Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

DarkTortilla

DarkTortilla is a highly configurable .NET-based crypter that has been possibly active since at least August 2015. DarkTortilla has been used to deliver popular information stealers, RATs, and payloads such as Agent Tesla, AsyncRat, NanoCore, RedLine, Cobalt Strike, and Metasploit.(Citation: Secureworks DarkTortilla Aug 2022)
ID: S1066
Type: MALWARE
Platforms: Windows
Created: 16 Feb 2023
Last Modified: 06 Mar 2023

Techniques Used

Domain ID Name Use
Enterprise T1071 .001 Application Layer Protocol: Web Protocols

DarkTortilla has used HTTP and HTTPS for C2.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

DarkTortilla has established persistence via the `Software\Microsoft\Windows NT\CurrentVersion\Run` registry key and by creating a .lnk shortcut file in the Windows startup folder.(Citation: Secureworks DarkTortilla Aug 2022)

.004 Boot or Logon Autostart Execution: Winlogon Helper DLL

DarkTortilla has established persistence via the `Software\Microsoft\Windows NT\CurrentVersion\Winlogon` registry key.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

DarkTortilla can use `cmd.exe` to add registry keys for persistence.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1574 .012 Hijack Execution Flow: COR_PROFILER

DarkTortilla can detect profilers by verifying the `COR_ENABLE_PROFILING` environment variable is present and active.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1056 .001 Input Capture: Keylogging

DarkTortilla can download a keylogging module.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1559 .001 Inter-Process Communication: Component Object Model

DarkTortilla has used the `WshShortcut` COM object to create a .lnk shortcut file in the Windows startup folder.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1566 .001 Phishing: Spearphishing Attachment

DarkTortilla has been distributed via spearphishing emails containing archive attachments, with file types such as .iso, .zip, .img, .dmg, and .tar, as well as through malicious documents.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1055 .001 Process Injection: Dynamic-link Library Injection

DarkTortilla can use a .NET-based DLL named `RunPe6` for process injection.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1518 .001 Software Discovery: Security Software Discovery

DarkTortilla can check for the Kaspersky Anti-Virus suite.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1016 .001 System Network Configuration Discovery: Internet Connection Discovery

DarkTortilla can check for internet connectivity by issuing HTTP GET requests.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1204 .002 User Execution: Malicious File

DarkTortilla has relied on a user to open a malicious document or archived file delivered via email for initial execution.(Citation: Secureworks DarkTortilla Aug 2022)

Enterprise T1497 .001 Virtualization/Sandbox Evasion: System Checks

DarkTortilla can search a compromised system's running processes and services to detect Hyper-V, QEMU, Virtual PC, Virtual Box, and VMware, as well as Sandboxie.(Citation: Secureworks DarkTortilla Aug 2022)

.003 Virtualization/Sandbox Evasion: Time Based Evasion

DarkTortilla can implement the `kernel32.dll` Sleep function to delay execution for up to 300 seconds before implementing persistence or processing an addon package.(Citation: Secureworks DarkTortilla Aug 2022)

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.