Mosquito
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Mosquito establishes persistence under the Registry key |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Mosquito can launch PowerShell Scripts.(Citation: ESET Turla Mosquito Jan 2018) |
.003 | Command and Scripting Interpreter: Windows Command Shell |
Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server.(Citation: ESET Turla Mosquito Jan 2018) |
||
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
Mosquito uses a custom encryption algorithm, which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm.(Citation: ESET Turla Mosquito Jan 2018) |
Enterprise | T1546 | .015 | Event Triggered Execution: Component Object Model Hijacking |
Mosquito uses COM hijacking as a method of persistence.(Citation: ESET Turla Mosquito Jan 2018) |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
Mosquito deletes files using DeleteFileW API call.(Citation: ESET Turla Mosquito Jan 2018) |
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system.(Citation: ESET Turla Mosquito Jan 2018) |
Enterprise | T1218 | .011 | System Binary Proxy Execution: Rundll32 |
Mosquito's launcher uses rundll32.exe in a Registry Key value to start the main backdoor capability.(Citation: ESET Turla Mosquito Jan 2018) |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.