| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 | ||
| Enterprise | T1213 | .002 | 从信息存储库获取数据: Sharepoint |
Chimera has collected documents from the victim's SharePoint.[2] |
| Enterprise | T1039 | 从网络共享驱动器获取数据 |
Chimera has collected data of interest from network shares.[2] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Chimera has renamed malware to GoogleUpdate.exe and WinRAR to jucheck.exe, RecordedTV.ms, teredo.tmp, update.exe, and msadcs1.exe.[1] |
| Enterprise | T1550 | .002 | 使用备用认证材料: Pass the Hash |
Chimera has dumped password hashes for use in pass the hash authentication attacks.[2] |
| Enterprise | T1556 | .001 | 修改身份验证过程: Domain Controller Authentication |
Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential.[1] |
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
Chimera has used side loading to place malicious DLLs in memory.[2] |
| Enterprise | T1572 | 协议隧道 |
Chimera has encapsulated Cobalt Strike's C2 protocol in DNS and HTTPS.[2] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Chimera has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features.[1][2] |
| .003 | 命令与脚本解释器: Windows Command Shell |
Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts.[2] |
||
| Enterprise | T1482 | 域信任发现 |
Chimera has |
|
| Enterprise | T1133 | 外部远程服务 |
Chimera has used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services.[1][2] |
|
| Enterprise | T1111 | 多因素身份验证拦截 |
Chimera has registered alternate phone numbers for compromised users to intercept 2FA codes sent via SMS.[2] |
|
| Enterprise | T1201 | 密码策略发现 |
Chimera has used the NtdsAudit utility to collect information related to accounts and passwords.[2] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .004 | 应用层协议: DNS |
Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic.[2] |
||
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Chimera has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts.[1][2] |
| Enterprise | T1003 | .003 | 操作系统凭证转储: NTDS |
Chimera has gathered the SYSTEM registry and ntds.dit files from target systems.[1] Chimera specifically has used the NtdsAudit tool to dump the password hashes of domain users via |
| Enterprise | T1589 | .001 | 收集受害者身份信息: Credentials |
Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks.[2] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Chimera has staged stolen data locally on compromised hosts.[2] |
| .002 | 数据分段: Remote Data Staging |
Chimera has staged stolen data on designated servers in the target environment.[2] |
||
| Enterprise | T1083 | 文件和目录发现 |
Chimera has utilized multiple commands to identify data of interest in file and directory listings.[2] |
|
| Enterprise | T1110 | .003 | 暴力破解: Password Spraying |
Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts.[2] |
| .004 | 暴力破解: Credential Stuffing |
Chimera has used credential stuffing against victim's remote services to obtain valid accounts.[2] |
||
| Enterprise | T1078 | 有效账户 |
Chimera has used a valid account to maintain persistence via scheduled task.[1] |
|
| .002 | Domain Accounts |
Chimera has used compromised domain accounts to gain access to the target environment.[2] |
||
| Enterprise | T1106 | 本机API |
Chimera has used direct Windows system calls by leveraging Dumpert.[1] |
|
| Enterprise | T1069 | .001 | 权限组发现: Local Groups |
Chimera has used |
| Enterprise | T1012 | 查询注册表 |
Chimera has queried Registry keys using |
|
| Enterprise | T1570 | 横向工具传输 |
Chimera has copied tools between compromised hosts using SMB.[2] |
|
| Enterprise | T1217 | 浏览器信息发现 |
Chimera has used |
|
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation | |
| Enterprise | T1114 | .001 | 电子邮件收集: Local Email Collection |
Chimera has harvested data from victim's e-mail including through execution of |
| .002 | 电子邮件收集: Remote Email Collection |
Chimera has harvested data from remote mailboxes including through execution of |
||
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs | |
| .004 | 移除指标: File Deletion | |||
| .006 | 移除指标: Timestomp |
Chimera has used a Windows version of the Linux |
||
| Enterprise | T1082 | 系统信息发现 |
Chimera has used |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Chimera has used the |
|
| Enterprise | T1124 | 系统时间发现 |
Chimera has used |
|
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
Chimera has used PsExec to deploy beacons on compromised systems.[2] |
| Enterprise | T1007 | 系统服务发现 |
Chimera has used |
|
| Enterprise | T1049 | 系统网络连接发现 |
Chimera has used |
|
| Enterprise | T1016 | 系统网络配置发现 |
Chimera has used ipconfig, Ping, and |
|
| Enterprise | T1135 | 网络共享发现 |
Chimera has used |
|
| Enterprise | T1046 | 网络服务发现 |
Chimera has used the |
|
| Enterprise | T1119 | 自动化收集 |
Chimera has used custom DLLs for continuous retrieval of data from memory.[2] |
|
| Enterprise | T1588 | .002 | 获取能力: Tool |
Chimera has obtained and used tools such as BloodHound, Cobalt Strike, Mimikatz, and PsExec.[1][2] |
| Enterprise | T1087 | .001 | 账号发现: Local Account | |
| .002 | 账号发现: Domain Account |
Chimera has has used |
||
| Enterprise | T1105 | 输入工具传输 |
Chimera has remotely copied tools and malware onto targeted systems.[1] |
|
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol | |
| .002 | 远程服务: SMB/Windows Admin Shares |
Chimera has used Windows admin shares to move laterally.[1][2] |
||
| .006 | 远程服务: Windows Remote Management | |||
| Enterprise | T1018 | 远程系统发现 |
Chimera has utilized various scans and queries to find domain controllers and remote services in the target environment.[2] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Chimera has used Cobalt Strike C2 beacons for data exfiltration.[2] |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
Chimera has exfiltrated stolen data to OneDrive accounts.[2] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Chimera has used scheduled tasks to invoke Cobalt Strike including through batch script |