Snip3
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Snip3 can create a VBS file in startup to persist after system restarts.(Citation: Telefonica Snip3 December 2021) |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Snip3 can use a PowerShell script for second-stage execution.(Citation: Morphisec Snip3 May 2021)(Citation: Telefonica Snip3 December 2021) |
.005 | Command and Scripting Interpreter: Visual Basic |
Snip3 can use visual basic scripts for first-stage execution.(Citation: Morphisec Snip3 May 2021)(Citation: Telefonica Snip3 December 2021) |
||
Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
Snip3 can execute PowerShell scripts in a hidden window.(Citation: Morphisec Snip3 May 2021) |
Enterprise | T1027 | .001 | Obfuscated Files or Information: Binary Padding |
Snip3 can obfuscate strings using junk Chinese characters.(Citation: Morphisec Snip3 May 2021) |
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
Snip3 has been delivered to victims through malicious e-mail attachments.(Citation: Telefonica Snip3 December 2021) |
.002 | Phishing: Spearphishing Link |
Snip3 has been delivered to victims through e-mail links to malicious files.(Citation: Telefonica Snip3 December 2021) |
||
Enterprise | T1055 | .012 | Process Injection: Process Hollowing |
Snip3 can use RunPE to execute malicious payloads within a hollowed Windows process.(Citation: Morphisec Snip3 May 2021)(Citation: Telefonica Snip3 December 2021) |
Enterprise | T1204 | .001 | User Execution: Malicious Link |
Snip3 has been executed through luring victims into clicking malicious links.(Citation: Telefonica Snip3 December 2021) |
.002 | User Execution: Malicious File |
Snip3 can gain execution through the download of visual basic files.(Citation: Morphisec Snip3 May 2021)(Citation: Telefonica Snip3 December 2021) |
||
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
Snip3 has the ability to detect Windows Sandbox, VMWare, or VirtualBox by querying `Win32_ComputerSystem` to extract the `Manufacturer` string.(Citation: Morphisec Snip3 May 2021) |
.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
Snip3 can execute `WScript.Sleep` to delay execution of its second stage.(Citation: Morphisec Snip3 May 2021) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G1018 | TA2541 |
(Citation: Proofpoint TA2541 February 2022) (Citation: Morphisec Snip3 May 2021) |
References
- Jornet, A. (2021, December 23). Snip3, an investigation into malware. Retrieved September 19, 2023.
- Lorber, N. (2021, May 7). Revealing the Snip3 Crypter, a Highly Evasive RAT Loader. Retrieved September 13, 2023.
- Larson, S. and Wise, J. (2022, February 15). Charting TA2541's Flight. Retrieved September 12, 2023.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.