APT39 is one of several names for cyber espionage activity conducted by the Iranian Ministry of Intelligence and Security (MOIS) through the front company Rana Intelligence Computing since at least 2014. APT39 has primarily targeted the travel, hospitality, academic, and telecommunications industries in Iran and across Asia, Africa, Europe, and North America to track individuals and entities considered to be a threat by the MOIS.[1][2][3][4][5]
| Name | Description |
|---|---|
| ITG07 | |
| Chafer |
Activities associated with APT39 largely align with a group publicly referred to as Chafer.[1][2][6][3][4][5] |
| Remix Kitten |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1197 | BITS任务 |
APT39 has used the BITS protocol to exfiltrate stolen data from a compromised host.[3] |
|
| Enterprise | T1546 | .010 | 事件触发执行: AppInit DLLs |
APT39 has used malware to set |
| Enterprise | T1555 | 从密码存储中获取凭证 |
APT39 has used the Smartftp Password Decryptor tool to decrypt FTP passwords.[8] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
APT39 has used various tools to steal files from the compromised host.[9][3] |
|
| Enterprise | T1090 | .001 | 代理: Internal Proxy |
APT39 used custom tools to create SOCK5 and custom protocol proxies between infected hosts.[1][8] |
| .002 | 代理: External Proxy | |||
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications, closely mimicking a legitimate McAfee file mfevtps.exe.[8][3] |
| Enterprise | T1136 | .001 | 创建账户: Local Account |
APT39 has created accounts on multiple compromised hosts to perform actions within the network.[8] |
| Enterprise | T1190 | 利用公开应用程序漏洞 | ||
| Enterprise | T1115 | 剪贴板数据 |
APT39 has used tools capable of stealing contents of the clipboard.[9] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
APT39 has maintained persistence using the startup folder.[1] |
| .009 | 启动或登录自动启动执行: Shortcut Modification | |||
| Enterprise | T1059 | 命令与脚本解释器 |
APT39 has utilized custom scripts to perform internal reconnaissance.[1][3] |
|
| .001 | PowerShell | |||
| .005 | Visual Basic | |||
| .006 | Python |
APT39 has used a command line utility and a network scanner written in python.[8][3] |
||
| .010 | AutoHotKey & AutoIT |
APT39 has utilized AutoIt malware scripts embedded in Microsoft Office documents or malicious links.[3] |
||
| Enterprise | T1113 | 屏幕捕获 |
APT39 has used a screen capture utility to take screenshots on a compromised host.[9][3] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .004 | 应用层协议: DNS |
APT39 has used remote access tools that leverage DNS in communications with C2.[8] |
||
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
APT39 has used WinRAR and 7-Zip to compress an archive stolen data.[1] |
| Enterprise | T1003 | 操作系统凭证转储 |
APT39 has used different versions of Mimikatz to obtain credentials.[8] |
|
| .001 | LSASS Memory |
APT39 has used Mimikatz, Windows Credential Editor and ProcDump to dump credentials.[1] |
||
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
APT39 has utilized tools to aggregate data prior to exfiltration.[3] |
| Enterprise | T1083 | 文件和目录发现 |
APT39 has used tools with the ability to search for files on a compromised host.[3] |
|
| Enterprise | T1110 | 暴力破解 | ||
| Enterprise | T1078 | 有效账户 |
APT39 has used stolen credentials to compromise Outlook Web Access (OWA).[1] |
|
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell | |
| Enterprise | T1012 | 查询注册表 |
APT39 has used various strains of malware to query the Registry.[3] |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing |
APT39 has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection.[1][8] |
| .013 | 混淆文件或信息: Encrypted/Encoded File | |||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link.[1][3] |
| .002 | 用户执行: Malicious File |
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment.[1][8][9][3] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
APT39 has used malware to delete files after they are deployed on a compromised host.[3] |
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
APT39 has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes.[8][9] |
| Enterprise | T1135 | 网络共享发现 |
APT39 has used the post exploitation tool CrackMapExec to enumerate network shares.[8] |
|
| Enterprise | T1102 | .002 | 网络服务: Bidirectional Communication |
APT39 has communicated with C2 through files uploaded to and downloaded from DropBox.[8] |
| Enterprise | T1046 | 网络服务发现 |
APT39 has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning.[1][8] |
|
| Enterprise | T1588 | .002 | 获取能力: Tool |
APT39 has modified and used customized versions of publicly-available tools like PLINK and Mimikatz.[8][10] |
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1056 | 输入捕获 | ||
| .001 | Keylogging | |||
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
APT39 has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.[1][8] |
| .002 | 远程服务: SMB/Windows Admin Shares | |||
| .004 | 远程服务: SSH |
APT39 used secure shell (SSH) to move laterally among their targets.[1] |
||
| Enterprise | T1018 | 远程系统发现 |
APT39 has used NBTscan and custom tools to discover remote systems.[1][8][9] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
APT39 has exfiltrated stolen victim data through C2 communications.[3] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.[1][9][3] |
| .002 | 钓鱼: Spearphishing Link |
APT39 leveraged spearphishing emails with malicious links to initially compromise victims.[1][3] |
||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task | |
| Enterprise | T1553 | .006 | 颠覆信任控制: Code Signing Policy Modification |
APT39 has used malware to turn off the |