🇷🇺

RomCom

APT Group Financial gain Information theft and espionage 31 zero-day CVEs ETDA ✓

Also Known As 2 names

Storm-0978 UAT-5647

Target Countries 16

Countries highlighted in red

Azerbaijan Brazil Canada Cameroon Germany Spain France United Kingdom Japan Republic of Korea Philippines Poland Singapore Province of China Taiwan Ukraine United States

Details

Origin 🇷🇺 RU
Last Updated 12 Nov 2022

Malware Families 4

romcom_rat
win.slip_screen
win.rusty_claw
win.dynamichttp

MITRE ATT&CK 124

T1003 - OS Credential Dumping T1005 - Data from Local System T1012 - Query Registry T1016 - System Network Configuration Discovery T1021 T1021.001 - Remote Desktop Protocol T1021.002 - SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.002 - Software Packing T1033 - System Owner/User Discovery T1036 - Masquerading T1036.005 T1041 T1047 - Windows Management Instrumentation T1049 T1053 - Scheduled Task/Job T1053.005 - Scheduled Task T1055 - Process Injection T1056 - Input Capture T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 T1059.003 - Windows Command Shell T1059.007 - JavaScript T1068 - Exploitation for Privilege Escalation T1069 - Permission Groups Discovery T1070 - Indicator Removal on Host T1070.001 - Clear Windows Event Logs T1071 - Application Layer Protocol T1071.001 - Web Protocols T1072 T1074 - Data Staged T1078 - Valid Accounts T1078.003 T1082 - System Information Discovery T1083 - File and Directory Discovery T1090 T1095 T1098 T1102 - Web Service T1102.001 - Dead Drop Resolver T1102.002 - Bidirectional Communication T1105 - Ingress Tool Transfer T1106 - Native API T1110 T1112 - Modify Registry T1113 - Screen Capture T1132.001 - Standard Encoding T1133 T1135 - Network Share Discovery T1136.001 T1140 - Deobfuscate/Decode Files or Information T1176 T1187 T1189 - Drive-by Compromise T1190 - Exploit Public-Facing Application T1199 T1203 - Exploitation for Client Execution T1204 - User Execution T1204.002 - Malicious File T1210 - Exploitation of Remote Services T1217 T1218 T1218.001 T1218.011 - Rundll32 T1219 T1221 T1482 - Domain Trust Discovery T1486 - Data Encrypted for Impact T1489 T1490 - Inhibit System Recovery T1495 T1497 - Virtualization/Sandbox Evasion T1518 - Software Discovery T1531 T1543.003 - Windows Service T1546 T1546.015 T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1553 - Subvert Trust Controls T1555 T1558 T1559 T1559.002 T1560 - Archive Collected Data T1562 T1562.001 - Disable or Modify Tools T1563 T1564 T1564.001 T1564.004 - NTFS File Attributes T1566 - Phishing T1566.001 T1566.002 T1569 - System Services T1569.002 T1571 T1572 - Protocol Tunneling T1573 T1573.002 T1574 - Hijack Execution Flow T1574.001 - DLL Search Order Hijacking T1583 T1583.001 - Domains T1584 T1587.001 - Malware T1588 T1588.001 - Malware T1588.002 - Tool T1588.005 - Exploits T1588.006 - Vulnerabilities T1598 T1598.002 T1614 - System Location Discovery TA0001 TA0002 TA0003 TA0005 TA0009 TA0010 TA0011 TA0040 TA0043