HAMMERTOSS is a backdoor that was used by APT29 in 2015. [1] [2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Before being appended to image files, HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands, an investigator would need access to the intended malware sample, the day's tweet, and the image file containing the command.[1] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
HAMMERTOSS is known to use PowerShell.[1] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
The "Uploader" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands.[1] |
| Enterprise | T1001 | .002 | 数据混淆: Steganography |
HAMMERTOSS is controlled via commands that are appended to image files.[1] |
| Enterprise | T1102 | .003 | 网络服务: One-Way Communication |
The "tDiscoverer" variant of HAMMERTOSS establishes a C2 channel by downloading resources from Web services like Twitter and GitHub. HAMMERTOSS binaries contain an algorithm that generates a different Twitter handle for the malware to check for instructions every day.[1] |
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later.[1] |
| Enterprise | T1564 | .003 | 隐藏伪装: Hidden Window |
HAMMERTOSS has used |