Home >
Enterprise >
Participants >
Elastic >
Masquerading (T1036)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
11.A.6
|
|
|||||
17.A.2
|
Tactic Defense Evasion (TA0005) Subtechnique Masquerading: Match Legitimate Name or Location (T1036.005) |
|
APT29 |
||||||
Step | ATT&CK Pattern |
|
||||
1.A.2
|
|
|||||
6.A.3
|
Tactic Defense Evasion (TA0005) Subtechnique Masquerading: Match Legitimate Name or Location (T1036.005) |
|
Procedure
Used unicode right-to-left override (RTLO) character to obfuscate file name rcs.3aka3.doc (originally cod.3aka.scr)
Criteria
Evidence of the right-to-left override character (U+202E) in the rcs.3aka.doc process OR the original filename (cod.3aka.scr)
Footnotes
- Configuration changes were made to add detection logic.


APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
16.I.1.2
|
|
|||||
19.A.1.1
|
Tactic Defense Evasion (TA0005) |
|
||||
19.B.1.3
|
Tactic Defense Evasion (TA0005) |
|
Procedure
Empire: File dropped to disk is a renamed copy of the WinRAR binary
Footnotes
- Telemetry later identified recycler.exe as WinRAR during execution, no detections identified it as WinRAR upon file copy.