GeminiDuke is malware that was used by APT29 from 2009 to 2012. [1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .001 | Account Discovery: Local Account |
GeminiDuke collects information on local user accounts from the victim.[1] |
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
GeminiDuke uses HTTP and HTTPS for command and control.[1] |
Enterprise | T1083 | File and Directory Discovery |
GeminiDuke collects information from the victim, including installed drivers, programs previously executed by users, programs and services configured to automatically run at startup, files and folders present in any user's home folder, files and folders present in any user's My Documents, programs installed to the Program Files folder, and recently accessed files, folders, and programs.[1] |
|
Enterprise | T1057 | Process Discovery |
GeminiDuke collects information on running processes and environment variables from the victim.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery |
GeminiDuke collects information on network settings and Internet proxy settings from the victim.[1] |
|
Enterprise | T1007 | System Service Discovery |
GeminiDuke collects information on programs and services on the victim that are configured to automatically run at startup.[1] |