| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
| Enterprise | T1059 | .007 | Command and Scripting Interpreter: JavaScript |
AshTag can use JSON files to deliver payloads and configuration files.[1] |
| Enterprise | T1678 | Delay Execution | ||
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
The AshTag stager compoment can decode and decrypt Base64 and XOR-encrypted payloads.[1] |
|
| Enterprise | T1041 | Exfiltration Over C2 Channel |
AshTag has exfiltrated reconnaissance data on targeted systems to C2 servers.[1] |
|
| Enterprise | T1083 | File and Directory Discovery |
The AshTag AshenOrchestrator component can enumerate files on victim hosts.[1] |
|
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL |
AshTag has enabled execution via DLL sideloading using a legitimate executable paired with a malicious DLL named wtsapi32.[1] |
| Enterprise | T1105 | Ingress Tool Transfer |
The AshTag stager component can retrieve and execute the main payload.[1] |
|
| Enterprise | T1680 | Local Storage Discovery | ||
| Enterprise | T1036 | .005 | Masquerading: Match Legitimate Resource Name or Location |
AshTag has masqueraded as a legitimate VisualServer utility.[1] |
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
The AshTag AshenOrchestrator component payload as been Base64 encoded and embedded with HTML content from the C2 server.[1] |
| Enterprise | T1057 | Process Discovery |
The AshTag AshenOrchestrator component has process management functionality.[1] |
|
| Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task | |
| Enterprise | T1113 | Screen Capture |
The AshTag AshenOrchestrator component has the ability to take screenshots.[1] |
|
| Enterprise | T1082 | System Information Discovery |
The AshTag loader and AshenOrchestrator components can collect reconnaissance data from victim machines.[1] |
|
| Enterprise | T1614 | System Location Discovery | ||
| Enterprise | T1204 | .002 | User Execution: Malicious File |
AshTag has been executed through victims downloading and opening malicious RAR archive files.[1] |
| Enterprise | T1102 | Web Service |
AshTag can download malicious payloads from file sharing services.[1] |
|
| Enterprise | T1047 | Windows Management Instrumentation |
AshTag can use a .NET program to execute WMI queries and send unique victim IDs to C2.[1] |
|