Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

Encrypted Channel:  Симметричное шифрование

Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Symmetric encryption algorithms use the same key for plaintext encryption and ciphertext decryption. Common symmetric encryption algorithms include AES, DES, 3DES, Blowfish, and RC4.

ID: T1573.001
Относится к технике:  T1573
Тактика(-и): Command and Control
Платформы: ESXi, Linux, Network Devices, Windows, macOS
Источники данных: Network Traffic: Network Traffic Content
Версия: 1.2
Дата создания: 16 Mar 2020
Последнее изменение: 15 Apr 2025

Примеры процедур

Название Описание
TrickBot

TrickBot uses a custom crypter leveraging Microsoft’s CryptoAPI to encrypt C2 traffic.(Citation: Fidelis TrickBot Oct 2016)Newer versions of TrickBot have been known to use `bcrypt` to encrypt and digitally sign responses to their C2 server. (Citation: Bitdefender Trickbot C2 infra Nov 2020)

BLINDINGCAN

BLINDINGCAN has encrypted its C2 traffic with RC4.(Citation: US-CERT BLINDINGCAN Aug 2020)

Ninja

Ninja can XOR and AES encrypt C2 messages.(Citation: Kaspersky ToddyCat June 2022)

Pikabot

Earlier Pikabot variants use a custom encryption procedure leveraging multiple mechanisms including AES with multiple rounds of Base64 encoding for its command and control communication.(Citation: Zscaler Pikabot 2023) Later Pikabot variants eliminate the use of AES and instead use RC4 encryption for transmitted information.(Citation: Elastic Pikabot 2024)

Bumblebee

Bumblebee can encrypt C2 requests and responses with RC4(Citation: Proofpoint Bumblebee April 2022)

Torisma

Torisma has encrypted its C2 communications using XOR and VEST-32.(Citation: McAfee Lazarus Nov 2020)

Stuxnet

Stuxnet encodes the payload of system information sent to the command and control servers using a one byte 0xFF XOR key. Stuxnet also uses a 31-byte long static byte string to XOR data sent to command and control servers. The servers use a different static key to encrypt replies to the implant.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)

Downdelph

Downdelph uses RC4 to encrypt C2 responses.(Citation: ESET Sednit Part 3)

RotaJakiro

RotaJakiro encrypts C2 communication using a combination of AES, XOR, ROTATE encryption, and ZLIB compression.(Citation: RotaJakiro 2021 netlab360 analysis)

Sardonic

Sardonic has the ability to use an RC4 key to encrypt communications to and from actor-controlled C2 servers.(Citation: Bitdefender Sardonic Aug 2021)

Emissary

The C2 server response to a beacon sent by a variant of Emissary contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants of Emissary use various XOR operations to encrypt C2 data.(Citation: Lotus Blossom Dec 2015)

KEYMARBLE

KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications.(Citation: US-CERT KEYMARBLE Aug 2018)

Sliver

Sliver can use AES-GCM-256 to encrypt a session key for C2 message exchange.(Citation: GitHub Sliver Encryption)

TAMECAT

TAMECAT has used AES to encrypt C2 traffic.(Citation: Mandiant APT42-untangling)

RedLeaves

RedLeaves has encrypted C2 traffic with RC4, previously using keys of 88888888 and babybear.(Citation: PWC Cloud Hopper Technical Annex April 2017)

Felismus

Some Felismus samples use a custom encryption method for C2 traffic that utilizes AES and multiple keys.(Citation: Forcepoint Felismus Mar 2017)

xCaon

xCaon has encrypted data sent to the C2 server using a XOR key.(Citation: Checkpoint IndigoZebra July 2021)

PLAINTEE

PLAINTEE encodes C2 beacons using XOR.(Citation: Rancor Unit42 June 2018)

Nebulae

Nebulae can use RC4 and XOR to encrypt C2 communications.(Citation: Bitdefender Naikon April 2021)

Lurid

Lurid performs XOR encryption.(Citation: Villeneuve 2011)

RainyDay

RainyDay can use RC4 to encrypt C2 communications.(Citation: Bitdefender Naikon April 2021)

NETWIRE

NETWIRE can use AES encryption for C2 data transferred.(Citation: Red Canary NETWIRE January 2020)

HyperStack

HyperStack has used RSA encryption for C2 communications.(Citation: Accenture HyperStack October 2020)

HAMMERTOSS

Before being appended to image files, HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands, an investigator would need access to the intended malware sample, the day's tweet, and the image file containing the command.(Citation: FireEye APT29)

CosmicDuke

CosmicDuke contains a custom version of the RC4 algorithm that includes a programming error.(Citation: F-Secure Cosmicd