mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 08:47:18 +00:00
[threat-actors] Add UNC2565
This commit is contained in:
parent
6da7b218fc
commit
e1eec18aa3
1 changed files with 15 additions and 0 deletions
|
@ -12700,6 +12700,21 @@
|
||||||
},
|
},
|
||||||
"uuid": "167bd5f9-fa61-4a4e-91bc-3ca0d17294b2",
|
"uuid": "167bd5f9-fa61-4a4e-91bc-3ca0d17294b2",
|
||||||
"value": "TheDarkOverlord"
|
"value": "TheDarkOverlord"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "UNC2565 is a threat group that has used the GOOTLOADER downloader to deliver Cobalt Strike BEACON. These intrusions have stemmed from victims accessing malicious websites that use SEO techniques to improve Google search rankings. After obtaining a foothold in the environment, UNC2565 has conducted reconnaissance and credential harvesting activity using common tools such as BLOODHOUND and KERBEROAST. UNC2565's motivations are currently unknown but overlaps with activity that has led to SODINOKIBI ransomware. This suggests that the threat group may be financially motivated.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.mandiant.com/resources/blog/tracking-evolution-gootloader-operations",
|
||||||
|
"https://socradar.io/new-gootloader-variant-gootbot-changes-the-game-in-malware-tactics/",
|
||||||
|
"https://securityintelligence.com/x-force/gootbot-gootloaders-new-approach-to-post-exploitation/"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"Hive0127"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "d7d270d2-b91f-4978-a9e9-76fa7f0d8f06",
|
||||||
|
"value": "UNC2565"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 293
|
"version": 293
|
||||||
|
|
Loading…
Reference in a new issue