T1140 Deobfuscate/Decode Files or Information
Adversaries may use Obfuscated Files or Information to hide artifacts of an intrusion from analysis. They may require separate mechanisms to decode or deobfuscate that information depending on how they intend to use it. Methods for doing that include built-in functionality of malware or by using utilities present on the system.
One such example is use of certutil to decode a remote access tool portable executable file that has been hidden inside a certificate file. 1 Another example is using the Windows copy /b
command to reassemble binary fragments into a malicious payload. 2
Sometimes a user’s action may be required to open it for deobfuscation or decryption as part of User Execution. The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. 3
Item | Value |
---|---|
ID | T1140 |
Sub-techniques | |
Tactics | TA0005 |
Platforms | Linux, Windows, macOS |
Permissions required | User |
Version | 1.1 |
Created | 14 December 2017 |
Last Modified | 09 July 2020 |
Procedure Examples
ID | Name | Description |
---|---|---|
S0469 | ABK | ABK has the ability to decrypt AES encrypted payloads.65 |
S0331 | Agent Tesla | Agent Tesla has the ability to decrypt strings encrypted with the Rijndael symmetric encryption algorithm.50 |
S0584 | AppleJeus | AppleJeus has decoded files received from a C2.28 |
S0622 | AppleSeed | AppleSeed can decode its payload prior to execution.130 |
G0073 | APT19 | An APT19 HTTP malware variant decrypts strings using single-byte XOR keys.220 |
G0007 | APT28 | An APT28 macro uses the command certutil -decode to decode contents of a .txt file storing the base64 encoded payload.209210 |
G0016 | APT29 | APT29 used 7-Zip to decode its Raindrop malware.103 |
G0087 | APT39 | APT39 has used malware to decrypt encrypted CAB files.230 |
S0456 | Aria-body | Aria-body has the ability to decrypt the loader configuration and payload DLL.76 |
S0373 | Astaroth | Astaroth uses a fromCharCode() deobfuscation method to avoid explicitly writing execution commands and to hide its code. 166167 |
S0347 | AuditCred | AuditCred uses XOR and RC4 to perform decryption on the code functions.168 |
S0640 | Avaddon | Avaddon has decrypted encrypted strings.200 |
S0473 | Avenger | Avenger has the ability to decrypt files downloaded from C2.65 |
S0344 | Azorult | Azorult uses an XOR key to decrypt content and uses Base64 to decode the C2 address.198199 |
S0638 | Babuk | Babuk has the ability to unpack itself into memory using XOR.154155 |
S0414 | BabyShark | BabyShark has the ability to decode downloaded files prior to execution.188 |
S0475 | BackConfig | BackConfig has used a custom routine to decrypt strings.79 |
S0642 | BADFLICK | BADFLICK can decode shellcode using a custom rotating XOR cipher.25 |
S0234 | Bandook | Bandook has decoded its PowerShell script.134 |
S0239 | Bankshot | Bankshot decodes embedded XOR strings.169 |
S0534 | Bazar | Bazar can decrypt downloaded payloads. Bazar also resolves strings and API calls at runtime.1617 |
S0470 | BBK | BBK has the ability to decrypt AES encrypted payloads.65 |
S0127 | BBSRAT | BBSRAT uses Expand to decompress a CAB file into executable content.38 |
S0574 | BendyBear | BendyBear has decrypted function blocks using a XOR key during runtime to evade detection.118 |
S0268 | Bisonal | Bisonal has decoded strings in the malware using XOR and RC4.3132 |
S0520 | BLINDINGCAN | BLINDINGCAN has used AES and XOR to decrypt its DLLs.45 |
S0635 | BoomBox | BoomBox can decrypt AES-encrypted files downloaded from C2.119 |
S0415 | BOOSTWRITE | BOOSTWRITE has used a a 32-byte long multi-XOR key to decode data inside its payload.44 |
G0060 | BRONZE BUTLER | BRONZE BUTLER downloads encoded payloads and decodes them on the victim.214 |
S0482 | Bundlore | Bundlore has used openssl to decrypt AES encrypted payload data. Bundlore has also used base64 and RC4 with a hardcoded key to deobfuscate data.51 |
S0335 | Carbon | Carbon decrypts task and configuration files for execution.3637 |
S0348 | Cardinal RAT | Cardinal RAT decodes many of its artifacts and is decrypted (AES-128) after being downloaded.163 |
S0160 | certutil | certutil has been used to decode binaries hidden inside certificate files as Base64 information.1 |
S0631 | Chaes | Chaes has decrypted an AES encrypted binary file to trigger the download of other files.112 |
S0674 | CharmPower | CharmPower can decrypt downloaded modules prior to execution.129 |
S0660 | Clambling | Clambling can deobfuscate its payload prior to execution.89 |
S0611 | Clop | Clop has used a simple XOR operation to decrypt strings.30 |
S0154 | Cobalt Strike | Cobalt Strike can deobfuscate shellcode using a rolling XOR and decrypt metadata from Beacon sessions.184185 |
S0369 | CoinTicker | CoinTicker decodes the initially-downloaded hidden encoded file using OpenSSL.27 |
S0126 | ComRAT | ComRAT has used unique per machine passwords to decrypt the orchestrator payload and a hardcoded XOR key to decrypt its communications module. ComRAT has also used a unique password to decrypt the file used for its hidden file system.8990 |
S0575 | Conti | Conti has decrypted its payload using a hardcoded AES-256 key.9899 |
S0492 | CookieMiner | CookieMiner has used Google Chrome’s decryption and extraction operations.148 |
S0614 | CostaBricks | CostaBricks has the ability to use bytecode to decrypt embedded payloads.39 |
S0115 | Crimson | Crimson can decode its encoded PE file prior to execution.160 |
S0687 | Cyclops Blink | Cyclops Blink can decrypt and parse instructions sent from C2.58 |
G0012 | Darkhotel | Darkhotel has decrypted strings and imports using RC4 during execution.223224 |
S0673 | DarkWatchman | DarkWatchman has the ability to self-extract as a RAR archive.135 |
S0255 | DDKONG | DDKONG decodes an embedded configuration using XOR.24 |
S0354 | Denis | Denis will decrypt important strings used for C&C communication.190 |
S0547 | DropBook | DropBook can unarchive data downloaded from the C2 to obtain the payload and persistence modules.136 |
S0502 | Drovorub | Drovorub has de-obsfuscated XOR encrypted payloads in WebSocket messages.171 |
S0567 | Dtrack | Dtrack has used a decryption routine that is part of an executable physical patch.55 |
S0024 | Dyre | Dyre decrypts resources needed for targeting the victim.123124 |
S0377 | Ebury | Ebury has verified C2 domain ownership by decrypting the TXT record using an embedded RSA public key.165 |
S0624 | Ecipekac | Ecipekac has the ability to decrypt fileless loader modules.47 |
S0554 | Egregor | Egregor has been decrypted before execution.120121 |
S0634 | EnvyScout | EnvyScout can deobfuscate and write malicious ISO files to disk.119 |
S0401 | Exaramel for Linux | Exaramel for Linux can decrypt its configuration file.61 |
S0361 | Expand | Expand can be used to decompress a local or remote CAB file into an executable.4 |
S0512 | FatDuke | FatDuke can decrypt AES encrypted C2 communications.29 |
S0355 | Final1stspy | Final1stspy uses Python code to deobfuscate base64-encoded strings.42 |
S0182 | FinFisher | FinFisher extracts and decrypts stage 3 malware, which is stored in encrypted resources.6364 |
S0618 | FIVEHANDS | FIVEHANDS has the ability to decrypt its payload prior to execution.524053 |
S0661 | FoggyWeb | FoggyWeb can be decrypted in memory using a Lightweight Encryption Algorithm (LEA)-128 key and decoded using a XOR key.68 |
G0101 | Frankenstein | Frankenstein has deobfuscated base64-encoded commands following the execution of a malicious script, which revealed a small script designed to obtain an additional payload.208 |
S0628 | FYAnti | FYAnti has the ability to decrypt an embedded .NET module.47 |
G0047 | Gamaredon Group | Gamaredon Group tools decrypted additional payloads from the C2. Gamaredon Group has also decoded base64-encoded source code of a downloader.217218 |
S0666 | Gelsemium | Gelsemium can decompress and decrypt DLLs and shellcode.83 |
S0032 | gh0st RAT | gh0st RAT has decrypted and loaded the gh0st RAT DLL into memory, once the initial dropper executable is launched.7 |
S0588 | GoldMax | GoldMax has decoded and decrypted the configuration file when executed.181182 |
S0477 | Goopy | Goopy has used a polymorphic decryptor to decrypt itself at runtime.190 |
G0078 | Gorgon Group | Gorgon Group malware can decode contents from a payload that was Base64 encoded and write the contents to a file.215 |
S0531 | Grandoreiro | Grandoreiro can decrypt its encrypted internal strings.133 |
S0690 | Green Lambert | Green Lambert can use multiple custom routines to decrypt strings prior to execution.2223 |
S0632 | GrimAgent | GrimAgent can use a decryption algorithm for strings based on Rotate on Right (RoR) and Rotate on Left (RoL) functionality.33 |
S0499 | Hancitor | Hancitor has decoded Base64 encoded URLs to insert a recipient’s name into the filename of the Word document. Hancitor has also extracted executables from ZIP files.196197 |
S0697 | HermeticWiper | HermeticWiper can decompress and copy driver files using LZCopy .62 |
S0394 | HiddenWasp | HiddenWasp uses a cipher to implement a decoding function.102 |
G0126 | Higaisa | Higaisa used certutil to decode Base64 binaries at runtime and a 16-byte XOR key to decrypt data.201202 |
S0601 | Hildegard | Hildegard has decrypted ELF files with AES.35 |
G0072 | Honeybee | Honeybee drops a Word file containing a Base64-encoded file in it that is read, decoded, and dropped to the disk by the macro.231 |
S0398 | HyperBro | HyperBro can unpack and decrypt its payload prior to execution.814 |
S0434 | Imminent Monitor | Imminent Monitor has decoded malware components that are then dropped to the system.6 |
S0604 | Industroyer | Industroyer decrypts code to connect to a remote C2 server.60 |
S0260 | InvisiMole | InvisiMole can decrypt, unpack and load a DLL from its resources, or from blobs encrypted with Data Protection API, two-key triple DES, and variations of the XOR cipher.8586 |
S0581 | IronNetInjector | IronNetInjector has the ability to decrypt embedded .NET and PE payloads.5 |
S0189 | ISMInjector | ISMInjector uses the certutil command to decode a payload file.157 |
G0004 | Ke3chang | Ke3chang has deobfuscated Base64-encoded shellcode strings prior to loading them.219 |
S0585 | Kerrdown | Kerrdown can decode, decrypt, and decompress multiple layers of shellcode.146 |
S0487 | Kessel | Kessel has decrypted the binary’s configuration once the main function was launched.178 |
S0526 | KGH_SPY | KGH_SPY can decrypt encrypted strings and write them to a newly created folder.72 |
G0094 | Kimsuky | Kimsuky has decoded malicious VBScripts using Base64.216 |
S0641 | Kobalos | Kobalos decrypts strings right after the initial communication, but before the authentication process.69 |
S0669 | KOCTOPUS | KOCTOPUS has deobfuscated itself before executing its commands.175 |
S0356 | KONNI | KONNI has used certutil to download and decode base64 encoded strings and has also devoted a custom section to performing all the components of the deobfuscation process.127128 |
S0236 | Kwampirs | Kwampirs decrypts and extracts a copy of its main DLL payload when executing.191 |
G0032 | Lazarus Group | Lazarus Group has used shellcode within macros to decrypt and manually map DLLs and shellcode into memory at runtime.206207 |
G0065 | Leviathan | Leviathan has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors.229 |
S0395 | LightNeuron | LightNeuron has used AES and XOR to decrypt configuration files and commands.156 |
S0513 | LiteDuke | LiteDuke has the ability to decrypt and decode multiple layers of obfuscation.29 |
S0681 | Lizar | Lizar can decrypt its configuration data.180 |
S0447 | Lokibot | Lokibot has decoded and decrypted its stages multiple times using hard-coded keys to deliver the final payload, and has decoded its server response hex string using XOR.147 |
S0582 | LookBack | LookBack has a function that decrypts malicious data.164 |
S0532 | Lucifer | Lucifer can decrypt its C2 address upon execution.158 |
S0409 | Machete | Machete’s downloaded data is decrypted using AES.87 |
S0576 | MegaCortex | MegaCortex has used a Base64 key to decode its components.150 |
G0045 | menuPass | menuPass has used certutil in a macro to decode base64-encoded content contained in a dropper document attached to an email. The group has also used certutil -decode to decode files on the victim’s machine when dropping UPPERCUT.232233 |
S0443 | MESSAGETAP | After checking for the existence of two files, keyword_parm.txt and parm.txt, MESSAGETAP XOR decodes and read the contents of the files. 126 |
S0455 | Metamorfo | Upon execution, Metamorfo has unzipped itself after being downloaded to the system and has performed string decryption.181920 |
S0280 | MirageFox | MirageFox has a function for decrypting data containing C2 configuration information.48 |
G0021 | Molerats | Molerats decompresses ZIP files once on the victim machine.228 |
S0284 | More_eggs | More_eggs will decode malware components that are then dropped to the system.145 |
G0069 | MuddyWater | MuddyWater decoded base64-encoded PowerShell commands using a VBS file.22122294 |
S0637 | NativeZone | NativeZone can decrypt and decode embedded Cobalt Strike beacon stage shellcode.119 |
S0457 | Netwalker | Netwalker‘s PowerShell script can decode and decrypt multiple layers of obfuscation, leading to the Netwalker DLL being loaded into memory.183 |
S0353 | NOKKI | NOKKI uses a unique, custom de-obfuscation technique.84 |
G0049 | OilRig | A OilRig macro has run a PowerShell command to decode file contents. OilRig has also used certutil to decode base64-encoded files on victims.204157189205 |
S0439 | Okrum | Okrum‘s loader can decrypt the backdoor code, embedded within the loader or within a legitimate PNG file. A custom XOR cipher or RC4 is used for decryption.71 |
S0052 | OnionDuke | OnionDuke can use a custom decryption algorithm to decrypt strings.29 |
S0264 | OopsIE | OopsIE concatenates then decompresses multiple resources to load an embedded .Net Framework assembly.189 |
S0402 | OSX/Shlayer | OSX/Shlayer can base64-decode and AES-decrypt downloaded payloads.113 Versions of OSX/Shlayer pass encrypted and password-protected code to openssl and then write the payload to the /tmp folder.114115 |
S0598 | P.A.S. Webshell | P.A.S. Webshell can use a decryption mechanism to process a user supplied password and allow execution.61 |
S0517 | Pillowmint | Pillowmint has been decompressed by included shellcode prior to being launched.92 |
S0501 | PipeMon | PipeMon can decrypt password-protected executables.96 |
S0013 | PlugX | PlugX decompresses and decrypts itself using the Microsoft API call RtlDecompressBuffer.66867 |
S0428 | PoetRAT | PoetRAT has used LZMA and base64 libraries to decode obfuscated scripts.195 |
S0518 | PolyglotDuke | PolyglotDuke can use a custom algorithm to decrypt strings used by the malware.29 |
S0223 | POWERSTATS | POWERSTATS can deobfuscate the main backdoor code.94 |
S0279 | Proton | Proton uses an encrypted file to store commands and configuration values.193 |
S0613 | PS1 | PS1 can use an XOR key to decrypt a PowerShell loader and payload binary.39 |
S0147 | Pteranodon | Pteranodon can decrypt encrypted data strings prior to using them.125 |
S0196 | PUNCHBUGGY | PUNCHBUGGY has used PowerShell to decode base64-encoded assembly.88 |
S0650 | QakBot | QakBot can deobfuscate and re-assemble code strings for execution.141142143 |
S0269 | QUADAGENT | QUADAGENT uses AES and a preshared key to decrypt the custom Base64 routine used to encode strings and scripts.100 |
S0565 | Raindrop | Raindrop decrypted its Cobalt Strike payload using an AES-256 encryption algorithm in CBC mode with a unique key per sample.103104 |
S0629 | RainyDay | RainyDay can decrypt its payload via a XOR key.95 |
S0458 | Ramsay | Ramsay can extract its agent from the body of a malicious document.101 |
S0495 | RDAT | RDAT can deobfuscate the base64-encoded and AES-encrypted files downloaded from the C2 server.59 |
S0511 | RegDuke | RegDuke can decrypt strings with a key either stored in the Registry or hardcoded in the code.29 |
S0375 | Remexi | Remexi decrypts the configuration data using XOR with 25-character keys.137 |
S0496 | REvil | REvil can decode encrypted strings to enable execution of commands and payloads.105106107108109110 |
S0258 | RGDoor | RGDoor decodes Base64 strings and decrypts strings using a custom XOR algorithm.21 |
S0448 | Rising Sun | Rising Sun decrypted itself using a single-byte XOR scheme. Additionally, Rising Sun can decrypt its configuration data at runtime.149 |
G0106 | Rocke | Rocke has extracted tar.gz files after downloading them from a C2 server.212 |
S0270 | RogueRobin | RogueRobin decodes an embedded executable using base64 and decompresses it.131 |
S0240 | ROKRAT | ROKRAT can decrypt strings using the victim’s hostname as the key.7475 |
G0034 | Sandworm Team | Sandworm Team‘s VBS backdoor can decode Base64-encoded data and save it to the %TEMP% folder. The group also decrypted received information using the Triple DES algorithm and decompresses it using GZip.225226 |
S0461 | SDBbot | SDBbot has the ability to decrypt and decompress its payload to enable code execution.186187 |
S0596 | ShadowPad | ShadowPad has decrypted a binary blob to start execution.46 |
S0140 | Shamoon | Shamoon decrypts ciphertext using an XOR cipher and a base64-encoded string.93 |
S0546 | SharpStage | SharpStage has decompressed data received from the C2 server.49 |
S0444 | ShimRat | ShimRat has decompressed its core DLL using shellcode once an impersonated antivirus component was running on a system.159 |
S0589 | Sibot | Sibot can decrypt data received from a C2 and save to a file.181 |
S0610 | SideTwist | SideTwist can decode and decrypt messages received from C2.73 |
S0623 | Siloscape | Siloscape has decrypted the password of the C2 server with a simple byte by byte XOR. Siloscape also writes both an archive of Tor and the unzip binary to disk from data embedded within the payload using Visual Studio’s Resource Manager.122 |
S0468 | Skidmap | Skidmap has the ability to download, unpack, and decrypt tar.gz files .91 |
S0226 | Smoke Loader | Smoke Loader deobfuscates its code.82 |
S0615 | SombRAT | SombRAT can run upload to decrypt and upload files from storage.3940 |
S0516 | SoreFang | SoreFang can decode and decrypt exfiltrated data sent to C2.13 |
S0543 | Spark | Spark has used a custom XOR algorithm to decrypt the payload.54 |
S0390 | SQLRat | SQLRat has scripts that are responsible for deobfuscating additional scripts.43 |
S0188 | Starloader | Starloader decrypts and executes shellcode from a file called Stars.jps.26 |
S0603 | Stuxnet | Stuxnet decrypts resources that are loaded into memory and executed.77 |
S0562 | SUNSPOT | SUNSPOT decrypts SUNBURST, which was stored in AES128-CBC encrypted blobs.34 |
S0663 | SysUpdate | SysUpdate can deobfuscate packed binaries in memory.14 |
S0011 | Taidoor | Taidoor can use a stream cipher to decrypt stings used by the malware.179 |
S0560 | TEARDROP | TEARDROP was decoded using a custom rolling XOR algorithm to execute a customized Cobalt Strike payload.138139104 |
G0027 | Threat Group-3390 | During execution, Threat Group-3390 malware deobfuscates and decompresses code that was encoded with Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.227 |
S0665 | ThreatNeedle | ThreatNeedle can decrypt its payload using RC4, AES, or one-byte XORing.170 |
S0678 | Torisma | Torisma has used XOR and Base64 to decode C2 data.116 |
S0266 | TrickBot | TrickBot decodes the configuration data and modules.101112 |
G0081 | Tropic Trooper | Tropic Trooper used shellcode with an XOR algorithm to decrypt a payload. Tropic Trooper also decrypted image files which contained a payload.234235 |
S0436 | TSCookie | TSCookie has the ability to decrypt, load, and execute a DLL and its resources.57 |
S0647 | Turian | Turian has the ability to use a XOR decryption key to extract C2 server domains and IP addresses.132 |
G0010 | Turla | Turla has used a custom decryption routine, which pulls key and salt values from other artifacts such as a WMI filter or PowerShell Profile, to decode encrypted PowerShell payloads.211 |
S0263 | TYPEFRAME | One TYPEFRAME variant decrypts an archive using an RC4 key, then decompresses and installs the decrypted malicious DLL module. Another variant decodes the embedded file by XORing it with the value “0x35”.70 |
S0386 | Ursnif | Ursnif has used crypto key information stored in the Registry to decrypt Tor clients dropped to disk.192 |
S0476 | Valak | Valak has the ability to decode and decrypt downloaded files.176177 |
S0636 | VaporRage | VaporRage can deobfuscate XOR-encoded shellcode prior to execution.119 |
S0257 | VERMIN | VERMIN decrypts code, strings, and commands to use once it’s on the victim’s machine.97 |
S0180 | Volgmer | Volgmer deobfuscates its strings and APIs once its executed.194 |
S0670 | WarzoneRAT | WarzoneRAT can use XOR 0x45 to decrypt obfuscated code.80 |
S0612 | WastedLocker | WastedLocker‘s custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.140 |
S0579 | Waterbear | Waterbear has the ability to decrypt its RC4 encrypted payload for execution.144 |
S0515 | WellMail | WellMail can decompress scripts received from C2.111 |
S0514 | WellMess | WellMess can decode and decrypt data received from C2.172173174 |
S0689 | WhisperGate | WhisperGate can deobfuscate downloaded files stored in reverse byte order and decrypt embedded resources using multiple XOR operations.161162 |
S0466 | WindTail | WindTail has the ability to decrypt strings using hard-coded AES keys.117 |
S0430 | Winnti for Linux | Winnti for Linux has decoded XOR encoded strings holding its configuration upon execution.56 |
S0141 | Winnti for Windows | The Winnti for Windows dropper can decrypt and decompresses a data blob.151 |
G0090 | WIRTE | WIRTE has used Base64 to decode malicious VBS script.203 |
S0653 | xCaon | xCaon has decoded strings from the C2 server before executing commands.15 |
S0388 | YAHOYAH | YAHOYAH decrypts downloaded files before execution.41 |
S0251 | Zebrocy | Zebrocy decodes its secondary payload and writes it to the victim’s machine. Zebrocy also uses AES and XOR to decrypt strings and payloads.152153 |
S0230 | ZeroT | ZeroT shellcode decrypts and decompresses its RC4-encrypted payload.78 |
S0330 | Zeus Panda | Zeus Panda decrypts strings in the code during the execution process.81 |
G0128 | ZIRCONIUM | ZIRCONIUM has used the AES256 algorithm with a SHA1 derived key to decrypt exploit code.213 |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0022 | File | File Modification |
DS0009 | Process | Process Creation |
DS0012 | Script | Script Execution |
References
-
Malwarebytes Labs. (2017, March 27). New targeted attack against Saudi Arabia Government. Retrieved July 3, 2017. ↩↩
-
Tedesco, B. (2016, September 23). Security Alert Summary. Retrieved February 12, 2018. ↩
-
Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017. ↩
-
Microsoft. (2017, October 15). Expand. Retrieved February 19, 2019. ↩
-
Reichel, D. (2021, February 19). IronNetInjector: Turla’s New Malware Loading Tool. Retrieved February 24, 2021. ↩
-
QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020. ↩
-
Quinn, J. (2019, March 25). The odd case of a Gh0stRAT variant. Retrieved July 15, 2020. ↩
-
Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021. ↩↩↩
-
Chen, T. and Chen, Z. (2020, February 17). CLAMBLING - A New Backdoor Base On Dropbox. Retrieved November 12, 2021. ↩
-
Reaves, J. (2016, October 15). TrickBot: We Missed you, Dyre. Retrieved August 2, 2018. ↩
-
Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020. ↩
-
Joe Security. (2020, July 13). TrickBot’s new API-Hammering explained. Retrieved September 30, 2021. ↩
-
CISA. (2020, July 16). MAR-10296782-1.v1 – SOREFANG. Retrieved September 29, 2020. ↩
-
Lunghi, D. and Lu, K. (2021, April 9). Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware. Retrieved November 12, 2021. ↩↩
-
CheckPoint Research. (2021, July 1). IndigoZebra APT continues to attack Central Asia with evolving tools. Retrieved September 24, 2021. ↩
-
Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020. ↩
-
Pantazopoulos, N. (2020, June 2). In-depth analysis of the new Team9 malware family. Retrieved December 1, 2020. ↩
-
Erlich, C. (2020, April 3). The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable. Retrieved May 26, 2020. ↩
-
Sierra, E., Iglesias, G.. (2018, April 24). Metamorfo Campaigns Targeting Brazilian Users. Retrieved July 30, 2020. ↩
-
ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021. ↩
-
Falcone, R. (2018, January 25). OilRig uses RGDoor IIS Backdoor on Targets in the Middle East. Retrieved July 6, 2018. ↩
-
Sandvik, Runa. (2021, October 1). Made In America: Green Lambert for OS X. Retrieved March 21, 2022. ↩
-
Sandvik, Runa. (2021, October 18). Green Lambert and ATT&CK. Retrieved March 21, 2022. ↩
-
Ash, B., et al. (2018, June 26). RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families. Retrieved July 2, 2018. ↩
-
Accenture iDefense Unit. (2019, March 5). Mudcarp’s Focus on Submarine Technologies. Retrieved August 24, 2021. ↩
-
Symantec Security Response. (2017, November 7). Sowbug: Cyber espionage group targets South American and Southeast Asian governments. Retrieved November 16, 2017. ↩
-
Thomas Reed. (2018, October 29). Mac cryptocurrency ticker app installs backdoors. Retrieved April 23, 2019. ↩
-
Cybersecurity and Infrastructure Security Agency. (2021, February 21). AppleJeus: Analysis of North Korea’s Cryptocurrency Malware. Retrieved March 1, 2021. ↩
-
Faou, M., Tartare, M., Dupuy, T. (2019, October). OPERATION GHOST. Retrieved September 23, 2020. ↩↩↩↩↩
-
Mundo, A. (2019, August 1). Clop Ransomware. Retrieved May 10, 2021. ↩
-
Hayashi, K., Ray, V. (2018, July 31). Bisonal Malware Used in Attacks Against Russia and South Korea. Retrieved August 7, 2018. ↩
-
Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022. ↩
-
Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved July 16, 2021. ↩
-
CrowdStrike Intelligence Team. (2021, January 11). SUNSPOT: An Implant in the Build Process. Retrieved January 11, 2021. ↩
-
Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021. ↩
-
ESET. (2017, March 30). Carbon Paper: Peering into Turla’s second stage backdoor. Retrieved November 7, 2018. ↩
-
Accenture. (2020, October). Turla uses HyperStack, Carbon, and Kazuar to compromise government entity. Retrieved December 2, 2020. ↩
-
Lee, B. Grunzweig, J. (2015, December 22). BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger. Retrieved August 19, 2016. ↩
-
The BlackBerry Research and Intelligence Team. (2020, November 12). The CostaRicto Campaign: Cyber-Espionage Outsourced. Retrieved May 24, 2021. ↩↩↩
-
CISA. (2021, May 6). Analysis Report (AR21-126A) FiveHands Ransomware. Retrieved June 7, 2021. ↩↩
-
Alintanahin, K. (2015). Operation Tropic Trooper: Relying on Tried-and-Tested Flaws to Infiltrate Secret Keepers. Retrieved June 14, 2019. ↩
-
Grunzweig, J. (2018, October 01). NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT. Retrieved November 5, 2018. ↩
-
Platt, J. and Reeves, J.. (2019, March). FIN7 Revisited: Inside Astra Panel and SQLRat Malware. Retrieved June 18, 2019. ↩
-
Carr, N, et all. (2019, October 10). Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques. Retrieved October 11, 2019. ↩
-
US-CERT. (2020, August 19). MAR-10295134-1.v1 – North Korean Remote Access Trojan: BLINDINGCAN. Retrieved August 19, 2020. ↩
-
Kaspersky Lab. (2017, August). ShadowPad: popular server management software hit in supply chain attack. Retrieved March 22, 2021. ↩
-
GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021. ↩↩
-
Rosenberg, J. (2018, June 14). MirageFox: APT15 Resurfaces With New Tools Based On Old Ones. Retrieved September 21, 2018. ↩
-
Ilascu, I. (2020, December 14). Hacking group’s new malware abuses Google and Facebook services. Retrieved December 28, 2020. ↩
-
Jazi, H. (2020, April 16). New AgentTesla variant steals WiFi credentials. Retrieved May 19, 2020. ↩
-
Sushko, O. (2019, April 17). macOS Bundlore: Mac Virus Bypassing macOS Security Features. Retrieved June 30, 2020. ↩
-
McLellan, T. and Moore, J. et al. (2021, April 29). UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat. Retrieved June 2, 2021. ↩
-
Matthews, M. and Backhouse, W. (2021, June 15). Handy guide to a new Fivehands ransomware variant. Retrieved June 24, 2021. ↩
-
Falcone, R., et al. (2020, March 3). Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations. Retrieved December 14, 2020. ↩
-
Konstantin Zykov. (2019, September 23). Hello! My name is Dtrack. Retrieved January 20, 2021. ↩
-
Chronicle Blog. (2019, May 15). Winnti: More than just Windows and Gates. Retrieved April 29, 2020. ↩
-
Tomonaga, S.. (2018, March 6). Malware “TSCookie”. Retrieved May 6, 2020. ↩
-
NCSC. (2022, February 23). Cyclops Blink Malware Analysis Report. Retrieved March 3, 2022. ↩
-
Falcone, R. (2020, July 22). OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory. Retrieved July 28, 2020. ↩
-
Anton Cherepanov. (2017, June 12). Win32/Industroyer: A new threat for industrial controls systems. Retrieved December 18, 2020. ↩
-
ANSSI. (2021, January 27). SANDWORM INTRUSION SET CAMPAIGN TARGETING CENTREON SYSTEMS. Retrieved March 30, 2021. ↩↩
-
Thomas, W. et al. (2022, February 25). CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved March 25, 2022. ↩
-
Allievi, A.,Flori, E. (2018, March 01). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. Retrieved July 9, 2018. ↩
-
Chen, J. et al. (2019, November). Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data. Retrieved June 9, 2020. ↩↩↩
-
Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018. ↩
-
Raggi, M. et al. (2022, March 7). The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates. Retrieved March 16, 2022. ↩
-
Ramin Nafisi. (2021, September 27). FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor. Retrieved October 4, 2021. ↩
-
M.Leveille, M., Sanmillan, I. (2021, January). A WILD KOBALOS APPEARS Tricksy Linux malware goes after HPCs. Retrieved August 24, 2021. ↩
-
US-CERT. (2018, June 14). MAR-10135536-12 – North Korean Trojan: TYPEFRAME. Retrieved July 13, 2018. ↩
-
Hromcova, Z. (2019, July). OKRUM AND KETRICAN: AN OVERVIEW OF RECENT KE3CHANG GROUP ACTIVITY. Retrieved May 6, 2020. ↩
-
Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020. ↩
-
Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021. ↩
-
Cash, D., Grunzweig, J., Adair, S., Lancaster, T. (2021, August 25). North Korean BLUELIGHT Special: InkySquid Deploys RokRAT. Retrieved October 1, 2021. ↩
-
Jazi, Hossein. (2021, January 6). Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat. Retrieved March 22, 2022. ↩
-
CheckPoint. (2020, May 7). Naikon APT: Cyber Espionage Reloaded. Retrieved May 26, 2020. ↩
-
Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020. ↩
-
Huss, D., et al. (2017, February 2). Oops, they did it again: APT Targets Russia and Belarus with ZeroT and PlugX. Retrieved April 5, 2018. ↩
-
Hinchliffe, A. and Falcone, R. (2020, May 11). Updated BackConfig Malware Targeting Government and Military Organizations in South Asia. Retrieved June 17, 2020. ↩
-
Harakhavik, Y. (2020, February 3). Warzone: Behind the enemy lines. Retrieved December 17, 2021. ↩
-
Brumaghin, E., et al. (2017, November 02). Poisoning the Well: Banking Trojan Targets Google Search Results. Retrieved November 5, 2018. ↩
-
Baker, B., Unterbrink H. (2018, July 03). Smoking Guns - Smoke Loader learned new tricks. Retrieved July 5, 2018. ↩
-
Dupuy, T. and Faou, M. (2021, June). Gelsemium. Retrieved November 30, 2021. ↩
-
Grunzweig, J., Lee, B. (2018, September 27). New KONNI Malware attacking Eurasia and Southeast Asia. Retrieved November 5, 2018. ↩
-
Hromcová, Z. (2018, June 07). InvisiMole: Surprisingly equipped spyware, undercover since 2013. Retrieved July 10, 2018. ↩
-
Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020. ↩
-
ESET. (2019, July). MACHETE JUST GOT SHARPER Venezuelan government institutions under attack. Retrieved September 13, 2019. ↩
-
Gorelik, M.. (2019, June 10). SECURITY ALERT: FIN8 IS BACK IN BUSINESS, TARGETING THE HOSPITALITY INDUSTRY. Retrieved June 13, 2019. ↩
-
Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020. ↩
-
CISA. (2020, October 29). Malware Analysis Report (AR20-303A). Retrieved December 9, 2020. ↩
-
Remillano, A., Urbanec, J. (2019, September 19). Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload. Retrieved June 4, 2020. ↩
-
Trustwave SpiderLabs. (2020, June 22). Pillowmint: FIN7’s Monkey Thief . Retrieved July 27, 2020. ↩
-
Falcone, R. (2018, December 13). Shamoon 3 Targets Oil and Gas Organization. Retrieved March 14, 2019. ↩
-
ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018. ↩↩
-
Vrabie, V. (2021, April 23). NAIKON – Traces from a Military Cyber-Espionage Operation. Retrieved June 29, 2021. ↩
-
Tartare, M. et al. (2020, May 21). No “Game over” for the Winnti Group. Retrieved August 24, 2020. ↩
-
Lancaster, T., Cortes, J. (2018, January 29). VERMIN: Quasar RAT and Custom Malware Used In Ukraine. Retrieved July 5, 2018. ↩
-
Rochberger, L. (2021, January 12). Cybereason vs. Conti Ransomware. Retrieved February 17, 2021. ↩
-
Baskin, B. (2020, July 8). TAU Threat Discovery: Conti Ransomware. Retrieved February 17, 2021. ↩
-
Lee, B., Falcone, R. (2018, July 25). OilRig Targets Technology Service Provider and Government Agency with QUADAGENT. Retrieved August 9, 2018. ↩
-
Sanmillan, I.. (2020, May 13). Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks. Retrieved May 27, 2020. ↩
-
Sanmillan, I. (2019, May 29). HiddenWasp Malware Stings Targeted Linux Systems. Retrieved June 24, 2019. ↩
-
Symantec Threat Hunter Team. (2021, January 18). Raindrop: New Malware Discovered in SolarWinds Investigation. Retrieved January 19, 2021. ↩↩
-
MSTIC, CDOC, 365 Defender Research Team. (2021, January 20). Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop . Retrieved January 22, 2021. ↩↩
-
Han, Karsten. (2019, June 4). Strange Bits: Sodinokibi Spam, CinaRAT, and Fake G DATA. Retrieved August 4, 2020. ↩
-
Mamedov, O, et al. (2019, July 3). Sodin ransomware exploits Windows vulnerability and processor architecture. Retrieved August 4, 2020. ↩
-
Cylance. (2019, July 3). hreat Spotlight: Sodinokibi Ransomware. Retrieved August 4, 2020. ↩
-
McAfee. (2019, October 2). McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us. Retrieved August 4, 2020. ↩
-
Intel 471 Malware Intelligence team. (2020, March 31). REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation. Retrieved August 4, 2020. ↩
-
Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020. ↩
-
CISA. (2020, July 16). MAR-10296782-3.v1 – WELLMAIL. Retrieved September 29, 2020. ↩
-
Salem, E. (2020, November 17). CHAES: Novel Malware Targeting Latin American E-Commerce. Retrieved June 30, 2021. ↩
-
Carbon Black Threat Analysis Unit. (2019, February 12). New macOS Malware Variant of Shlayer (OSX) Discovered. Retrieved August 8, 2019. ↩
-
Phil Stokes. (2020, September 8). Coming Out of Your Shell: From Shlayer to ZShlayer. Retrieved September 13, 2021. ↩
-
Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021. ↩
-
Beek, C. (2020, November 5). Operation North Star: Behind The Scenes. Retrieved December 20, 2021. ↩
-
Wardle, Patrick. (2018, December 20). Middle East Cyber-Espionage analyzing WindShift’s implant: OSX.WindTail (part 1). Retrieved October 3, 2019. ↩
-
Harbison, M. (2021, February 9). BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech. Retrieved February 16, 2021. ↩
-
MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021. ↩↩↩↩
-
NHS Digital. (2020, November 26). Egregor Ransomware The RaaS successor to Maze. Retrieved December 29, 2020. ↩
-
Rochberger, L. (2020, November 26). Cybereason vs. Egregor Ransomware. Retrieved December 30, 2020. ↩
-
Prizmant, D. (2021, June 7). Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud Environments. Retrieved June 9, 2021. ↩
-
Symantec Security Response. (2015, June 23). Dyre: Emerging threat on financial fraud landscape. Retrieved August 23, 2018. ↩
-
hasherezade. (2015, November 4). A Technical Look At Dyreza. Retrieved June 15, 2020. ↩
-
Microsoft Threat Intelligence Center. (2022, February 4). ACTINIUM targets Ukrainian organizations. Retrieved February 18, 2022. ↩
-
Leong, R., Perez, D., Dean, T. (2019, October 31). MESSAGETAP: Who’s Reading Your Text Messages?. Retrieved May 11, 2020. ↩
-
Karmi, D. (2020, January 4). A Look Into Konni 2019 Campaign. Retrieved April 28, 2020. ↩
-
Threat Intelligence Team. (2021, August 23). New variant of Konni malware used in campaign targetting Russia. Retrieved January 5, 2022. ↩
-
Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022. ↩
-
Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021. ↩
-
Lee, B., Falcone, R. (2019, January 18). DarkHydrus delivers new Trojan that can use Google Drive for C2 communications. Retrieved April 17, 2019. ↩
-
Adam Burgher. (2021, June 10). BackdoorDiplomacy: Upgrading from Quarian to Turian. Retrieved September 1, 2021 ↩
-
ESET. (2020, April 28). Grandoreiro: How engorged can an EXE get?. Retrieved November 13, 2020. ↩
-
Check Point. (2020, November 26). Bandook: Signed & Delivered. Retrieved May 31, 2021. ↩
-
Smith, S., Stafford, M. (2021, December 14). DarkWatchman: A new evolution in fileless techniques. Retrieved January 10, 2022. ↩
-
Cybereason Nocturnus Team. (2020, December 9). MOLERATS IN THE CLOUD: New Malware Arsenal Abuses Cloud Platforms in Middle East Espionage Campaign. Retrieved December 22, 2020. ↩
-
Legezo, D. (2019, January 30). Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities. Retrieved April 17, 2019. ↩
-
FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021. ↩
-
Check Point Research. (2020, December 22). SUNBURST, TEARDROP and the NetSec New Normal. Retrieved January 6, 2021. ↩
-
Antenucci, S., Pantazopoulos, N., Sandee, M. (2020, June 23). WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group. Retrieved September 14, 2021. ↩
-
Cyberint. (2021, May 25). Qakbot Banking Trojan. Retrieved September 27, 2021. ↩
-
Morrow, D. (2021, April 15). The rise of QakBot. Retrieved September 27, 2021. ↩
-
Kuzmenko, A. et al. (2021, September 2). QakBot technical analysis. Retrieved September 27, 2021. ↩
-
Su, V. et al. (2019, December 11). Waterbear Returns, Uses API Hooking to Evade Security. Retrieved February 22, 2021. ↩
-
Villadsen, O.. (2019, August 29). More_eggs, Anyone? Threat Actor ITG08 Strikes Again. Retrieved September 16, 2019. ↩
-
Ray, V. and Hayashi, K. (2019, February 1). Tracking OceanLotus’ new Downloader, KerrDown. Retrieved October 1, 2021. ↩
-
Muhammad, I., Unterbrink, H.. (2021, January 6). A Deep Dive into Lokibot Infection Chain. Retrieved August 31, 2021. ↩
-
Chen, y., et al. (2019, January 31). Mac Malware Steals Cryptocurrency Exchanges’ Cookies. Retrieved July 22, 2020. ↩
-
Sherstobitoff, R., Malhotra, A., et. al.. (2018, December 18). Operation Sharpshooter Campaign Targets Global Defense, Critical Infrastructure. Retrieved May 14, 2020. ↩
-
Del Fierro, C. Kessem, L.. (2020, January 8). From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications. Retrieved February 15, 2021. ↩
-
Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017. ↩
-
Falcone, R., Lee, B. (2018, November 20). Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan. Retrieved November 26, 2018. ↩
-
ESET. (2018, November 20). Sednit: What’s going on with Zebrocy?. Retrieved February 12, 2019. ↩
-
Sogeti. (2021, March). Babuk Ransomware. Retrieved August 11, 2021. ↩
-
Sebdraven. (2021, February 8). Babuk is distributed packed. Retrieved August 11, 2021. ↩
-
Faou, M. (2019, May). Turla LightNeuron: One email away from remote code execution. Retrieved June 24, 2019. ↩
-
Falcone, R. and Lee, B. (2017, October 9). OilRig Group Steps Up Attacks with New Delivery Documents and New Injector Trojan. Retrieved January 8, 2018. ↩↩
-
Hsu, K. et al. (2020, June 24). Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices. Retrieved November 16, 2020. ↩
-
Yonathan Klijnsma. (2016, May 17). Mofang: A politically motivated information stealing adversary. Retrieved May 12, 2020. ↩
-
Huss, D. (2016, March 1). Operation Transparent Tribe. Retrieved June 8, 2016. ↩
-
Biasini, N. et al.. (2022, January 21). Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation. Retrieved March 14, 2022. ↩
-
S2W. (2022, January 18). Analysis of Destructive Malware (WhisperGate) targeting Ukraine. Retrieved March 14, 2022. ↩
-
Grunzweig, J.. (2017, April 20). Cardinal RAT Active for Over Two Years. Retrieved December 8, 2018. ↩
-
Raggi, M. Schwarz, D.. (2019, August 1). LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards. Retrieved February 25, 2021. ↩
-
Vachon, F. (2017, October 30). Windigo Still not Windigone: An Ebury Update . Retrieved February 10, 2021. ↩
-
Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019. ↩
-
GReAT. (2020, July 14). The Tetrade: Brazilian banking malware goes global. Retrieved November 9, 2020. ↩
-
Trend Micro. (2018, November 20). Lazarus Continues Heists, Mounts Attacks on Financial Organizations in Latin America. Retrieved December 3, 2018. ↩
-
US-CERT. (2017, December 13). Malware Analysis Report (MAR) - 10135536-B. Retrieved July 17, 2018. ↩
-
Vyacheslav Kopeytsev and Seongsu Park. (2021, February 25). Lazarus targets defense industry with ThreatNeedle. Retrieved October 27, 2021. ↩
-
NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020. ↩
-
PWC. (2020, July 16). How WellMess malware has been used to target COVID-19 vaccines. Retrieved September 24, 2020. ↩
-
PWC. (2020, August 17). WellMess malware: analysis of its Command and Control (C2) server. Retrieved September 29, 2020. ↩
-
CISA. (2020, July 16). MAR-10296782-2.v1 – WELLMESS. Retrieved September 24, 2020. ↩
-
Jazi, H. (2021, February). LazyScripter: From Empire to double RAT. Retrieved November 24, 2021. ↩
-
Salem, E. et al. (2020, May 28). VALAK: MORE THAN MEETS THE EYE . Retrieved June 19, 2020. ↩
-
Duncan, B. (2020, July 24). Evolution of Valak, from Its Beginnings to Mass Distribution. Retrieved August 31, 2020. ↩
-
Dumont, R., M.Léveillé, M., Porcher, H. (2018, December 1). THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors. Retrieved July 16, 2020. ↩
-
CISA, FBI, DOD. (2021, August). MAR-10292089-1.v2 – Chinese Remote Access Trojan: TAIDOOR. Retrieved August 24, 2021. ↩
-
BI.ZONE Cyber Threats Research Team. (2021, May 13). From pentest to APT attack: cybercriminal group FIN7 disguises its malware as an ethical hacker’s toolkit. Retrieved February 2, 2022. ↩
-
Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021. ↩↩
-
Smith, L., Leathery, J., Read, B. (2021, March 4). New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452. Retrieved March 12, 2021. ↩
-
Szappanos, G., Brandt, A.. (2020, May 27). Netwalker ransomware tools give insight into threat actor. Retrieved May 27, 2020. ↩
-
Mavis, N. (2020, September 21). The Art and Science of Detecting Cobalt Strike. Retrieved April 6, 2021. ↩
-
Strategic Cyber LLC. (2020, November 5). Cobalt Strike: Advanced Threat Tactics for Penetration Testers. Retrieved April 13, 2021. ↩
-
Schwarz, D. et al. (2019, October 16). TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader. Retrieved May 29, 2020. ↩
-
Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020. ↩
-
CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020. ↩
-
Lee, B., Falcone, R. (2018, February 23). OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan. Retrieved July 16, 2018. ↩↩
-
Dahan, A. (2017). Operation Cobalt Kitty. Retrieved December 27, 2018. ↩↩
-
Symantec Security Response Attack Investigation Team. (2018, April 23). New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia. Retrieved May 8, 2018. ↩
-
Proofpoint Staff. (2016, August 25). Nightmare on Tor Street: Ursnif variant Dreambot adds Tor functionality. Retrieved June 5, 2019. ↩
-
Patrick Wardle. (n.d.). Mac Malware of 2017. Retrieved September 21, 2018. ↩
-
US-CERT. (2017, November 01). Malware Analysis Report (MAR) - 10135536-D. Retrieved July 16, 2018. ↩
-
Mercer, W. Rascagneres, P. Ventura, V. (2020, October 6). PoetRAT: Malware targeting public and private sector in Azerbaijan evolves . Retrieved April 9, 2021. ↩
-
Tom Spring. (2017, January 11). Spammers Revive Hancitor Downloader Campaigns. Retrieved August 13, 2020. ↩
-
Anubhav, A., Jallepalli, D. (2016, September 23). Hancitor (AKA Chanitor) observed using multiple attack approaches. Retrieved August 13, 2020. ↩
-
Yan, T., et al. (2018, November 21). New Wine in Old Bottle: New Azorult Variant Found in FindMyName Campaign using Fallout Exploit Kit. Retrieved November 29, 2018. ↩
-
Proofpoint. (2018, July 30). New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign. Retrieved November 29, 2018. ↩
-
Yuste, J. Pastrana, S. (2021, February 9). Avaddon ransomware: an in-depth analysis and decryption of infected systems. Retrieved August 19, 2021. ↩
-
Malwarebytes Threat Intelligence Team. (2020, June 4). New LNK attack tied to Higaisa APT discovered. Retrieved March 2, 2021. ↩
-
Singh, S. Singh, A. (2020, June 11). The Return on the Higaisa APT. Retrieved March 2, 2021. ↩
-
S2 Grupo. (2019, April 2). WIRTE Group attacking the Middle East. Retrieved May 24, 2019. ↩
-
Sardiwal, M, et al. (2017, December 7). New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit. Retrieved December 20, 2017. ↩
-
Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020. ↩
-
Saini, A. and Hossein, J. (2022, January 27). North Korea’s Lazarus APT leverages Windows Update client, GitHub in latest campaign. Retrieved January 27, 2022. ↩
-
Pradhan, A. (2022, February 8). LolZarus: Lazarus Group Incorporating Lolbins into Campaigns. Retrieved March 22, 2022. ↩
-
Adamitis, D. et al. (2019, June 4). It’s alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign. Retrieved May 11, 2020. ↩
-
Lee, B, et al. (2018, February 28). Sofacy Attacks Multiple Government Entities. Retrieved March 15, 2018. ↩
-
Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018. ↩
-
Faou, M. and Dumont R.. (2019, May 29). A dive into Turla PowerShell usage. Retrieved June 14, 2019. ↩
-
Liebenberg, D.. (2018, August 30). Rocke: The Champion of Monero Miners. Retrieved May 26, 2020. ↩
-
Itkin, E. and Cohen, I. (2021, February 22). The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day. Retrieved March 24, 2021. ↩
-
Counter Threat Unit Research Team. (2017, October 12). BRONZE BUTLER Targets Japanese Enterprises. Retrieved January 4, 2018. ↩
-
Falcone, R., et al. (2018, August 02). The Gorgon Group: Slithering Between Nation State and Cybercrime. Retrieved August 7, 2018. ↩
-
An, J and Malhotra, A. (2021, November 10). North Korean attackers use malicious blogs to deliver malware to high-profile South Korean targets. Retrieved December 29, 2021. ↩
-
Kakara, H., Maruyama, E. (2020, April 17). Gamaredon APT Group Use Covid-19 Lure in Campaigns. Retrieved May 19, 2020. ↩
-
Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020. ↩
-
MSTIC. (2021, December 6). NICKEL targeting government organizations across Latin America and Europe. Retrieved March 18, 2022. ↩
-
Grunzweig, J., Lee, B. (2016, January 22). New Attacks Linked to C0d0so0 Group. Retrieved August 2, 2018. ↩
-
Singh, S. et al.. (2018, March 13). Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign. Retrieved April 11, 2018. ↩
-
Villanueva, M., Co, M. (2018, June 14). Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor. Retrieved July 3, 2018. ↩
-
Kaspersky Lab’s Global Research & Analysis Team. (2015, August 10). Darkhotel’s attacks in 2015. Retrieved November 2, 2018. ↩
-
Microsoft. (2016, July 14). Reverse engineering DUBNIUM – Stage 2 payload analysis . Retrieved March 31, 2021. ↩
-
Cherepanov, A.. (2016, December 13). The rise of TeleBots: Analyzing disruptive KillDisk attacks. Retrieved June 10, 2020. ↩
-
Cherepanov, A.. (2017, July 4). Analysis of TeleBots’ cunning backdoor . Retrieved June 11, 2020. ↩
-
Legezo, D. (2018, June 13). LuckyMouse hits national data center to organize country-level waterholing campaign. Retrieved August 18, 2018. ↩
-
GReAT. (2019, April 10). Gaza Cybergang Group1, operation SneakyPastes. Retrieved May 13, 2020. ↩
-
Axel F, Pierre T. (2017, October 16). Leviathan: Espionage actor spearphishes maritime and defense targets. Retrieved February 15, 2018. ↩
-
FBI. (2020, September 17). Indicators of Compromise Associated with Rana Intelligence Computing, also known as Advanced Persistent Threat 39, Chafer, Cadelspy, Remexi, and ITG07. Retrieved December 10, 2020. ↩
-
Sherstobitoff, R. (2018, March 02). McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups. Retrieved May 16, 2018. ↩
-
Accenture Security. (2018, April 23). Hogfish Redleaves Campaign. Retrieved July 2, 2018. ↩
-
Matsuda, A., Muhammad I. (2018, September 13). APT10 Targeting Japanese Corporations Using Updated TTPs. Retrieved September 17, 2018. ↩
-
Ray, V. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved November 9, 2018. ↩
-
Chen, J.. (2020, May 12). Tropic Trooper’s Back: USBferry Attack Targets Air gapped Environments. Retrieved May 20, 2020. ↩