CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Domains - T1583.001 (40f5caa0-4cb7-4117-89fc-d421bb493df3) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol - T1048.002 (8e350c1d-ac79-4b5c-bd4e-7476d7e84ec5) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
System Time Discovery - T1124 (f3c544dc-673c-4ef3-accb-53229f1ae077) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Malicious File - T1204.002 (232b7f21-adf9-4b42-b936-b9d6f7df856e) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Data from Local System - T1005 (3c4a2599-71ee-4405-ba1e-0e28414b4bc5) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Social Media Accounts - T1585.001 (b1ccd744-3f78-4a0e-9bb2-2002057f7928) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Exfiltration Over C2 Channel - T1041 (92d7da27-2d91-488e-a00c-059dc162766d) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Drive-by Compromise - T1189 (d742a578-d70e-4d0e-96a6-02a9c30204e6) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Spearphishing Link - T1598.003 (2d3f5b3c-54ca-4f4d-bb1f-849346d31230) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Server - T1583.004 (60c4b628-4807-4b0b-bbf5-fdac8643c337) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Web Services - T1584.006 (ae797531-3219-49a4-bccf-324ad7a4c7b2) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Email Accounts - T1585.002 (65013dd2-bc61-43e3-afb5-a14c4fa7437a) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Virtual Private Server - T1583.003 (79da0971-3147-4af6-a4f5-e8cd447cd795) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Spearphishing via Service - T1566.003 (f6ad61ee-65f3-4bd0-a3f5-2f0accb36317) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Drive-by Target - T1608.004 (31fe0ba2-62fd-4fd9-9293-4043d84f7fe9) |
Attack Pattern |
1 |
CURIUM - G1012 (3ea7add5-5b8f-45d8-b1f1-905d2729d62a) |
Intrusion Set |
Spearphishing Attachment - T1566.001 (2e34237d-8574-43f6-aace-ae2915de8597) |
Attack Pattern |
1 |
Acquire Infrastructure - T1583 (0458aab9-ad42-4eac-9e22-706a95bafee2) |
Attack Pattern |
Domains - T1583.001 (40f5caa0-4cb7-4117-89fc-d421bb493df3) |
Attack Pattern |
2 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol - T1048.002 (8e350c1d-ac79-4b5c-bd4e-7476d7e84ec5) |
Attack Pattern |
Exfiltration Over Alternative Protocol - T1048 (a19e86f8-1c0a-4fea-8407-23b73d615776) |
Attack Pattern |
2 |
Malicious File - T1204.002 (232b7f21-adf9-4b42-b936-b9d6f7df856e) |
Attack Pattern |
User Execution - T1204 (8c32eb4d-805f-4fc5-bf60-c4d476c131b5) |
Attack Pattern |
2 |
Social Media Accounts - T1585.001 (b1ccd744-3f78-4a0e-9bb2-2002057f7928) |
Attack Pattern |
Establish Accounts - T1585 (cdfc5f0a-9bb9-4352-b896-553cfa2d8fd8) |
Attack Pattern |
2 |
Phishing for Information - T1598 (cca0ccb6-a068-4574-a722-b1556f86833a) |
Attack Pattern |
Spearphishing Link - T1598.003 (2d3f5b3c-54ca-4f4d-bb1f-849346d31230) |
Attack Pattern |
2 |
Acquire Infrastructure - T1583 (0458aab9-ad42-4eac-9e22-706a95bafee2) |
Attack Pattern |
Server - T1583.004 (60c4b628-4807-4b0b-bbf5-fdac8643c337) |
Attack Pattern |
2 |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) |
Attack Pattern |
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) |
Attack Pattern |
2 |
Compromise Infrastructure - T1584 (7e3beebd-8bfe-4e7b-a892-e44ab06a75f9) |
Attack Pattern |
Web Services - T1584.006 (ae797531-3219-49a4-bccf-324ad7a4c7b2) |
Attack Pattern |
2 |
Windows Management Instrumentation - T1047 (01a5a209-b94c-450b-b7f9-946497d91055) |
Attack Pattern |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
2 |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
Create or Modify System Process - T1543 (106c0cf6-bf73-4601-9aa8-0945c2715ec5) |
Attack Pattern |
2 |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) |
Attack Pattern |
2 |
Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) |
Attack Pattern |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
2 |
AppDomainManager - T1574.014 (356662f7-e315-4759-86c9-6214e2a50ff8) |
Attack Pattern |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
2 |
Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) |
Attack Pattern |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
2 |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
Hidden Window - T1564.003 (cbb66055-0325-4111-aca0-40547b6ad5b0) |
Attack Pattern |
2 |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
Native API - T1106 (391d824f-0ef1-47a0-b0ee-c59a75e27670) |
Attack Pattern |
2 |
IMAPLoader - S1152 (3058b264-fe6b-46be-8948-2d1fadaf8adf) |
Malware |
Mail Protocols - T1071.003 (54b4c251-1f0e-4eba-ba6b-dbc7a6f6f06b) |
Attack Pattern |
2 |
Email Accounts - T1585.002 (65013dd2-bc61-43e3-afb5-a14c4fa7437a) |
Attack Pattern |
Establish Accounts - T1585 (cdfc5f0a-9bb9-4352-b896-553cfa2d8fd8) |
Attack Pattern |
2 |
Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) |
Attack Pattern |
Server Software Component - T1505 (d456de47-a16f-4e46-8980-e67478a12dcb) |
Attack Pattern |
2 |
Acquire Infrastructure - T1583 (0458aab9-ad42-4eac-9e22-706a95bafee2) |
Attack Pattern |
Virtual Private Server - T1583.003 (79da0971-3147-4af6-a4f5-e8cd447cd795) |
Attack Pattern |
2 |
Phishing - T1566 (a62a8db3-f23a-4d8f-afd6-9dbc77e7813b) |
Attack Pattern |
Spearphishing via Service - T1566.003 (f6ad61ee-65f3-4bd0-a3f5-2f0accb36317) |
Attack Pattern |
2 |
Drive-by Target - T1608.004 (31fe0ba2-62fd-4fd9-9293-4043d84f7fe9) |
Attack Pattern |
Stage Capabilities - T1608 (84771bc3-f6a0-403e-b144-01af70e5fda0) |
Attack Pattern |
2 |
Phishing - T1566 (a62a8db3-f23a-4d8f-afd6-9dbc77e7813b) |
Attack Pattern |
Spearphishing Attachment - T1566.001 (2e34237d-8574-43f6-aace-ae2915de8597) |
Attack Pattern |
2 |
Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) |
Attack Pattern |
Scheduled Task/Job - T1053 (35dd844a-b219-4e2b-a6bb-efa9a75995a9) |
Attack Pattern |
3 |
AppDomainManager - T1574.014 (356662f7-e315-4759-86c9-6214e2a50ff8) |
Attack Pattern |
Hijack Execution Flow - T1574 (aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6) |
Attack Pattern |
3 |
Hide Artifacts - T1564 (22905430-4901-4c2a-84f6-98243cb173f8) |
Attack Pattern |
Hidden Window - T1564.003 (cbb66055-0325-4111-aca0-40547b6ad5b0) |
Attack Pattern |
3 |
Mail Protocols - T1071.003 (54b4c251-1f0e-4eba-ba6b-dbc7a6f6f06b) |
Attack Pattern |
Application Layer Protocol - T1071 (355be19c-ffc9-46d5-8d50-d6a036c675b6) |
Attack Pattern |
3 |