PoisonIvy is a popular remote access tool (RAT) that has been used by many groups.[1][2][3]

ID: S0012
Associated Software: Breut, Poison Ivy, Darkmoon
Platforms: Windows
Contributors: Darren Spruell
Version: 2.1
Created: 31 May 2017
Last Modified: 30 September 2022

Associated Software Descriptions

Name Description


Poison Ivy

[1] [5]



Techniques Used

Domain ID Name Use
Enterprise T1010 Application Window Discovery

PoisonIvy captures window titles.[3]

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.[3]

.014 Boot or Logon Autostart Execution: Active Setup

PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.[6][7][8]

Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.[3]

Enterprise T1543 .003 Create or Modify System Process: Windows Service

PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk.[3]

Enterprise T1005 Data from Local System

PoisonIvy creates a backdoor through which remote attackers can steal system information.[3]

Enterprise T1074 .001 Data Staged: Local Data Staging

PoisonIvy stages collected data in a text file.[3]

Enterprise T1573 .001 Encrypted Channel: Symmetric Cryptography

PoisonIvy uses the Camellia cipher to encrypt communications.[1]

Enterprise T1105 Ingress Tool Transfer

PoisonIvy creates a backdoor through which remote attackers can upload files.[3]

Enterprise T1056 .001 Input Capture: Keylogging

PoisonIvy contains a keylogger.[1][3]

Enterprise T1112 Modify Registry

PoisonIvy creates a Registry subkey that registers a new system device.[3]

Enterprise T1027 Obfuscated Files or Information

PoisonIvy hides any strings related to its own indicators of compromise.[3]

Enterprise T1055 .001 Process Injection: Dynamic-link Library Injection

PoisonIvy can inject a malicious DLL into a process.[1][3]

Enterprise T1014 Rootkit

PoisonIvy starts a rootkit from a malicious file dropped to disk.[3]

Groups That Use This Software

ID Name References
G0066 Elderwood


G0136 IndigoZebra


G0011 PittyTiger


G0006 APT1


G0017 DragonOK


G0045 menuPass


G0002 Moafee


G0129 Mustang Panda


G0021 Molerats


G0018 admin@338


G0081 Tropic Trooper




G0001 Axiom



ID Name Description
C0016 Operation Dust Storm



  1. US District Court Southern District of New York. (2018, December 17). United States v. Zhu Hua Indictment. Retrieved December 17, 2020.
  2. Haq, T., Moran, N., Scott, M., & Vashisht, S. O. (2014, September 10). The Path to Mass-Producing Cyber Attacks [Blog]. Retrieved November 12, 2014.
  3. Meyers, A. (2018, June 15). Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA. Retrieved April 12, 2021.
  5. ClearSky. (2016, January 7). Operation DustySky. Retrieved January 8, 2016.
  6. ClearSky Cybersecurity. (2016, June 9). Operation DustySky - Part 2. Retrieved August 3, 2016.
  7. Villeneuve, N., Haq, H., Moran, N. (2013, August 23). OPERATION MOLERATS: MIDDLE EAST CYBER ATTACKS USING POISON IVY. Retrieved April 1, 2016.
  8. FireEye Threat Intelligence. (2015, December 1). China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets. Retrieved December 4, 2015.
  9. Ray, V. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved November 9, 2018.
  10. Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019.
  11. MSTIC. (2019, December 12). GALLIUM: Targeting global telecom. Retrieved January 13, 2021.
  12. Esler, J., Lee, M., and Williams, C. (2014, October 14). Threat Spotlight: Group 72. Retrieved January 14, 2016.
  13. Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.