Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. Stealth Falcon

Stealth Falcon

Stealth Falcon is a threat group that has conducted targeted spyware attacks against Emirati journalists, activists, and dissidents since at least 2012. Circumstantial evidence suggests there could be a link between this group and the United Arab Emirates (UAE) government, but that has not been confirmed.[1]

ID: G0038
Version: 1.2
Created: 31 May 2017
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Stealth Falcon malware communicates with its C2 server via HTTPS.[1]

EnterpriseT1059Command and Scripting Interpreter

Stealth Falcon malware uses WMI to script data collection and command execution on the victim.[1]

.001PowerShell

Stealth Falcon malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.[1]

EnterpriseT1555Credentials from Password Stores

Stealth Falcon malware gathers passwords from multiple sources, including Windows Credential Vault and Outlook.[1]

.003Credentials from Web Browsers

Stealth Falcon malware gathers passwords from multiple sources, including Internet Explorer, Firefox, and Chrome.[1]

.004Windows Credential Manager

Stealth Falcon malware gathers passwords from the Windows Credential Vault.[1]

EnterpriseT1005Data from Local System

Stealth Falcon malware gathers data from the local victim system.[1]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

Stealth Falcon malware encrypts C2 traffic using RC4 with a hard-coded key.[1]

EnterpriseT1041Exfiltration Over C2 Channel

After data is collected byStealth Falcon malware, it is exfiltrated over the existing C2 channel.[1]

EnterpriseT1057Process Discovery

Stealth Falcon malware gathers a list of running processes.[1]

EnterpriseT1012Query Registry

Stealth Falcon malware attempts to determine the installed version of .NET by querying the Registry.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Stealth Falcon malware creates a scheduled task entitled "IE Web Cache" to execute a malicious file hourly.[1]

EnterpriseT1082System Information Discovery

Stealth Falcon malware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory.[1]

EnterpriseT1016System Network Configuration Discovery

Stealth Falcon malware gathers the Address Resolution Protocol (ARP) table from the victim.[1]

EnterpriseT1033System Owner/User Discovery

Stealth Falcon malware gathers the registered user and primary owner name via WMI.[1]

EnterpriseT1047Windows Management Instrumentation

Stealth Falcon malware gathers system information via Windows Management Instrumentation (WMI).[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp