AsyncRAT
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
AsyncRAT can hide the execution of scheduled tasks using `ProcessWindowStyle.Hidden`.(Citation: Telefonica Snip3 December 2021) |
Enterprise | T1056 | .001 | Input Capture: Keylogging |
AsyncRAT can capture keystrokes on the victim’s machine.(Citation: AsyncRAT GitHub) |
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
AsyncRAT can create a scheduled task to maintain persistence on system start-up.(Citation: Telefonica Snip3 December 2021) |
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments.(Citation: Telefonica Snip3 December 2021) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G1018 | TA2541 |
(Citation: Telefonica Snip3 December 2021) (Citation: Proofpoint TA2541 February 2022) (Citation: Morphisec Snip3 May 2021) (Citation: Cisco Operation Layover September 2021) |
References
- Jornet, A. (2021, December 23). Snip3, an investigation into malware. Retrieved September 19, 2023.
- Lorber, N. (2021, May 7). Revealing the Snip3 Crypter, a Highly Evasive RAT Loader. Retrieved September 13, 2023.
- Ventura, V. (2021, September 16). Operation Layover: How we tracked an attack on the aviation industry to five years of compromise. Retrieved September 15, 2023.
- Nyan-x-Cat. (n.d.). NYAN-x-CAT / AsyncRAT-C-Sharp. Retrieved October 3, 2023.
- Larson, S. and Wise, J. (2022, February 15). Charting TA2541's Flight. Retrieved September 12, 2023.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.