Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. Blue Mockingbird

Blue Mockingbird

Blue Mockingbird is a cluster of observed activity involving Monero cryptocurrency-mining payloads in dynamic-link library (DLL) form on Windows systems. The earliest observed Blue Mockingbird tools were created in December 2019.[1]

ID: G0108
Contributors: Tony Lambert, Red Canary
Version: 1.3
Created: 26 May 2020
Last Modified: 10 July 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1134Access Token Manipulation

Blue Mockingbird has used JuicyPotato to abuse theSeImpersonate token privilege to escalate from web application pool accounts to NT Authority\SYSTEM.[1]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection.[1]

.003Command and Scripting Interpreter:Windows Command Shell

Blue Mockingbird has used batch script files to automate execution and deployment of payloads.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

Blue Mockingbird has made their XMRIG payloads persistent as a Windows Service.[1]

EnterpriseT1546.003Event Triggered Execution:Windows Management Instrumentation Event Subscription

Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.[1]

EnterpriseT1190Exploit Public-Facing Application

Blue Mockingbird has gained initial access by exploiting CVE-2019-18935, a vulnerability within Telerik UI for ASP.NET AJAX.[1]

EnterpriseT1574.012Hijack Execution Flow:COR_PROFILER

Blue Mockingbird has used wmic.exe and Windows Registry modifications to set the COR_PROFILER environment variable to execute a malicious DLL whenever a process loads the .NET CLR.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file.[1]

EnterpriseT1112Modify Registry

Blue Mockingbird has used Windows Registry modifications to specify a DLL payload.[1]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

Blue Mockingbird has obfuscated the wallet address in the payload binary.[1]

EnterpriseT1588.002Obtain Capabilities:Tool

Blue Mockingbird has obtained and used tools such asMimikatz.[1]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

Blue Mockingbird has used Mimikatz to retrieve credentials from LSASS memory.[1]

EnterpriseT1090Proxy

Blue Mockingbird has usedFRP, ssf, and Venom to establish SOCKS proxy connections.[1]

EnterpriseT1021.001Remote Services:Remote Desktop Protocol

Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.[1]

.002Remote Services:SMB/Windows Admin Shares

Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB.[1]

EnterpriseT1496.001Resource Hijacking:Compute Hijacking

Blue Mockingbird has used XMRIG to mine cryptocurrency on victim systems.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Blue Mockingbird has used Windows Scheduled Tasks to establish persistence on local and remote hosts.[1]

EnterpriseT1218.010System Binary Proxy Execution:Regsvr32

Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using regsvr32.exe.[1]

.011System Binary Proxy Execution:Rundll32

Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using rundll32.exe.[1]

EnterpriseT1082System Information Discovery

Blue Mockingbird has collected hardware details for the victim's system, including CPU and memory information.[1]

EnterpriseT1569.002System Services:Service Execution

Blue Mockingbird has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the "wercplsupport" service.[1]

EnterpriseT1047Windows Management Instrumentation

Blue Mockingbird has used wmic.exe to set environment variables.[1]

Software

IDNameReferencesTechniques
S1144FRP[1]Application Layer Protocol:Web Protocols,Command and Scripting Interpreter:JavaScript,Encrypted Channel:Asymmetric Cryptography,Encrypted Channel:Symmetric Cryptography,Network Service Discovery,Non-Application Layer Protocol,Protocol Tunneling,Proxy,Proxy:Multi-hop Proxy,System Network Connections Discovery
S0002Mimikatz[1]Access Token Manipulation:SID-History Injection,Account Manipulation,Boot or Logon Autostart Execution:Security Support Provider,Credentials from Password Stores,Credentials from Password Stores:Credentials from Web Browsers,Credentials from Password Stores:Windows Credential Manager,OS Credential Dumping:DCSync,OS Credential Dumping:Security Account Manager,OS Credential Dumping:LSASS Memory,OS Credential Dumping:LSA Secrets,Rogue Domain Controller,Steal or Forge Authentication Certificates,Steal or Forge Kerberos Tickets:Golden Ticket,Steal or Forge Kerberos Tickets:Silver Ticket,Unsecured Credentials:Private Keys,Use Alternate Authentication Material:Pass the Hash,Use Alternate Authentication Material:Pass the Ticket

References

×

[8]ページ先頭

©2009-2026 Movatter.jp