Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

Woody RAT

Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.(Citation: MalwareBytes WoodyRAT Aug 2022)
ID: S1065
Type: MALWARE
Platforms: Windows
Created: 14 Feb 2023
Last Modified: 10 Apr 2024

Techniques Used

Domain ID Name Use
Enterprise T1071 .001 Application Layer Protocol: Web Protocols

Woody RAT can communicate with its C2 server using HTTP requests.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1059 .001 Command and Scripting Interpreter: PowerShell

Woody RAT can execute PowerShell commands and scripts with the use of .NET DLL, `WoodyPowerSession`.(Citation: MalwareBytes WoodyRAT Aug 2022)

.003 Command and Scripting Interpreter: Windows Command Shell

Woody RAT can execute commands using `cmd.exe`.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1573 .001 Encrypted Channel: Symmetric Cryptography

Woody RAT can use AES-CBC to encrypt data sent to its C2 server.(Citation: MalwareBytes WoodyRAT Aug 2022)

.002 Encrypted Channel: Asymmetric Cryptography

Woody RAT can use RSA-4096 to encrypt data sent to its C2 server.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1562 .006 Impair Defenses: Indicator Blocking

Woody RAT has suppressed all error reporting by calling `SetErrorMode` with 0x8007 as a parameter.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1070 .004 Indicator Removal: File Deletion

Woody RAT has the ability to delete itself from disk by creating a suspended notepad process and writing shellcode to delete a file into the suspended process using `NtWriteVirtualMemory`.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1027 .013 Obfuscated Files or Information: Encrypted/Encoded File

Woody RAT has used Base64 encoded strings and scripts.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1566 .001 Phishing: Spearphishing Attachment

Woody RAT has been delivered via malicious Word documents and archive files.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1055 .012 Process Injection: Process Hollowing

Woody RAT can create a suspended notepad process and write shellcode to delete a file into the suspended process using `NtWriteVirtualMemory`.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1518 .001 Software Discovery: Security Software Discovery

Woody RAT can detect Avast Software, Doctor Web, Kaspersky, AVG, ESET, and Sophos antivirus programs.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1016 .001 System Network Configuration Discovery: Internet Connection Discovery

Woody RAT can make `Ping` GET HTTP requests to its C2 server at regular intervals for network connectivity checks.(Citation: MalwareBytes WoodyRAT Aug 2022)

Enterprise T1204 .002 User Execution: Malicious File

Woody RAT has relied on users opening a malicious email attachment for execution.(Citation: MalwareBytes WoodyRAT Aug 2022)

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.