Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
ANDROMEDA has the ability to make GET requests to download files from C2.[1] |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
ANDROMEDA can establish persistence by dropping a sample of itself to |
Enterprise | T1105 | Ingress Tool Transfer | ||
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
ANDROMEDA has been installed to |
.008 | Masquerading: Masquerade File Type |
ANDROMEDA has been delivered through a LNK file disguised as a folder.[1] |
||
Enterprise | T1055 | Process Injection |
ANDROMEDA can inject into the |
|
Enterprise | T1091 | Replication Through Removable Media |
ID | Name | Description |
---|---|---|
C0026 | C0026 |
During C0026, the threat actors re-registered expired ANDROMEDA domains to profile past victims for further targeting.[1] |