DarkVishnya

DarkVishnya is a financially motivated threat actor targeting financial institutions in Eastern Europe. In 2017-2018 the group attacked at least 8 banks in this region.[1]

ID: G0105
Version: 1.1
Created: 15 May 2020
Last Modified: 12 October 2021

Techniques Used

Domain ID Name Use
Enterprise T1543 .003 创建或修改系统进程: Windows Service

DarkVishnya created new services for shellcode loaders distribution.[1]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

DarkVishnya used PowerShell to create shellcode loaders.[1]

Enterprise T1110 暴力破解

DarkVishnya used brute-force attack to obtain login data.[1]

Enterprise T1200 硬件附加

DarkVishnya used Bash Bunny, Raspberry Pi, netbooks or inexpensive laptops to connect to the company’s local network.[1]

Enterprise T1135 网络共享发现

DarkVishnya scanned the network for public shared folders.[1]

Enterprise T1040 网络嗅探

DarkVishnya used network sniffing to obtain login data. [1]

Enterprise T1046 网络服务发现

DarkVishnya performed port scanning to obtain the list of active services.[1]

Enterprise T1588 .002 获取能力: Tool

DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.[1]

Enterprise T1219 远程访问软件

DarkVishnya used DameWare Mini Remote Control for lateral movement.[1]

Enterprise T1571 非标准端口

DarkVishnya used ports 5190 and 7900 for shellcode listeners, and 4444, 4445, 31337 for shellcode C2.[1]

Software

References