FIN6

APT Group Financial gain Financial crime ETDA ✓

Details

Last Updated 01 Jun 2022

Malware Families 4

grateful_pos
blackpos
FlawedAmmy
Ammyy Admin

MITRE ATT&CK 92

T1003 T1003.001 T1003.003 T1005 T1012 - Query Registry T1018 T1021 T1021.001 T1027 - Obfuscated Files or Information T1027.002 - Software Packing T1027.004 - Compile After Delivery T1027.010 T1030 - Data Transfer Size Limits T1033 - System Owner/User Discovery T1036 T1036.004 T1040 - Network Sniffing T1041 - Exfiltration Over C2 Channel T1046 T1047 T1048 T1048.003 T1053 - Scheduled Task/Job T1053.005 - Scheduled Task T1055 - Process Injection T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 - PowerShell T1059.003 - Windows Command Shell T1059.007 - JavaScript T1068 T1070 T1070.004 T1071 - Application Layer Protocol T1071.001 - Web Protocols T1074 T1074.002 T1078 - Valid Accounts T1078.001 - Default Accounts T1082 - System Information Discovery T1087 T1087.002 T1090 - Proxy T1095 T1102 T1104 - Multi-Stage Channels T1105 - Ingress Tool Transfer T1110 T1110.002 T1113 - Screen Capture T1119 T1124 - System Time Discovery T1132 - Data Encoding T1134 T1140 - Deobfuscate/Decode Files or Information T1190 - Exploit Public-Facing Application T1199 - Trusted Relationship T1204 - User Execution T1204.001 - Malicious Link T1204.002 - Malicious File T1213 T1213.006 T1218 T1220 T1490 T1496 - Resource Hijacking T1497 T1530 T1539 - Steal Web Session Cookie T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1553 T1553.002 T1555 - Credentials from Password Stores T1555.003 T1560 T1560.003 T1562 - Impair Defenses T1562.001 T1566 - Phishing T1566.001 - Spearphishing Attachment T1566.002 - Spearphishing Link T1566.003 T1569 T1569.002 T1571 - Non-Standard Port T1572 T1573 T1573.002 T1574 - Hijack Execution Flow T1588 T1588.002

Related Zero-Days

No zero-day CVE linked to this actor