Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
APT39
ID: 7fa1a9ffe728cecf8ad2ca13632fee0722424
Cybercrime
State-Sponsored
Threat types: Surveillance, Intrusion, Espionage
Progress: 40%
Completeness: 36%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
| Chafer | ITG07 | Re********** | — |
Showing 2 of 3 aliases in free preview.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
APT39 is one of several names for cyber espionage activity conducted by the Iranian Ministry of Intelligence and Security (MOIS) through the front company Rana Intelligence Computing since at least 2014. APT39 has primarily targeted the travel, hospitality, academic, and telecommunications industries in Iran and across Asia, Africa, Europe, and North America to track individuals and entities considered to be a threat by the MOIS. Ref: https://attack.mitre.org/groups/G0087/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1003.001 | LSASS Memory | TA0006 |
|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1021.002 | SMB/Windows Admin Shares | TA0008 |
|
| T1021.004 | SSH | TA0008 |
|
| T1027.002 | Software Packing | TA0005 |
|
| T1027.013 | Encrypted/Encoded File | TA0005 |
|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1056.001 | Keylogging | TA0006 TA0009 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1059.006 | Python | TA0002 |
|
| T1059.010 | AutoHotKey & AutoIT | TA0002 |
|
| T1070.004 | File Deletion | TA0005 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1071.004 | DNS | TA0011 |
|
| T1074.001 | Local Data Staging | TA0009 |
|
| T1090.001 | Internal Proxy | TA0011 |
|
| T1090.002 | External Proxy | TA0011 |
|
| T1102.002 | Bidirectional Communication | TA0011 |
|
| T1136.001 | Local Account | TA0003 |
|
| T1204.001 | Malicious Link | TA0002 |
|
| T1204.002 | Malicious File | TA0002 |
|
| T1505.003 | Web Shell | TA0003 |
|
| T1546.010 | AppInit DLLs | TA0003 TA0004 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1547.009 | Shortcut Modification | TA0003 TA0004 |
|
| T1553.006 | Code Signing Policy Modification | TA0005 |
|
| T1560.001 | Archive via Utility | TA0009 |
|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1566.002 | Spearphishing Link | TA0001 |
|
| T1569.002 | Service Execution | TA0002 |
|
| T1588.002 | Tool | TA0042 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.