| Name | Description |
|---|---|
| Poison Ivy | |
| Darkmoon |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1010 | Application Window Discovery | ||
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.[3] |
| .014 | Boot or Logon Autostart Execution: Active Setup |
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.[5][6][7] |
||
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.[3] |
| Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk.[3] |
| Enterprise | T1005 | Data from Local System |
PoisonIvy creates a backdoor through which remote attackers can steal system information.[3] |
|
| Enterprise | T1074 | .001 | Data Staged: Local Data Staging | |
| Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
PoisonIvy uses the Camellia cipher to encrypt communications.[1] |
| Enterprise | T1105 | Ingress Tool Transfer |
PoisonIvy creates a backdoor through which remote attackers can upload files.[3] |
|
| Enterprise | T1056 | .001 | Input Capture: Keylogging | |
| Enterprise | T1112 | Modify Registry |
PoisonIvy creates a Registry subkey that registers a new system device.[3] |
|
| Enterprise | T1027 | Obfuscated Files or Information |
PoisonIvy hides any strings related to its own indicators of compromise.[3] |
|
| Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection | |
| Enterprise | T1014 | Rootkit |
PoisonIvy starts a rootkit from a malicious file dropped to disk.[3] |
|
| ID | Name | References |
|---|---|---|
| G0017 | DragonOK | |
| G0018 | admin@338 | |
| G0045 | menuPass | |
| G0011 | PittyTiger | |
| G0002 | Moafee | |
| G0081 | Tropic Trooper | |
| G0066 | Elderwood | |
| G0021 | Molerats | |
| G0006 | APT1 | |
| G0093 | GALLIUM | |
| G0129 | Mustang Panda | |
| G0136 | IndigoZebra |