| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | .004 | 代理: Domain Fronting |
SMOKEDHAM has used a fronted domain to obfuscate its hard-coded C2 server domain.[2] |
| Enterprise | T1598 | .003 | 信息钓鱼: Spearphishing Link |
SMOKEDHAM has been delivered via malicious links in phishing emails.[1] |
| Enterprise | T1112 | 修改注册表 |
SMOKEDHAM has modified registry keys for persistence, to enable credential caching for credential access, and to facilitate lateral movement via RDP.[2] |
|
| Enterprise | T1136 | .001 | 创建账户: Local Account | |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder | |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
SMOKEDHAM can execute Powershell commands sent from its C2 server.[2] |
| Enterprise | T1113 | 屏幕捕获 |
SMOKEDHAM can capture screenshots of the victim’s desktop.[1][2] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
SMOKEDHAM has communicated with its C2 servers via HTTPS and HTTP POST requests.[2] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1027 | .009 | 混淆文件或信息: Embedded Payloads |
The SMOKEDHAM source code is embedded in the dropper as an encrypted string.[2] |
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
SMOKEDHAM has relied upon users clicking on a malicious link delivered through phishing.[1] |
| Enterprise | T1082 | 系统信息发现 |
SMOKEDHAM has used the |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
SMOKEDHAM has used |
|
| Enterprise | T1102 | 网络服务 |
SMOKEDHAM has used Google Drive and Dropbox to host files downloaded by victims via malicious links.[1] |
|
| Enterprise | T1087 | .001 | 账号发现: Local Account |
SMOKEDHAM has used |
| Enterprise | T1098 | .007 | 账号操控: Additional Local or Domain Groups | |
| Enterprise | T1105 | 输入工具传输 |
SMOKEDHAM has used Powershell to download UltraVNC and ngrok from third-party file sharing sites.[2] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1041 | 通过C2信道渗出 | ||
| Enterprise | T1564 | .002 | 隐藏伪装: Hidden Users |
SMOKEDHAM has modified the Registry to hide created user accounts from the Windows logon screen. [2] |