Please enable JavaScript.
Coggle requires JavaScript to display documents.
Techniques used by Lazarus APT Group - Coggle Diagram
Techniques used by Lazarus APT Group
Execution
Exploitation for Client Execution (T1203)
Windows Management Instrumentation (T1047)
Command & Scripting
Interpreter (T1059)
Windows Command Shell
Visual Basic
PowerShell
User Execution (T1204)
Malicious File
Initial Access
Drive-by-Compromise (T1189)
Phishing (T1156)
Spearphishing Attachment
Spearphishing via Service
Privilege Escalation
Access Token
Manipulation (T1134)
Create Process with Token
Boot or Logon
Autostart Execution (T1547)
Registry Run Keys / Startup Folder
Security Support Provider
Shortcut Modification
Create or Modify
System Process (T1543)
Windows Service
Process Injection (T1055)
Dynamic Link Libraries Injection