Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack. [1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
Malware used by Group5 is capable of remotely deleting files from victims.[1] |
Enterprise | T1056 | .001 | Input Capture: Keylogging |
Malware used by Group5 is capable of capturing keystrokes.[1] |
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
Group5 disguised its malicious binaries with several layers of obfuscation, including encrypting the files.[1] |
Enterprise | T1113 | Screen Capture |
Malware used by Group5 is capable of watching the victim's screen.[1] |