| Name | Description |
|---|---|
| Anunak |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
Carbanak has copied legitimate service names to use for malicious services.[1] |
| .005 | 伪装: Match Legitimate Name or Location |
Carbanak has named malware "svchost.exe," which is the name of the Windows shared service host program.[1] |
||
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Carbanak malware installs itself as a service to provide persistence and SYSTEM privileges.[1] |
| Enterprise | T1562 | .004 | 妨碍防御: Disable or Modify System Firewall |
Carbanak may use netsh to add local firewall rule exceptions.[7] |
| Enterprise | T1078 | 有效账户 |
Carbanak actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars.[1] |
|
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
Carbanak installs VNC server software that executes through rundll32.[1] |
| Enterprise | T1102 | .002 | 网络服务: Bidirectional Communication |
Carbanak has used a VBScript named "ggldr" that uses Google Apps Script, Sheets, and Forms services for C2.[8] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
Carbanak has obtained and used open-source tools such as PsExec and Mimikatz.[1] |
| Enterprise | T1219 | 远程访问软件 |
Carbanak used legitimate programs such as AmmyyAdmin and Team Viewer for remote interactive C2 to target systems.[7] |
|