Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. DarkVishnya

DarkVishnya

DarkVishnya is a financially motivated threat actor targeting financial institutions in Eastern Europe. In 2017-2018 the group attacked at least 8 banks in this region.[1]

ID: G0105
Version: 1.1
Created: 15 May 2020
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1110Brute Force

DarkVishnya used brute-force attack to obtain login data.[1]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

DarkVishnya used PowerShell to create shellcode loaders.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

DarkVishnya created new services for shellcode loaders distribution.[1]

EnterpriseT1200Hardware Additions

DarkVishnya physically connected Bash Bunny, Raspberry Pi, netbooks, and inexpensive laptops to the target organization's environment to access the company’s local network.[1]

EnterpriseT1046Network Service Discovery

DarkVishnya performed port scanning to obtain the list of active services.[1]

EnterpriseT1135Network Share Discovery

DarkVishnya scanned the network for public shared folders.[1]

EnterpriseT1040Network Sniffing

DarkVishnya used network sniffing to obtain login data.[1]

EnterpriseT1571Non-Standard Port

DarkVishnya used ports 5190 and 7900 for shellcode listeners, and 4444, 4445, 31337 for shellcode C2.[1]

EnterpriseT1588.002Obtain Capabilities:Tool

DarkVishnya has obtained and used tools such asImpacket,Winexe, andPsExec.[1]

EnterpriseT1219Remote Access Tools

DarkVishnya used DameWare Mini Remote Control for lateral movement.[1]

Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp