|Execution|Rundll32<br>Execution through Module Load<br>User Execution|https://attack.mitre.org/techniques/T1085/<br>https://attack.mitre.org/techniques/T1129/<br>https://attack.mitre.org/techniques/T1204/|
<h6> This can be exported as JSON format <ahref="https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/China/APT/IceFog/6-11-19/JSON/Mitre_TTPs.json">Export in JSON</a></h6>
<h2>Yara Rules<aname="Yara"></a></h2>
<h6> A list of YARA Rule is available <ahref="https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/China/APT/IceFog/6-11-19/Yara_Rule_IceFog_Nov19.yar">here</a></h6>
* [C2 list and kill switch](https://twitter.com/vupt_bka/status/1192342494240899072)
* [Ancient ICEFOG APT malware spotted again in new wave of attacks](https://www.zdnet.com/article/ancient-icefog-apt-malware-spotted-again-in-new-wave-of-attacks/)