ToddyCat
Associated Group Descriptions |
|
Name | Description |
---|---|
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .002 | Account Discovery: Domain Account |
ToddyCat has run `net user %USER% /dom` for account discovery.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
ToddyCat has leveraged xcopy, 7zip, and RAR to stage and compress collected documents prior to exfiltration.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
ToddyCat has used Powershell scripts to perform post exploit collection.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
.003 | Command and Scripting Interpreter: Windows Command Shell |
ToddyCat has used .bat scripts and `cmd` for execution on compromised hosts.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
||
Enterprise | T1074 | .002 | Data Staged: Remote Data Staging |
ToddyCat manually transferred collected files to an exfiltration host using xcopy.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1567 | .002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage |
ToddyCat has used a DropBox uploader to exfiltrate stolen files.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
ToddyCat has hidden malicious scripts using `powershell.exe -windowstyle hidden`. (Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall |
Prior to executing a backdoor ToddyCat has run `cmd /c start /b netsh advfirewall firewall add rule name="SGAccessInboundRule" dir=in protocol=udp action=allow localport=49683` to allow the targeted system to receive UDP packets on port 49683.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
ToddyCat has used the name `debug.exe` for malware components.(Citation: Kaspersky ToddyCat June 2022) |
Enterprise | T1069 | .002 | Permission Groups Discovery: Domain Groups |
ToddyCat has executed `net group "domain admins" /dom` for discovery on compromised machines.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1566 | .003 | Phishing: Spearphishing via Service |
ToddyCat has sent loaders configured to run Ninja as zip archives via Telegram.(Citation: Kaspersky ToddyCat June 2022) |
Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares |
ToddyCat has used locally mounted network shares for lateral movement through targated environments.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
ToddyCat has used scheduled tasks to execute discovery commands and scripts for collection.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
ToddyCat can determine is Kaspersky software is running on an endpoint by running `cmd /c wmic process where name="avp.exe"`.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Enterprise | T1078 | .002 | Valid Accounts: Domain Accounts |
ToddyCat has used compromised domain admin credentials to mount local network shares.(Citation: Kaspersky ToddyCat Check Logs October 2023) |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.