North korea dragon

broken image
broken image

Gather Victim Org Information: Identify Roles,

broken image

Application Layer Protocol: Web Protocols,Īrchive Collected Data: Archive via Utility,īoot or Logon Autostart Execution: Registry Run Keys / Startup Folder,Ĭommand and Scripting Interpreter: Visual Basic,Ĭommand and Scripting Interpreter: PowerShell,Ĭommand and Scripting Interpreter: Windows Command Shell,ĭevelop Capabilities: Code Signing Certificates,Įncrypted Channel: Symmetric Cryptography,Įstablish Accounts: Social Media Accounts,Įxfiltration Over Web Service: Exfiltration to Cloud Storage,

broken image