Sidewinder is a suspected Indian threat actor group that has been active since at least 2012. They have been observed targeting government, military, and business entities throughout Asia, primarily focusing on Pakistan, China, Nepal, and Afghanistan.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Sidewinder has named malicious files |
| Enterprise | T1598 | .002 | 信息钓鱼: Spearphishing Attachment |
Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites.[1][5][3] |
| .003 | 信息钓鱼: Spearphishing Link |
Sidewinder has sent e-mails with malicious links to credential harvesting websites.[1] |
||
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
Sidewinder has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe.[1] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Sidewinder has added paths to executables in the Registry to establish persistence.[5][4][3] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Sidewinder has used PowerShell to drop and execute malware loaders.[1] |
| .005 | 命令与脚本解释器: Visual Basic |
Sidewinder has used VBScript to drop and execute malware loaders.[1] |
||
| .007 | 命令与脚本解释器: JavaScript |
Sidewinder has used JavaScript to drop and execute malware loaders.[1][4] |
||
| Enterprise | T1203 | 客户端执行漏洞利用 |
Sidewinder has exploited vulnerabilities to gain execution including CVE-2017-11882 and CVE-2020-0674.[1][3] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Sidewinder has used HTTP in C2 communications.[1][5][4] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Sidewinder has collected stolen files in a temporary folder in preparation for exfiltration.[1] |
| Enterprise | T1083 | 文件和目录发现 |
Sidewinder has used malware to collect information on files and directories.[1] |
|
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
Sidewinder has used base64 encoding for scripts.[1][5] |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
Sidewinder has used base64 encoding and ECDH-P256 encryption for payloads.[1][5][3] |
||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Sidewinder has lured targets to click on malicious links to gain execution in the target environment.[1][5][4][3] |
| .002 | 用户执行: Malicious File |
Sidewinder has lured targets to click on malicious files to gain execution in the target environment.[1][5][4][3] |
||
| Enterprise | T1218 | .005 | 系统二进制代理执行: Mshta |
Sidewinder has used |
| Enterprise | T1082 | 系统信息发现 |
Sidewinder has used tools to collect the computer name, OS version, installed hotfixes, as well as information regarding the memory and processor on a compromised host.[1][4] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Sidewinder has used tools to identify the user of a compromised host.[1] |
|
| Enterprise | T1124 | 系统时间发现 |
Sidewinder has used tools to obtain the current system time.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Sidewinder has used malware to collect information on network interfaces, including the MAC address.[1] |
|
| Enterprise | T1119 | 自动化收集 |
Sidewinder has used tools to automatically collect system and network configuration information.[1] |
|
| Enterprise | T1020 | 自动化渗出 |
Sidewinder has configured tools to automatically send collected files to attacker controlled servers.[1] |
|
| Enterprise | T1518 | 软件发现 |
Sidewinder has used tools to enumerate software installed on an infected host.[1][5] |
|
| .001 | Security Software Discovery |
Sidewinder has used the Windows service |
||
| Enterprise | T1105 | 输入工具传输 |
Sidewinder has used LNK files to download remote files to the victim's network.[1][3] |
|
| Enterprise | T1057 | 进程发现 |
Sidewinder has used tools to identify running processes on the victim's machine.[1] |
|
| Enterprise | T1559 | .002 | 进程间通信: Dynamic Data Exchange |
Sidewinder has used the ActiveXObject utility to create OLE objects to obtain execution through Internet Explorer.[5][4] |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Sidewinder has sent e-mails with malicious attachments often crafted for specific targets.[1] |
| .002 | 钓鱼: Spearphishing Link |
Sidewinder has sent e-mails with malicious links often crafted for specific targets.[1][3] |
||