TA2715

APT Group

Details

Origin unknown
Last Updated 05 May 2025

Malware Families 13

win.phantom_stealer
Revenge-RAT
dreambot
win.warp_stealer
snifula
icyheart
agent_tesla
ldr4
icedid_downloader
saigon
vawtrak
revenge_rat
gozi

MITRE ATT&CK 24

T1012 - Query Registry T1027 - Obfuscated Files or Information T1053 - Scheduled Task/Job T1056.001 - Keylogging T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 - PowerShell T1059.003 - Windows Command Shell T1082 - System Information Discovery T1083 - File and Directory Discovery T1087 - Account Discovery T1102.002 - Bidirectional Communication T1105 - Ingress Tool Transfer T1113 - Screen Capture T1114 - Email Collection T1125 - Video Capture T1204.002 - Malicious File T1497 - Virtualization/Sandbox Evasion T1552 - Unsecured Credentials T1555 - Credentials from Password Stores T1555.003 - Credentials from Web Browsers T1566.001 - Spearphishing Attachment T1566.002 - Spearphishing Link T1567.002 - Exfiltration to Cloud Storage

Related Zero-Days

No zero-day CVE linked to this actor