Skip to content

Latest commit

 

History

History
17 lines (13 loc) · 3.13 KB

G0084.md

File metadata and controls

17 lines (13 loc) · 3.13 KB

G0084:Gallmaker

Description

Gallmaker is a cyberespionage group that has targeted victims in the Middle East and has been active since at least December 2017. The group has mainly targeted victims in the defense, military, and government sectors.(Citation: Symantec Gallmaker Oct 2018)

TTPs

Platform Tactic Technique Description Data Sources
Linux, Windows, macOS exfiltration Data Compressed Gallmaker has used WinZip, likely to archive data prior to exfiltration. Binary file metadata, File monitoring, Process command-line parameters, Process monitoring
Windows, macOS, Linux initial-access Spearphishing Attachment Gallmaker sent emails with malicious Microsoft Office documents attached. File monitoring, Packet capture, Network intrusion detection system, Detonation chamber, Email gateway, Mail server
Linux, Windows, macOS execution User Execution Gallmaker sent victims a lure document with a warning that asked victims to “enable content” for execution. Anti-virus, Process command-line parameters, Process monitoring
Linux, macOS, Windows defense-evasion, execution Scripting Gallmaker used PowerShell scripts for execution. Process monitoring, File monitoring, Process command-line parameters
Windows execution PowerShell Gallmaker used PowerShell to download additional payloads. PowerShell logs, Loaded DLLs, DLL monitoring, Windows Registry, File monitoring, Process monitoring, Process command-line parameters
Windows execution Dynamic Data Exchange Gallmaker attempted to exploit Microsoft’s DDE protocol in order to gain access to victim machines and for execution. API monitoring, DLL monitoring, Process monitoring, Windows Registry, Windows event logs
Linux, macOS, Windows defense-evasion Obfuscated Files or Information Gallmaker obfuscated shellcode used during execution. Network protocol analysis, Process use of network, File monitoring, Malware reverse engineering, Binary file metadata, Process command-line parameters, Environment variable, Process monitoring, Windows event logs, Network intrusion detection system, Email gateway, SSL/TLS inspection