BLACKCOFFEE
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
BLACKCOFFEE has the capability to create a reverse shell.(Citation: FireEye APT17) |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
BLACKCOFFEE has the capability to delete files.(Citation: FireEye APT17) |
Enterprise | T1102 | .001 | Web Service: Dead Drop Resolver |
BLACKCOFFEE uses Microsoft’s TechNet Web portal to obtain a dead drop resolver containing an encoded tag with the IP address of a command and control server.(Citation: FireEye APT17)(Citation: FireEye Periscope March 2018) |
.002 | Web Service: Bidirectional Communication |
BLACKCOFFEE has also obfuscated its C2 traffic as normal traffic to sites such as Github.(Citation: FireEye APT17)(Citation: FireEye Periscope March 2018) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G0065 | Leviathan |
(Citation: FireEye Periscope March 2018) |
G0025 | APT17 |
(Citation: FireEye APT17) |
G0096 | APT41 |
(Citation: FireEye APT41 Aug 2019) |
References
- FireEye Labs/FireEye Threat Intelligence. (2015, May 14). Hiding in Plain Sight: FireEye and Microsoft Expose Obfuscation Tactic. Retrieved January 22, 2016.
- FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
- Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.