CyberThreatIntel/China/APT/IceFog/6-11-19/Analysis.md
2019-12-14 17:49:56 +01:00

3.1 KiB

APT Icefog target Hanoi ?

Table of Contents

Malware analysis

The initial vector

Threat Intelligence

Cyber kill chain

The process graph resume cyber kill chains used by the attacker :

Indicators Of Compromise (IOC)

List of all the Indicators Of Compromise (IOC)
Indicator Description
The IOC can be exported in JSON

References MITRE ATT&CK Matrix

Enterprise tactics Technics used Ref URL
Execution Rundll32
Execution through Module Load
User Execution
https://attack.mitre.org/techniques/T1085/
https://attack.mitre.org/techniques/T1129/
https://attack.mitre.org/techniques/T1204/
Persistence Office Application Startup https://attack.mitre.org/techniques/T1137/
Defense Evasion Rundll32 https://attack.mitre.org/techniques/T1085/
Discovery Query Registry https://attack.mitre.org/techniques/T1012/
This can be exported as JSON format Export in JSON

Yara Rules

A list of YARA Rule is available here

Knowledge Graph

The following diagram shows the relationships of the techniques used by the groups and their corresponding malware:

Links

Original tweet:
Links Anyrun:
Resources :