SideCopy is a Pakistani threat group that has primarily targeted South Asian countries, including Indian and Afghani government personnel, since at least 2019. SideCopy's name comes from its infection chain that tries to mimic that of Sidewinder, a suspected Indian threat group.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
SideCopy has used a legitimate DLL file name, |
| Enterprise | T1598 | .002 | 信息钓鱼: Spearphishing Attachment |
SideCopy has crafted generic lures for spam campaigns to collect emails and credentials for targeting efforts.[1] |
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
SideCopy has used a malicious loader DLL file to execute the |
| Enterprise | T1059 | .005 | 命令与脚本解释器: Visual Basic |
SideCopy has sent Microsoft Office Publisher documents to victims that have embedded malicious macros that execute an hta file via calling |
| Enterprise | T1584 | .001 | 基础设施妥协: Domains |
SideCopy has compromised domains for some of their infrastructure, including for C2 and staging malware.[1] |
| Enterprise | T1608 | .001 | 暂存能力: Upload Malware |
SideCopy has used compromised domains to host its malicious payloads.[1] |
| Enterprise | T1106 | 本机API |
SideCopy has executed malware by calling the API function |
|
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
SideCopy has attempted to lure victims into clicking on malicious embedded archive files sent via spearphishing campaigns.[1] |
| Enterprise | T1218 | .005 | 系统二进制代理执行: Mshta |
SideCopy has utilized |
| Enterprise | T1614 | 系统位置发现 |
SideCopy has identified the country location of a compromised host.[1] |
|
| Enterprise | T1082 | 系统信息发现 |
SideCopy has identified the OS version of a compromised host.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
SideCopy has identified the IP address of a compromised host.[1] |
|
| Enterprise | T1518 | 软件发现 |
SideCopy has collected browser information from a compromised host.[1] |
|
| .001 | Security Software Discovery |
SideCopy uses a loader DLL file to collect AV product names from an infected host.[1] |
||
| Enterprise | T1105 | 输入工具传输 |
SideCopy has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads.[1] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
SideCopy has sent spearphishing emails with malicious hta file attachments.[1] |