threatintel
actor tracker
All actors

APT35

apt35 · primary source: MITRE · first observed 2013
IR · IranState-sponsoredModerate confidencelast cited Jan 10, 2022 · 4y ago

Iranian state-sponsored actor associated with the IRGC. Conducts long-term espionage and credential-phishing operations against journalists, dissidents, U.S. and Israeli government targets, and academic researchers working on Middle East policy. Known for elaborate social-engineering personas sustained over months.

Aliases

Charming KittenCrowdStrikeMint SandstormMicrosoftPHOSPHORUSMicrosoft

Motivations

espionage

Target sectors

governmentacademiajournalismdissidentsenergy

Target countries

USILGBSAAEDE

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • APT35
  • Iran
  • espionage
Infrastructure
Victim
  • government
  • academia
  • journalism
  • US
  • IL
  • +1 more

MITRE ATT&CK techniques

Timeline

2 events

Indicators of compromise

2 indicators
csv
TypeValueFirst seenSource
Name
MischiefTut
family · MischiefTut
PowerShell reconnaissance backdoor named by Microsoft in the January 2024 Mint Sandstorm advisory; deployed post-intrusion alongside MediaPl to write recon output to documentLoger.txt and pull additional tools onto victim hosts at Middle East research organizations.
Oct 31, 2023Microsoft
SHA-256
f2dec56acef275a0e987844e98afcc44bf8b83b4661e83f89c6a2a72c5811d5f
family · MediaPl
MediaPl custom backdoor (MediaPl.dll) masquerading as Windows Media Player, attributed by Microsoft in January 2024 to a Mint Sandstorm subgroup (APT35 / Charming Kitten / Phosphorus) targeting Middle East affairs researchers at universities in BE, FR, IL, UK and US. Communicates with C2 via AES-CBC encrypted, Base64-encoded channels.
Oct 31, 2023Microsoft

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). APT35 — actor profile. Retrieved from https://threatintel.local/actors/apt35

latest cited activity · 2022-01-11 · 2 cataloged indicators