| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
Agrius gathered data from database and other critical servers in victim environments, then used wiping mechanisms as an anti-analysis and anti-forensics mechanism.[5] |
|
| Enterprise | T1036 | 伪装 |
Agrius used the Plink tool for tunneling and connections to remote machines, renaming it |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Agrius has deployed IPsec Helper malware post-exploitation and registered it as a service for persistence.[1] |
| Enterprise | T1190 | 利用公开应用程序漏洞 |
Agrius exploits public-facing applications for initial access to victim environments. Examples include widespread attempts to exploit CVE-2018-13379 in FortiOS devices and SQL injection activity.[1] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Agrius has deployed base64-encoded variants of ASPXSpy to evade detection.[1] |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Agrius uses ASPXSpy web shells to enable follow-on command execution via |
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
Agrius used several mechanisms to try to disable security tools. Agrius attempted to modify EDR-related services to disable auto-start on system reboot. Agrius used a publicly available driver, |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Agrius used 7zip to archive extracted data in preparation for exfiltration.[5] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Agrius used tools such as Mimikatz to dump LSASS memory to capture credentials in victim environments.[5] |
| .002 | 操作系统凭证转储: Security Account Manager |
Agrius dumped the SAM file on victim machines to capture credentials.[5] |
||
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Agrius has used the folder, |
| Enterprise | T1110 | 暴力破解 |
Agrius engaged in various brute forcing activities via SMB in victim environments.[5] |
|
| .003 | Password Spraying |
Agrius engaged in password spraying via SMB in victim environments.[5] |
||
| Enterprise | T1078 | .002 | 有效账户: Domain Accounts |
Agrius attempted to acquire valid credentials for victim environments through various means to enable follow-on lateral movement.[5] |
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
Agrius typically deploys a variant of the ASPXSpy web shell following initial access via exploitation.[1] |
| Enterprise | T1570 | 横向工具传输 |
Agrius downloaded some payloads for follow-on execution from legitimate filesharing services such as |
|
| Enterprise | T1046 | 网络服务发现 |
Agrius used the open-source port scanner |
|
| Enterprise | T1119 | 自动化收集 |
Agrius used a custom tool, |
|
| Enterprise | T1583 | 获取基础设施 |
Agrius typically uses commercial VPN services for anonymizing last-hop traffic to victim networks, such as ProtonVPN.[1] |
|
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
Agrius tunnels RDP traffic through deployed web shells to access victim environments via compromised accounts.[1] Agrius used the Plink tool to tunnel RDP connections for remote access and lateral movement in victim environments.[5] |
| Enterprise | T1018 | 远程系统发现 |
Agrius used the tool NBTscan to scan for remote, accessible hosts in victim environments.[5] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Agrius exfiltrated staged data using tools such as Putty and WinSCP, communicating with command and control servers.[5] |
|