Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

Bandook

Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".(Citation: EFF Manul Aug 2016)(Citation: Lookout Dark Caracal Jan 2018)(Citation: CheckPoint Bandook Nov 2020)
ID: S0234
Type: MALWARE
Platforms: Windows
Version: 2.0
Created: 17 Oct 2018
Last Modified: 11 Oct 2021

Techniques Used

Domain ID Name Use
Enterprise T1059 .001 Command and Scripting Interpreter: PowerShell

Bandook has used PowerShell loaders as part of execution.(Citation: CheckPoint Bandook Nov 2020)

.003 Command and Scripting Interpreter: Windows Command Shell

Bandook is capable of spawning a Windows command shell.(Citation: EFF Manul Aug 2016)(Citation: CheckPoint Bandook Nov 2020)

.005 Command and Scripting Interpreter: Visual Basic

Bandook has used malicious VBA code against the target system.(Citation: CheckPoint Bandook Nov 2020)

.006 Command and Scripting Interpreter: Python

Bandook can support commands to execute Python-based payloads.(Citation: CheckPoint Bandook Nov 2020)

Enterprise T1573 .001 Encrypted Channel: Symmetric Cryptography

Bandook has used AES encryption for C2 communication.(Citation: CheckPoint Bandook Nov 2020)

Enterprise T1070 .004 Indicator Removal: File Deletion

Bandook has a command to delete a file.(Citation: CheckPoint Bandook Nov 2020)

Enterprise T1056 .001 Input Capture: Keylogging

Bandook contains keylogging capabilities.(Citation: BH Manul Aug 2016)

Enterprise T1027 .003 Obfuscated Files or Information: Steganography

Bandook has used .PNG images within a zip file to build the executable. (Citation: CheckPoint Bandook Nov 2020)

Enterprise T1566 .001 Phishing: Spearphishing Attachment

Bandook is delivered via a malicious Word document inside a zip file.(Citation: CheckPoint Bandook Nov 2020)

Enterprise T1055 .012 Process Injection: Process Hollowing

Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload.(Citation: Lookout Dark Caracal Jan 2018)(Citation: EFF Manul Aug 2016)(Citation: CheckPoint Bandook Nov 2020)

Enterprise T1553 .002 Subvert Trust Controls: Code Signing

Bandook was signed with valid Certum certificates.(Citation: CheckPoint Bandook Nov 2020)

Enterprise T1204 .002 User Execution: Malicious File

Bandook has used lure documents to convince the user to enable macros.(Citation: CheckPoint Bandook Nov 2020)

Groups That Use This Software

ID Name References
G0070 Dark Caracal

(Citation: Lookout Dark Caracal Jan 2018) (Citation: CheckPoint Bandook Nov 2020)

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.