Orangeworm is a group that has targeted organizations in the healthcare sector in the United States, Europe, and Asia since at least 2015, likely for the purpose of corporate espionage. [1]

ID: G0071
Contributors: Elger Vinicius S. Rodrigues, @elgervinicius, CYBINT Centre

Version: 1.0

Techniques Used

EnterpriseT1071Standard Application Layer ProtocolOrangeworm has used HTTP for C2.[2]
EnterpriseT1077Windows Admin SharesOrangeworm has copied its backdoor across open network shares, including ADMIN$, C$WINDOWS, D$WINDOWS, and E$WINDOWS.[1]


S0099Arp[1]System Network Configuration Discovery
S0106cmd[1]Command-Line Interface, File and Directory Discovery, File Deletion, Remote File Copy, System Information Discovery
S0100ipconfig[1]System Network Configuration Discovery
S0236Kwampirs[1]Account Discovery, Binary Padding, Deobfuscate/Decode Files or Information, Fallback Channels, File and Directory Discovery, Masquerading, Network Share Discovery, New Service, Obfuscated Files or Information, Password Policy Discovery, Permission Groups Discovery, Process Discovery, Remote File Copy, Remote System Discovery, Rundll32, System Information Discovery, System Network Configuration Discovery, System Network Connections Discovery, System Owner/User Discovery, System Service Discovery, Windows Admin Shares
S0039Net[1]Account Discovery, Create Account, Network Share Connection Removal, Network Share Discovery, Password Policy Discovery, Permission Groups Discovery, Remote System Discovery, Service Execution, System Network Connections Discovery, System Service Discovery, System Time Discovery, Windows Admin Shares
S0104netstat[1]System Network Connections Discovery
S0103route[1]System Network Configuration Discovery
S0096Systeminfo[1]System Information Discovery


  1. Symantec Security Response Attack Investigation Team. (2018, April 23). Orangeworm: Indicators of Compromise. Retrieved July 8, 2018.