ToddyCat
                                        Associated Group Descriptions | 
                                |
| Name | Description | 
|---|---|
                                        Techniques Used | 
                                ||||
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1087 | .002 | Account Discovery: Domain Account | 
                                                 ToddyCat has run `net user %USER% /dom` for account discovery.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility | 
                                                 ToddyCat has leveraged xcopy, 7zip, and RAR to stage and compress collected documents prior to exfiltration.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | 
                                                 ToddyCat has used Powershell scripts to perform post exploit collection.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| .003 | Command and Scripting Interpreter: Windows Command Shell | 
                                                         ToddyCat has used .bat scripts and `cmd` for execution on compromised hosts.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                                ||
| Enterprise | T1074 | .002 | Data Staged: Remote Data Staging | 
                                                 ToddyCat manually transferred collected files to an exfiltration host using xcopy.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1567 | .002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage | 
                                                 ToddyCat has used a DropBox uploader to exfiltrate stolen files.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window | 
                                                 ToddyCat has hidden malicious scripts using `powershell.exe -windowstyle hidden`. (Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall | 
                                                 Prior to executing a backdoor ToddyCat has run `cmd /c start /b netsh advfirewall firewall add rule name="SGAccessInboundRule" dir=in protocol=udp action=allow localport=49683` to allow the targeted system to receive UDP packets on port 49683.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1036 | .005 | Masquerading: Match Legitimate Resource Name or Location | 
                                                 ToddyCat has used the name `debug.exe` for malware components.(Citation: Kaspersky ToddyCat June 2022)  | 
                                        
| Enterprise | T1069 | .002 | Permission Groups Discovery: Domain Groups | 
                                                 ToddyCat has executed `net group "domain admins" /dom` for discovery on compromised machines.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1566 | .003 | Phishing: Spearphishing via Service | 
                                                 ToddyCat has sent loaders configured to run Ninja as zip archives via Telegram.(Citation: Kaspersky ToddyCat June 2022)  | 
                                        
| Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares | 
                                                 ToddyCat has used locally mounted network shares for lateral movement through targated environments.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task | 
                                                 ToddyCat has used scheduled tasks to execute discovery commands and scripts for collection.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery | 
                                                 ToddyCat can determine is Kaspersky software is running on an endpoint by running `cmd /c wmic process where name="avp.exe"`.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
| Enterprise | T1078 | .002 | Valid Accounts: Domain Accounts | 
                                                 ToddyCat has used compromised domain admin credentials to mount local network shares.(Citation: Kaspersky ToddyCat Check Logs October 2023)  | 
                                        
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.