Spark
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Spark has used HTTP POST requests to communicate with its C2 server to receive commands.(Citation: Unit42 Molerat Mar 2020) |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
Spark can use cmd.exe to run commands.(Citation: Unit42 Molerat Mar 2020) |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding |
Spark has encoded communications with the C2 server with base64.(Citation: Unit42 Molerat Mar 2020) |
Enterprise | T1027 | .002 | Obfuscated Files or Information: Software Packing |
Spark has been packed with Enigma Protector to obfuscate its contents.(Citation: Unit42 Molerat Mar 2020) |
Enterprise | T1614 | .001 | System Location Discovery: System Language Discovery |
Spark has checked the results of the |
Enterprise | T1497 | .002 | Virtualization/Sandbox Evasion: User Activity Based Checks |
Spark has used a splash screen to check whether an user actively clicks on the screen before running malicious code.(Citation: Unit42 Molerat Mar 2020) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G0021 | Molerats |
(Citation: Unit42 Molerat Mar 2020) (Citation: Cybereason Molerats Dec 2020) |
References
- Falcone, R., et al. (2020, March 3). Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations. Retrieved December 14, 2020.
- Cybereason Nocturnus Team. (2020, December 9). MOLERATS IN THE CLOUD: New Malware Arsenal Abuses Cloud Platforms in Middle East Espionage Campaign. Retrieved December 22, 2020.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.