| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
ZIRCONIUM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome.[4] |
| Enterprise | T1090 | .003 | 代理: Multi-hop Proxy |
ZIRCONIUM has utilized an ORB (operational relay box) network – consisting compromised devices such as small office and home office (SOHO) routers, IoT devices, and leased virtual private servers (VPS) – to proxy traffic.[5] |
| Enterprise | T1036 | 伪装 |
ZIRCONIUM has spoofed legitimate applications in phishing lures and changed file extensions to conceal installation of malware.[6][4] |
|
| .004 | Masquerade Task or Service |
ZIRCONIUM has created a run key named |
||
| Enterprise | T1598 | 信息钓鱼 |
ZIRCONIUM targeted presidential campaign staffers with credential phishing e-mails.[6] |
|
| .003 | Spearphishing Link |
ZIRCONIUM has used web beacons in e-mails to track hits to attacker-controlled URL's.[1] |
||
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
ZIRCONIUM has used the AES256 algorithm with a SHA1 derived key to decrypt exploit code.[2] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
ZIRCONIUM has created a Registry Run key named |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
ZIRCONIUM has used a tool to open a Windows Command Shell on a remote host.[4] |
| .006 | 命令与脚本解释器: Python |
ZIRCONIUM has used Python-based implants to interact with compromised hosts.[6][4] |
||
| Enterprise | T1584 | .008 | 基础设施妥协: Network Devices |
ZIRCONIUM has compromised network devices such as small office and home office (SOHO) routers and IoT devices for ORB (operational relay box) Proxy networks.[7][5] |
| Enterprise | T1068 | 权限提升漏洞利用 |
ZIRCONIUM has exploited CVE-2017-0005 for local privilege escalation.[2] |
|
| Enterprise | T1012 | 查询注册表 |
ZIRCONIUM has used a tool to query the Registry for proxy settings.[4] |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing | |
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware.[6][4] |
| Enterprise | T1218 | .007 | 系统二进制代理执行: Msiexec |
ZIRCONIUM has used the msiexec.exe command-line utility to download and execute malicious MSI files.[4] |
| Enterprise | T1082 | 系统信息发现 |
ZIRCONIUM has used a tool to capture the processor architecture of a compromised host in order to register it with C2.[4] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
ZIRCONIUM has used a tool to capture the username on a compromised host in order to register it with C2.[4] |
|
| Enterprise | T1124 | 系统时间发现 |
ZIRCONIUM has used a tool to capture the time on a compromised host in order to register it with C2.[4] |
|
| Enterprise | T1016 | 系统网络配置发现 |
ZIRCONIUM has used a tool to enumerate proxy settings in the target environment.[4] |
|
| Enterprise | T1102 | .002 | 网络服务: Bidirectional Communication |
ZIRCONIUM has used Dropbox for C2 allowing upload and download of files as well as execution of arbitrary commands.[6][4] |
| Enterprise | T1583 | .001 | 获取基础设施: Domains |
ZIRCONIUM has purchased domains for use in targeted campaigns.[1] |
| .006 | 获取基础设施: Web Services |
ZIRCONIUM has used GitHub to host malware linked in spearphishing e-mails.[6][4] |
||
| Enterprise | T1105 | 输入工具传输 |
ZIRCONIUM has used tools to download malicious files to compromised hosts.[4] |
|
| Enterprise | T1041 | 通过C2信道渗出 | ||
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage | |
| Enterprise | T1566 | .002 | 钓鱼: Spearphishing Link |
ZIRCONIUM has used malicious links in e-mails to deliver malware.[1][6][4] |