Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. admin@338

admin@338

admin@338 is a China-based cyber threat group. It has previously used newsworthy events as lures to deliver malware and has primarily targeted organizations involved in financial, economic, and trade policy, typically using publicly available RATs such asPoisonIvy, as well as some non-public backdoors.[1]

ID: G0018
Contributors: Tatsuya Daitoku, Cyber Defense Institute, Inc.
Version: 1.2
Created: 31 May 2017
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087.001Account Discovery:Local Account

admin@338 actors used the following commands following exploitation of a machine withLOWBALL malware to enumerate user accounts:net user >> %temp%\downloadnet user /domain >> %temp%\download[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Following exploitation withLOWBALL malware,admin@338 actors created a file containing a list of commands to be executed on the compromised computer.[1]

EnterpriseT1203Exploitation for Client Execution

admin@338 has exploited client software vulnerabilities for execution, such as Microsoft Word CVE-2012-0158.[1]

EnterpriseT1083File and Directory Discovery

admin@338 actors used the following commands after exploiting a machine withLOWBALL malware to obtain information about files and directories:dir c:\ >> %temp%\downloaddir "c:\Documents and Settings" >> %temp%\downloaddir "c:\Program Files\" >> %temp%\downloaddir d:\ >> %temp%\download[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

admin@338 actors used the following command to rename one of their tools to a benign file name:ren "%temp%\upload" audiodg.exe[1]

EnterpriseT1069.001Permission Groups Discovery:Local Groups

admin@338 actors used the following command following exploitation of a machine withLOWBALL malware to list local groups:net localgroup administrator >> %temp%\download[1]

EnterpriseT1566.001Phishing:Spearphishing Attachment

admin@338 has sent emails with malicious Microsoft Office documents attached.[1]

EnterpriseT1082System Information Discovery

admin@338 actors used the following commands after exploiting a machine withLOWBALL malware to obtain information about the OS:ver >> %temp%\downloadsysteminfo >> %temp%\download[1]

EnterpriseT1016System Network Configuration Discovery

admin@338 actors used the following command after exploiting a machine withLOWBALL malware to acquire information about local networks:ipconfig /all >> %temp%\download[1]

EnterpriseT1049System Network Connections Discovery

admin@338 actors used the following command following exploitation of a machine withLOWBALL malware to display network connections:netstat -ano >> %temp%\download[1]

EnterpriseT1007System Service Discovery

admin@338 actors used the following command following exploitation of a machine withLOWBALL malware to obtain information about services:net start >> %temp%\download[1]

EnterpriseT1204.002User Execution:Malicious File

admin@338 has attempted to get victims to launch malicious Microsoft Word attachments delivered via spearphishing emails.[1]

Software

IDNameReferencesTechniques
S0043BUBBLEWRAP[1]Application Layer Protocol:Web Protocols,Non-Application Layer Protocol,System Information Discovery
S0100ipconfig[1]System Network Configuration Discovery
S0042LOWBALL[1]Application Layer Protocol:Web Protocols,Ingress Tool Transfer,Web Service:Bidirectional Communication
S0039Net[1]Account Discovery:Domain Account,Account Discovery:Local Account,Account Manipulation:Additional Local or Domain Groups,Create Account:Local Account,Create Account:Domain Account,Indicator Removal:Network Share Connection Removal,Network Share Discovery,Password Policy Discovery,Permission Groups Discovery:Domain Groups,Permission Groups Discovery:Local Groups,Remote Services:SMB/Windows Admin Shares,Remote System Discovery,System Network Connections Discovery,System Service Discovery,System Services:Service Execution,System Time Discovery
S0104netstat[1]System Network Connections Discovery
S0012PoisonIvy[1]Application Window Discovery,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Boot or Logon Autostart Execution:Active Setup,Command and Scripting Interpreter:Windows Command Shell,Create or Modify System Process:Windows Service,Data from Local System,Data Staged:Local Data Staging,Encrypted Channel:Symmetric Cryptography,Execution Guardrails:Mutual Exclusion,Ingress Tool Transfer,Input Capture:Keylogging,Modify Registry,Obfuscated Files or Information,Process Injection:Dynamic-link Library Injection,Rootkit
S0096Systeminfo[1]System Information Discovery

References

×

[8]ページ先頭

©2009-2026 Movatter.jp