Heyoka Backdoor
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .004 | Application Layer Protocol: DNS |
Heyoka Backdoor can use DNS tunneling for C2 communications.(Citation: SentinelOne Aoqin Dragon June 2022) |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Heyoka Backdoor can establish persistence with the auto start function including using the value `EverNoteTrayUService`.(Citation: SentinelOne Aoqin Dragon June 2022) |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
Heyoka Backdoor has the ability to delete folders and files from a targeted system.(Citation: SentinelOne Aoqin Dragon June 2022) |
Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
Heyoka Backdoor has been named `srvdll.dll` to appear as a legitimate service.(Citation: SentinelOne Aoqin Dragon June 2022) |
Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection |
Heyoka Backdoor can inject a DLL into rundll32.exe for execution.(Citation: SentinelOne Aoqin Dragon June 2022) |
Enterprise | T1218 | .011 | System Binary Proxy Execution: Rundll32 |
Heyoka Backdoor can use rundll32.exe to gain execution.(Citation: SentinelOne Aoqin Dragon June 2022) |
Enterprise | T1204 | .002 | User Execution: Malicious File |
Heyoka Backdoor has been spread through malicious document lures.(Citation: SentinelOne Aoqin Dragon June 2022) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G1007 | Aoqin Dragon |
(Citation: SentinelOne Aoqin Dragon June 2022) |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.