Metador is a suspected cyber espionage group that was first reported in September 2022. Metador has targeted a limited number of telecommunication companies, internet service providers, and universities in the Middle East and Africa. Security researchers named the group Metador based on the "I am meta" string in one of the group's malware samples and the expectation of Spanish-language responses from C2 servers.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
Metador has established persistence through the use of a WMI event subscription combined with unusual living-off-the-land binaries such as |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Metador has used the Windows command line to execute commands.[1] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File | |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Metador has quickly deleted |
| Enterprise | T1588 | .001 | 获取能力: Malware |
Metador has used unique malware in their operations, including metaMain and Mafalda.[1] |
| .002 | 获取能力: Tool |
Metador has used Microsoft's Console Debugger in some of their operations.[1] |
||
| Enterprise | T1105 | 输入工具传输 |
Metador has downloaded tools and malware onto a compromised system.[1] |
|
| Enterprise | T1095 | 非应用层协议 | ||