🇧🇾

Operation Ghostwriter

APT Group Sabotage and destruction Information theft and espionage 1 zero-day CVE ETDA ✓

Details

Origin 🇧🇾 BY
Last Updated 11 May 2024

Malware Families 1

NJRAT

MITRE ATT&CK 50

T1012 - Query Registry T1027 - Obfuscated Files or Information T1033 - System Owner/User Discovery T1036 - Masquerading T1053.005 - Scheduled Task T1055 - Process Injection T1057 - Process Discovery T1059 T1059.003 - Windows Command Shell T1059.005 - Visual Basic T1059.007 - JavaScript T1071 T1071.001 - Web Protocols T1078 - Valid Accounts T1082 - System Information Discovery T1083 - File and Directory Discovery T1102.002 - Bidirectional Communication T1102.003 - One-Way Communication T1104 T1105 - Ingress Tool Transfer T1114 - Email Collection T1114.001 - Local Email Collection T1114.002 - Remote Email Collection T1132.001 - Standard Encoding T1137 T1140 - Deobfuscate/Decode Files or Information T1176 - Browser Extensions T1190 - Exploit Public-Facing Application T1195.001 T1203 T1204.002 - Malicious File T1205 - Traffic Signaling T1208 T1218 T1218.011 - Rundll32 T1486 T1518 - Software Discovery T1518.001 - Security Software Discovery T1539 - Steal Web Session Cookie T1547 T1547.001 - Registry Run Keys / Startup Folder T1566 - Phishing T1566.001 - Spearphishing Attachment T1573.001 - Symmetric Cryptography T1573.002 - Asymmetric Cryptography T1574 T1583.001 - Domains T1584.001 - Domains T1586 - Compromise Accounts T1588.001 - Malware

Related Zero-Days 1