Cobalt Group is a financially motivated threat group that has primarily targeted financial institutions since at least 2016. The group has conducted intrusions to steal money via targeting ATM systems, card processing, payment systems and SWIFT systems. Cobalt Group has mainly targeted banks in Eastern Europe, Central Asia, and Southeast Asia. One of the alleged leaders was arrested in Spain in early 2018, but the group still appears to be active. The group has been known to target organizations in order to use their access to then compromise additional victims.[1][2][3][4][5][6][7] Reporting indicates there may be links between Cobalt Group and both the malware Carbanak and the group Carbanak.[8]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1220 | XSL脚本处理 |
Cobalt Group used msxsl.exe to bypass AppLocker and to invoke Jscript code from an XSL file.[1] |
|
| Enterprise | T1195 | .002 | 供应链破坏: Compromise Software Supply Chain |
Cobalt Group has compromised legitimate web browser updates to deliver a backdoor. [12] |
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Cobalt Group has created new services to establish persistence.[4] |
| Enterprise | T1573 | .002 | 加密通道: Asymmetric Cryptography |
Cobalt Group has used the Plink utility to create SSH tunnels.[4] |
| Enterprise | T1572 | 协议隧道 |
Cobalt Group has used the Plink utility to create SSH tunnels.[1][3][4] |
|
| Enterprise | T1037 | .001 | 启动或登录初始化脚本: Logon Script (Windows) |
Cobalt Group has added persistence by registering the file name for the next stage malware under |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Cobalt Group has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike.[4] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Cobalt Group has used powershell.exe to download and execute scripts.[1][2][3][4][7][13] |
| .003 | 命令与脚本解释器: Windows Command Shell |
Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands.[11] The group has used an exploit toolkit known as Threadkit that launches .bat files.[1][2][4][11][14][13] |
||
| .005 | 命令与脚本解释器: Visual Basic |
Cobalt Group has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution.[1][2][4][11][14][13] |
||
| .007 | 命令与脚本解释器: JavaScript |
Cobalt Group has executed JavaScript scriptlets on the victim's machine.[1][2][4][11][14][13] |
||
| Enterprise | T1203 | 客户端执行漏洞利用 |
Cobalt Group had exploited multiple vulnerabilities for execution, including Microsoft’s Equation Editor (CVE-2017-11882), an Internet Explorer vulnerability (CVE-2018-8174), CVE-2017-8570, CVE-2017-0199, and CVE-2017-8759.[1][2][3][5][6][7][10][13] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Cobalt Group has used HTTPS for C2.[1][3][4] |
| .004 | 应用层协议: DNS |
Cobalt Group has used DNS tunneling for C2.[1][3][4] |
||
| Enterprise | T1068 | 权限提升漏洞利用 |
Cobalt Group has used exploits to increase their levels of rights and privileges.[4] |
|
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
Cobalt Group obfuscated several scriptlets and code used on the victim’s machine, including through use of XOR and RC4.[1][11] |
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control |
Cobalt Group has bypassed UAC.[4] |
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine.[1][14][9] |
| .002 | 用户执行: Malicious File |
Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine.[1][14] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Cobalt Group deleted the DLL dropper from the victim’s machine to cover their tracks.[1] |
| Enterprise | T1218 | .003 | 系统二进制代理执行: CMSTP |
Cobalt Group has used the command |
| .008 | 系统二进制代理执行: Odbcconf |
Cobalt Group has used |
||
| .010 | 系统二进制代理执行: Regsvr32 |
Cobalt Group has used regsvr32.exe to execute scripts.[1][11][13] |
||
| Enterprise | T1046 | 网络服务发现 |
Cobalt Group leveraged an open-source tool called SoftPerfect Network Scanner to perform network scanning.[2][3][4] |
|
| Enterprise | T1588 | .002 | 获取能力: Tool |
Cobalt Group has obtained and used a variety of tools including Mimikatz, PsExec, Cobalt Strike, and SDelete.[3] |
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine.[11] |
| Enterprise | T1105 | 输入工具传输 |
Cobalt Group has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers.[2][3] The group's JavaScript backdoor is also capable of downloading files.[11] |
|
| Enterprise | T1055 | 进程注入 |
Cobalt Group has injected code into trusted processes.[4] |
|
| Enterprise | T1559 | .002 | 进程间通信: Dynamic Data Exchange |
Cobalt Group has sent malicious Word OLE compound documents to victims.[1] |
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
Cobalt Group has used Remote Desktop Protocol to conduct lateral movement.[4] |
| Enterprise | T1219 | 远程访问软件 |
Cobalt Group used the Ammyy Admin tool as well as TeamViewer for remote access, including to preserve remote access if a Cobalt Strike module was lost.[2][3][4] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf, .doc, .xls, archives containing LNK files, and password protected archives containing .exe and .scr executables.[1][2][3][4][5][6][14][13] |
| .002 | 钓鱼: Spearphishing Link |
Cobalt Group has sent emails with URLs pointing to malicious documents.[1][9] |
||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Cobalt Group has created Windows tasks to establish persistence.[4] |