From 8326d5c9be4ac69ce3806c1e063af45ea31fc2be Mon Sep 17 00:00:00 2001 From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com> Date: Mon, 11 Nov 2019 00:37:37 +0100 Subject: [PATCH] Update analysis.md --- North Korea/APT/Lazarus/23-10-19/analysis.md | 15 +++++++++++---- 1 file changed, 11 insertions(+), 4 deletions(-) diff --git a/North Korea/APT/Lazarus/23-10-19/analysis.md b/North Korea/APT/Lazarus/23-10-19/analysis.md index 2e496a4..6fe9b03 100644 --- a/North Korea/APT/Lazarus/23-10-19/analysis.md +++ b/North Korea/APT/Lazarus/23-10-19/analysis.md @@ -901,6 +901,7 @@ function PulsetoC2($rid)

References MITRE ATT&CK Matrix

List of all the references with MITRE ATT&CK Matrix

CES 2020

+ |Enterprise tactics|Technics used|Ref URL| | :---------------: |:-------------| :------------- | |Persistence|T1179 - Hooking|https://attack.mitre.org/wiki/Technique/T1179| @@ -909,14 +910,18 @@ function PulsetoC2($rid) |Credential Access|T1179 - Hooking|https://attack.mitre.org/wiki/Technique/T1179| |Discovery|T1010 - Application Window Discovery
T1082 - System Information Discovery
T1124 - System Time Discovery|https://attack.mitre.org/wiki/Technique/T1010
https://attack.mitre.org/wiki/Technique/T1082
https://attack.mitre.org/wiki/Technique/T1124| |Collection|T1115 - Clipboard Data|https://attack.mitre.org/wiki/Technique/T1115| +

HAL

+ |Enterprise tactics|Technics used|Ref URL| | :---------------: |:-------------| :------------- | -|Execution|Rundll32|https://attack.mitre.org/techniques/T1085/| -|Persistence|Registry Run Keys / Startup Folder|https://attack.mitre.org/techniques/T1060/| -|Defense Evasion|Rundll32|https://attack.mitre.org/techniques/T1085/| -|Discovery|Query Registry|https://attack.mitre.org/techniques/T1012/| +|Execution|Rundll32|https://attack.mitre.org/techniques/T1085| +|Persistence|Registry Run Keys / Startup Folder|https://attack.mitre.org/techniques/T1060| +|Defense Evasion|Rundll32|https://attack.mitre.org/techniques/T1085| +|Discovery|Query Registry|https://attack.mitre.org/techniques/T1012| +

Powershell backdoor

+ |Enterprise tactics|Technics used|Ref URL| | :---------------: |:-------------| :------------- | |Execution|Scripting
PowerShell|https://attack.mitre.org/techniques/T1064/
https://attack.mitre.org/techniques/T1086/| @@ -927,6 +932,7 @@ function PulsetoC2($rid) |Exfiltration|Data Encrypted|https://attack.mitre.org/techniques/T1022/|

MacOS backdoor

+ |Enterprise tactics|Technics used|Ref URL| | :---------------: |:-------------| :------------- | |Execution|Scripting|https://attack.mitre.org/techniques/T1064/| @@ -937,6 +943,7 @@ function PulsetoC2($rid) |Exfiltration|Data Encrypted|https://attack.mitre.org/techniques/T1022/|

DTrack

+ |Enterprise tactics|Technics used|Ref URL| | :---------------: |:-------------| :------------- | |Execution|Command-Line Interface|https://attack.mitre.org/techniques/T1059/|