Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Helix Kitten
ID: 3378be4c9a378e93cbecf8212e7a0fce56728
Cybercrime
State-Sponsored
Threat types: Phishing, Malware, Data Theft
Progress: 38%
Completeness: 33%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
| APT34 | Oilrig | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
OilRig is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. The group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests. Ref: https://attack.mitre.org/groups/G0049/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1003.001 | LSASS Memory | TA0006 |
|
| T1003.004 | LSA Secrets | TA0006 |
|
| T1003.005 | Cached Domain Credentials | TA0006 |
|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1021.004 | SSH | TA0008 |
|
| T1027.005 | Indicator Removal from Tools | TA0005 |
|
| T1027.013 | Encrypted/Encoded File | TA0005 |
|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1048.003 | Exfiltration Over Unencrypted Non-C2 Protocol | TA0010 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1056.001 | Keylogging | TA0006 TA0009 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1059.003 | Windows Command Shell | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1069.001 | Local Groups | TA0007 |
|
| T1069.002 | Domain Groups | TA0007 |
|
| T1070.004 | File Deletion | TA0005 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1071.004 | DNS | TA0011 |
|
| T1074.001 | Local Data Staging | TA0009 |
|
| T1078.002 | Domain Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1087.001 | Local Account | TA0007 |
|
| T1087.002 | Domain Account | TA0007 |
|
| T1132.001 | Standard Encoding | TA0011 |
|
| T1137.004 | Outlook Home Page | TA0003 |
|
| T1204.001 | Malicious Link | TA0002 |
|
| T1204.002 | Malicious File | TA0002 |
|
| T1218.001 | Compiled HTML File | TA0005 |
|
| T1497.001 | System Checks | TA0005 TA0007 |
|
| T1505.003 | Web Shell | TA0003 |
|
| T1543.003 | Windows Service | TA0003 TA0004 |
|
| T1552.001 | Credentials In Files | TA0006 |
|
| T1553.002 | Code Signing | TA0005 |
|
| T1555.003 | Credentials from Web Browsers | TA0006 |
|
| T1555.004 | Windows Credential Manager | TA0006 |
|
| T1556.002 | Password Filter DLL | TA0003 TA0005 TA0006 |
|
| T1562.004 | Disable or Modify System Firewall | TA0005 |
|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1566.002 | Spearphishing Link | TA0001 |
|
| T1566.003 | Spearphishing via Service | TA0001 |
|
| T1573.002 | Asymmetric Cryptography | TA0011 |
|
| T1583.001 | Domains | TA0042 |
|
| T1584.004 | Server | TA0042 |
|
| T1585.003 | Cloud Accounts | TA0042 |
|
| T1586.002 | Email Accounts | TA0042 |
|
| T1587.001 | Malware | TA0042 |
|
| T1588.002 | Tool | TA0042 |
|
| T1588.003 | Code Signing Certificates | TA0042 |
|
| T1608.001 | Upload Malware | TA0042 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.