 Encrypted Channel -
enterprise T1573.001 Symmetric Cryptography PoisonIvy uses the Camellia cipher to encrypt communications.1
enterprise T1105 Ingress Tool Transfer PoisonIvy creates a backdoor through which remote attackers can upload files.2
enterprise T1056 Input Capture -
enterprise T1056.001 Keylogging PoisonIvy contains a keylogger.12
enterprise T1112 Modify Registry PoisonIvy creates a Registry subkey that registers a new system device.2
enterprise T1027 Obfuscated Files or Information PoisonIvy hides any strings related to its own indicators of compromise.2
enterprise T1055 Process Injection -
enterprise T1055.001 Dynamic-link Library Injection PoisonIvy can inject a malicious DLL into a process.12
enterprise T1014 Rootkit PoisonIvy starts a rootkit from a malicious file dropped to disk.2

Groups That Use This Software

ID Name References
G0021 Molerats 91011
G0093 GALLIUM 1213
G0002 Moafee 14
G0081 Tropic Trooper 15
G0018 admin@338 16
G0066 Elderwood 4
G0045 menuPass 1718
G0001 Axiom 193
G0129 Mustang Panda 2021
G0011 PittyTiger 22
G0136 IndigoZebra 23
G0006 APT1 24
G0017 DragonOK 25


  1. FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014. 

  2. Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018. 

  3. Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014. 

  4. O’Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018. 

  5. Payet, L. (2014, September 19). Life on Mars: How attackers took advantage of hope for alien existance in new Darkmoon campaign. Retrieved September 13, 2018. 

  6. McCormack, M. (2017, September 15). Backdoor:Win32/Poisonivy.E. Retrieved December 21, 2020. 

  7. Ray, V., et al. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved December 18, 2020. 

  8. Anubhav, A., Kizhakkinan, D. (2017, February 22). Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government. Retrieved February 24, 2017. 

  9. ClearSky. (2016, January 7). Operation DustySky. Retrieved January 8, 2016. 

  10. ClearSky Cybersecurity. (2016, June 9). Operation DustySky - Part 2. Retrieved August 3, 2016. 

  11. Villeneuve, N., Haq, H., Moran, N. (2013, August 23). OPERATION MOLERATS: MIDDLE EAST CYBER ATTACKS USING POISON IVY. Retrieved April 1, 2016. 

  12. Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019. 

  13. MSTIC. (2019, December 12). GALLIUM: Targeting global telecom. Retrieved January 13, 2021. 

  14. Haq, T., Moran, N., Scott, M., & Vashisht, S. O. (2014, September 10). The Path to Mass-Producing Cyber Attacks [Blog]. Retrieved November 12, 2014. 

  15. Ray, V. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved November 9, 2018. 

  16. FireEye Threat Intelligence. (2015, December 1). China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets. Retrieved December 4, 2015. 

  17. PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017. 

  18. US District Court Southern District of New York. (2018, December 17). United States v. Zhu Hua Indictment. Retrieved December 17, 2020. 

  19. Esler, J., Lee, M., and Williams, C.. (2014, October 14). Threat Spotlight: Group 72. Retrieved January 14, 2016. 

  20. Meyers, A. (2018, June 15). Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA. Retrieved April 12, 2021. 


  22. Villeneuve, N., Homan, J. (2014, July 31). Spy of the Tiger. Retrieved September 29, 2015. 

  23. Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016. 

  24. Haq, T., Moran, N., Vashisht, S., Scott, M. (2014, September). OPERATION QUANTUM ENTANGLEMENT. Retrieved November 4, 2015. 

Back to top