| Name | Description |
|---|---|
| Raspite |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | 从密码存储中获取凭证 |
Leafminer used several tools for retrieving login and password information, including LaZagne.[1] |
|
| .003 | Credentials from Web Browsers |
Leafminer used several tools for retrieving login and password information, including LaZagne.[1] |
||
| Enterprise | T1136 | .001 | 创建账户: Local Account |
Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine.[1] |
| Enterprise | T1059 | .007 | 命令与脚本解释器: JavaScript | |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz.[1] |
| .004 | 操作系统凭证转储: LSA Secrets |
Leafminer used several tools for retrieving login and password information, including LaZagne.[1] |
||
| .005 | 操作系统凭证转储: Cached Domain Credentials |
Leafminer used several tools for retrieving login and password information, including LaZagne.[1] |
||
| Enterprise | T1083 | 文件和目录发现 |
Leafminer used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files.[1] |
|
| Enterprise | T1110 | .003 | 暴力破解: Password Spraying |
Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying.[1] |
| Enterprise | T1552 | .001 | 未加密凭证: Credentials In Files |
Leafminer used several tools for retrieving login and password information, including LaZagne.[1] |
| Enterprise | T1189 | 浏览器攻击 | ||
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
Leafminer obfuscated scripts that were used on victim machines.[1] |
| Enterprise | T1114 | .002 | 电子邮件收集: Remote Email Collection |
Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords.[1] |
| Enterprise | T1046 | 网络服务发现 |
Leafminer scanned network services to search for vulnerabilities in the victim system.[1] |
|
| Enterprise | T1588 | .002 | 获取能力: Tool |
Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.[1] |
| Enterprise | T1055 | .013 | 进程注入: Process Doppelgänging |
Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems.[1] |
| Enterprise | T1018 | 远程系统发现 |
Leafminer used Microsoft’s Sysinternals tools to gather detailed information about remote systems.[1] |
|