| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
IceApple can collect files, passwords, and other data from a compromised host.[1] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
IceApple .NET assemblies have used |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
The IceApple Result Retriever module can AES encrypt C2 responses.[1] |
| Enterprise | T1620 | 反射性代码加载 |
IceApple can use reflective code loading to load .NET assemblies into |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
IceApple can use a Base64-encoded AES key to decrypt tasking.[1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
IceApple can use HTTP GET to request and pull information from C2.[1] |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
IceApple can encrypt and compress files using Gzip prior to exfiltration.[1] |
| Enterprise | T1003 | .002 | 操作系统凭证转储: Security Account Manager |
IceApple's Credential Dumper module can dump encrypted password hashes from SAM registry keys, including |
| .004 | 操作系统凭证转储: LSA Secrets |
IceApple's Credential Dumper module can dump LSA secrets from registry keys, including: |
||
| Enterprise | T1083 | 文件和目录发现 |
The IceApple Directory Lister module can list information about files and directories including creation time, last write time, name, and size.[1] |
|
| Enterprise | T1505 | .004 | 服务器软件组件: IIS Components |
IceApple is an IIS post-exploitation framework, consisting of 18 modules that provide several functionalities.[1] |
| Enterprise | T1552 | .002 | 未加密凭证: Credentials in Registry |
IceApple can harvest credentials from local and remote host registries.[1] |
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
IceApple can use Base64 and "junk" JavaScript code to obfuscate information.[1] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
IceApple can delete files and directories from targeted systems.[1] |
| Enterprise | T1082 | 系统信息发现 |
The IceApple Server Variable Dumper module iterates over all server variables present for the current request and returns them to the adversary.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
The IceApple ifconfig module can iterate over all network interfaces on the host and retrieve the name, description, MAC address, DNS suffix, DNS servers, gateways, IPv4 addresses, and subnet masks.[1] |
|
| Enterprise | T1087 | .002 | 账号发现: Domain Account |
The IceApple Active Directory Querier module can perform authenticated requests against an Active Directory server.[1] |
| Enterprise | T1056 | .003 | 输入捕获: Web Portal Capture |
The IceApple OWA credential logger can monitor for OWA authentication requests and log the credentials.[1] |
| Enterprise | T1041 | 通过C2信道渗出 |
IceApple's Multi File Exfiltrator module can exfiltrate multiple files from a compromised host as an HTTP response over C2.[1] |
|