🇰🇵

APT45

APT Group ETDA ✓

Details

Origin 🇰🇵 KP
Last Updated 05 Jan 2026

MITRE ATT&CK 50

T1003 - OS Credential Dumping T1005 T1012 - Query Registry T1023 - Shortcut Modification T1027 - Obfuscated Files or Information T1027.003 T1036 - Masquerading T1040 - Network Sniffing T1045 - Software Packing T1047 - Windows Management Instrumentation T1049 T1055 - Process Injection T1056.001 - Keylogging T1057 - Process Discovery T1059.003 - Windows Command Shell T1060 - Registry Run Keys / Startup Folder T1071 - Application Layer Protocol T1082 - System Information Discovery T1083 - File and Directory Discovery T1089 - Disabling Security Tools T1105 T1106 - Native API T1112 - Modify Registry T1115 - Clipboard Data T1119 - Automated Collection T1129 - Shared Modules T1133 - External Remote Services T1140 - Deobfuscate/Decode Files or Information T1143 - Hidden Window T1189 - Drive-by Compromise T1199 - Trusted Relationship T1203 - Exploitation for Client Execution T1204 - User Execution T1204.002 T1210 - Exploitation of Remote Services T1428 - Exploit Enterprise Resources T1485 - Data Destruction T1497 - Virtualization/Sandbox Evasion T1547.001 - Registry Run Keys / Startup Folder T1564 - Hide Artifacts T1566 - Phishing T1566.001 T1573 - Encrypted Channel T1573.001 - Symmetric Cryptography T1588 T1588.001 T1590 T1590.005 T1592 T1592.002

Related Zero-Days

No zero-day CVE linked to this actor