🇮🇳

VICEROY TIGER

APT Group Information theft and espionage 5 zero-day CVEs ETDA ✓

Also Known As 5 names

APT-C-35 Donot Team OPERATION HANGOVER Orange Kala SectorE02

Target Countries 24

Countries highlighted in red

Austria Bangladesh Bhutan Canada China Germany France Indonesia India Islamic Republic of Iran Jordan Kuwait Sri Lanka Myanmar Norway Oman Panama Pakistan Poland Romania Singapore Thailand Province of China Taiwan United States

Details

Origin 🇮🇳 IN
Last Updated 01 Jun 2022

Malware Families 8

dilljuice
Nexe Backdoor
win.shatteredglass
unidentified_102
knspy
GlassWorm
glasses
ASYNCRAT

MITRE ATT&CK 118

T1005 - Data from Local System T1021 T1021.001 T1025 - Data from Removable Media T1027 - Obfuscated Files or Information T1027.001 T1027.002 T1027.005 T1027.010 T1030 - Data Transfer Size Limits T1033 T1036 - Masquerading T1036.005 - Match Legitimate Name or Location T1041 - Exfiltration Over C2 Channel T1047 T1048 - Exfiltration Over Alternative Protocol T1048.003 T1053 - Scheduled Task/Job T1053.005 - Scheduled Task T1055 - Process Injection T1055.012 T1056 - Input Capture T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 - PowerShell T1059.003 T1059.005 T1070 - Indicator Removal on Host T1070.004 T1070.006 - Timestomp T1071 - Application Layer Protocol T1071.001 - Web Protocols T1074 - Data Staged T1074.001 T1082 - System Information Discovery T1083 - File and Directory Discovery T1102 T1102.001 T1102.002 - Bidirectional Communication T1105 - Ingress Tool Transfer T1106 - Native API T1110 - Brute Force T1112 T1113 - Screen Capture T1119 T1123 T1124 - System Time Discovery T1132 - Data Encoding T1132.001 - Standard Encoding T1137.001 T1140 - Deobfuscate/Decode Files or Information T1176 T1189 T1190 - Exploit Public-Facing Application T1193 T1195 T1197 T1203 - Exploitation for Client Execution T1204 - User Execution T1204.001 T1204.002 - Malicious File T1210 T1213 - Data from Information Repositories T1218 T1218.001 T1221 T1398 T1406 T1417 T1418 T1420 T1422 T1426 T1429 T1430 T1434 T1437 T1480 T1481 T1497 - Virtualization/Sandbox Evasion T1497.001 - System Checks T1512 T1517 T1518 T1518.001 T1533 T1534 - Internal Spearphishing T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1548 T1548.002 T1553 T1553.002 T1555 T1555.003 - Credentials from Web Browsers T1559 T1559.002 T1560 T1562.001 - Disable or Modify Tools T1566 - Phishing T1566.001 - Spearphishing Attachment T1566.002 T1568.002 - Domain Generation Algorithms T1571 - Non-Standard Port T1573.001 - Symmetric Cryptography T1574 T1574.001 T1574.002 - DLL Side-Loading T1583.001 - Domains T1587 T1587.002 T1588 - Obtain Capabilities T1588.002 T1588.005 T1598 T1598.003 T1680 TA0011