🇨🇳
Void Arachne
APT Group
Information theft and espionage
7 zero-day CVEs
ETDA ✓
Also Known As 1 names
Silver Fox
Target Countries 3
Countries highlighted in red
China
Japan
Province of China Taiwan
Sectors Targeted
No targeted sector recordedDetails
Origin
🇨🇳 CN
Last Updated
29 Jun 2024
Malware Families 8
rad
win.vx_rat
zgrat
dnsmessenger
win.silentgh0st
remotecontrolclient
devils_rat
Back Orifice
MITRE ATT&CK 96
T1003 - OS Credential Dumping
T1005 - Data from Local System
T1008 - Fallback Channels
T1012 - Query Registry
T1014 - Rootkit
T1016 - System Network Configuration Discovery
T1021 - Remote Services
T1027 - Obfuscated Files or Information
T1027.005 - Indicator Removal from Tools
T1033 - System Owner/User Discovery
T1036 - Masquerading
T1036.004 - Masquerade Task or Service
T1036.005 - Match Legitimate Name or Location
T1041 - Exfiltration Over C2 Channel
T1049 - System Network Connections Discovery
T1053 - Scheduled Task/Job
T1053.005 - Scheduled Task
T1055 - Process Injection
T1055.001 - Dynamic-link Library Injection
T1055.002 - Portable Executable Injection
T1056 - Input Capture
T1056.001 - Keylogging
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.001 - PowerShell
T1059.003 - Windows Command Shell
T1068 - Exploitation for Privilege Escalation
T1070 - Indicator Removal on Host
T1070.004 - File Deletion
T1071 - Application Layer Protocol
T1071.001 - Web Protocols
T1072 - Software Deployment Tools
T1078 - Valid Accounts
T1078.001 - Default Accounts
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1095 - Non-Application Layer Protocol
T1102 - Web Service
T1102.002 - Bidirectional Communication
T1104 - Multi-Stage Channels
T1105 - Ingress Tool Transfer
T1106 - Native API
T1110.003
T1112 - Modify Registry
T1113 - Screen Capture
T1115 - Clipboard Data
T1123 - Audio Capture
T1124 - System Time Discovery
T1125 - Video Capture
T1129 - Shared Modules
T1132 - Data Encoding
T1134 - Access Token Manipulation
T1140 - Deobfuscate/Decode Files or Information
T1176 - Browser Extensions
T1189 - Drive-by Compromise
T1192 - Spearphishing Link
T1195 - Supply Chain Compromise
T1204 - User Execution
T1204.001 - Malicious Link
T1204.002 - Malicious File
T1211 - Exploitation for Defense Evasion
T1218 - Signed Binary Proxy Execution
T1218.010 - Regsvr32
T1218.011 - Rundll32
T1219 - Remote Access Software
T1496 - Resource Hijacking
T1497 - Virtualization/Sandbox Evasion
T1498 - Network Denial of Service
T1518 - Software Discovery
T1528 - Steal Application Access Token
T1539 - Steal Web Session Cookie
T1542 - Pre-OS Boot
T1543 - Create or Modify System Process
T1543.003 - Windows Service
T1547 - Boot or Logon Autostart Execution
T1547.001 - Registry Run Keys / Startup Folder
T1553 - Subvert Trust Controls
T1553.006 - Code Signing Policy Modification
T1555 - Credentials from Password Stores
T1555.003 - Credentials from Web Browsers
T1560 - Archive Collected Data
T1562 - Impair Defenses
T1562.001 - Disable or Modify Tools
T1562.002 - Disable Windows Event Logging
T1566 - Phishing
T1566.001 - Spearphishing Attachment
T1566.002 - Spearphishing Link
T1573 - Encrypted Channel
T1574 - Hijack Execution Flow
T1574.001 - DLL Search Order Hijacking
T1574.002 - DLL Side-Loading
T1574.006 - Dynamic Linker Hijacking
T1583.001 - Domains
T1606.002 - SAML Tokens
T1608 - Stage Capabilities
T1608.005 - Link Target