Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Patchwork
ID: 81828b40f940bba2999adf65d1ece45084441
Cybercrime
State-Sponsored
Threat types: Intrusion, Espionage, Malware
Progress: 38%
Completeness: 33%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
| Dropping Elephant | Monsoon | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Patchwork is a cyber espionage group that was first observed in December 2015. While the group has not been definitively attributed, circumstantial evidence suggests the group may be a pro-Indian or Indian entity. Patchwork has been seen targeting industries related to diplomatic and government agencies. Much of the code used by this group was copied and pasted from online forums. Patchwork was also seen operating spearphishing campaigns targeting U.S. think tank groups in March and April of 2018. Ref: https://attack.mitre.org/groups/G0040/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1027.001 | Binary Padding | TA0005 |
|
| T1027.002 | Software Packing | TA0005 |
|
| T1027.005 | Indicator Removal from Tools | TA0005 |
|
| T1027.010 | Command Obfuscation | TA0005 |
|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1055.012 | Process Hollowing | TA0004 TA0005 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1059.003 | Windows Command Shell | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1070.004 | File Deletion | TA0005 |
|
| T1074.001 | Local Data Staging | TA0009 |
|
| T1102.001 | Dead Drop Resolver | TA0011 |
|
| T1132.001 | Standard Encoding | TA0011 |
|
| T1204.001 | Malicious Link | TA0002 |
|
| T1204.002 | Malicious File | TA0002 |
|
| T1518.001 | Security Software Discovery | TA0007 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1548.002 | Bypass User Account Control | TA0004 TA0005 |
|
| T1553.002 | Code Signing | TA0005 |
|
| T1555.003 | Credentials from Web Browsers | TA0006 |
|
| T1559.002 | Dynamic Data Exchange | TA0002 |
|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1566.002 | Spearphishing Link | TA0001 |
|
| T1574.001 | DLL | TA0003 TA0004 TA0005 |
|
| T1587.002 | Code Signing Certificates | TA0042 |
|
| T1588.002 | Tool | TA0042 |
|
| T1598.003 | Spearphishing Link | TA0043 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.