īrute Ratel C4 has used encrypted payload files and maintains an encrypted configuration structure in memory. īoxCaon used the "StackStrings" obfuscation technique to hide malicious functionalities. īOOSTWRITE has encoded its payloads using a ChaCha stream cipher with a 256-bit key and 64-bit Initialization vector (IV) to evade detection. īoomBox can encrypt data using AES prior to exfiltration. īlue Mockingbird has obfuscated the wallet address in the payload binary. īLINDINGCAN has obfuscated code using Base64 encoding. īlackOasis's first stage shellcode contains a NOP sled with alternative instructions that was likely designed to bypass antivirus tools. īITTER has used a RAR SFX dropper to deliver malware. īitPaymer has used RC4-encrypted strings and string hashes to avoid identifiable strings within the binary. īisonal's DLL file and non-malicious decoy file are encrypted with RC4 and some function name strings are obfuscated. īendyBear has encrypted payloads using RC4 and XOR. īazar has used XOR, RSA2, and RC4 encrypted files. īADHATCH can be compressed with the ApLib algorithm. īackdoorDiplomacy has obfuscated tools and malware it uses with VMProtect. Īvenger has the ability to XOR encrypt files to be sent to C2. Strings in Attor's components are encrypted with a XOR cipher, using a hardcoded key and the configuration data, log files and plugins are encrypted using a hybrid encryption scheme of Blowfish-OFB combined with RSA. Īstaroth has used an XOR-based algorithm to encrypt payloads twice with different keys. Īria-body has used an encrypted configuration file for its loader. ĪPT41 used VMProtected binaries in multiple intrusions. ĪPT39 has used malware to drop encrypted CAB files. ĪPT33 has used base64 to encode payloads. APT32 also encrypts the library used for network exfiltration with AES-256 in CBC mode in their macOS backdoor. ĪPT32 has performed code obfuscation, including encoding payloads using Base64 and using a framework called "Dont-Kill-My-Cat (DKMC). ĪPT3 obfuscates files or information to help evade defensive measures. APT28 has also obfuscated payloads with base64, XOR, and RC4. dll payload using RTL and a custom encryption algorithm. ĪPT-C-36 has used ConfuserEx to obfuscate its variant of Imminent Monitor, compressed payload and RAT packages, and password protected encrypted email attachments to avoid detection. ĪppleSeed has the ability to Base64 encode its payload and custom encrypt API calls. AppleJeus has also used the open source ADVObfuscation library for its components. ĪppleJeus has XOR-encrypted collected system information prior to sending to a C2. Īnchor has obfuscated code with stack strings and string encryption. Īmadey has obfuscated strings such as antivirus vendor names, domains, files, and others. Agent Tesla has used the Rijndael symmetric encryption algorithm to encrypt strings. Īgent Tesla has had its code obfuscated in an apparent attempt to make analysis difficult. API function names are also reversed, presumably to avoid detection in memory. Most of the strings in ADVSTORESHELL are encrypted with an XOR-based algorithm some strings are also encrypted with 3DES and reversed. Īction RAT's commands, strings, and domains can be Base64 encoded within the payload. ĭuring the 2016 Ukraine Electric Power Attack, Sandworm Team used heavily obfuscated code with Industroyer in its Windows Notepad backdoor. Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms. Īdversaries may also abuse Command Obfuscation to obscure commands executed from payloads or directly via Command and Scripting Interpreter. Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled. Portions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery. Adversaries may also use compressed or archived scripts, such as JavaScript. The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. Sometimes a user's action may be required to open and Deobfuscate/Decode Files or Information for User Execution. These payloads may be used during Initial Access or later to mitigate detection. Payloads may be compressed, archived, or encrypted in order to avoid detection. This is common behavior that can be used across different platforms and the network to evade defenses. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |