Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Blue Mockingbird
ID: 8c0aa8783c9b2d5250408b8edf3fb67958982
Cybercrime
Cybercriminal
Threat types: Cryptomining, Intrusion, Malware
Progress: 35%
Completeness: 28%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
No aliases registered.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Blue Mockingbird is a cluster of observed activity involving Monero cryptocurrency-mining payloads in dynamic-link library (DLL) form on Windows systems. The earliest observed Blue Mockingbird tools were created in December 2019. Ref: https://attack.mitre.org/groups/G0108/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1003.001 | LSASS Memory | TA0006 |
|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1021.002 | SMB/Windows Admin Shares | TA0008 |
|
| T1027.013 | Encrypted/Encoded File | TA0005 |
|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1059.003 | Windows Command Shell | TA0002 |
|
| T1218.010 | Regsvr32 | TA0005 |
|
| T1218.011 | Rundll32 | TA0005 |
|
| T1496.001 | Compute Hijacking | TA0040 |
|
| T1543.003 | Windows Service | TA0003 TA0004 |
|
| T1546.003 | Windows Management Instrumentation Event Subscription | TA0003 TA0004 |
|
| T1569.002 | Service Execution | TA0002 |
|
| T1574.012 | COR_PROFILER | TA0003 TA0004 TA0005 |
|
| T1588.002 | Tool | TA0042 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.