HTTPBrowser is malware that has been used by several threat groups. [1] [2] It is believed to be of Chinese origin. [3]
| Name | Description |
|---|---|
| HttpDump |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
HTTPBrowser's installer contains a malicious file named navlu.dll to decrypt and run the RAT. navlu.dll is also the name of a legitimate Symantec DLL.[4] |
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking |
HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll.[4] |
| .002 | 劫持执行流: DLL Side-Loading |
HTTPBrowser has used DLL side-loading.[2] |
||
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
HTTPBrowser has established persistence by setting the |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
HTTPBrowser is capable of spawning a reverse shell on a victim.[2] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
HTTPBrowser has used HTTP and HTTPS for command and control.[2][1] |
| .004 | 应用层协议: DNS |
HTTPBrowser has used DNS for command and control.[2][1] |
||
| Enterprise | T1083 | 文件和目录发现 |
HTTPBrowser is capable of listing files, folders, and drives on a victim.[2][4] |
|
| Enterprise | T1027 | 混淆文件或信息 |
HTTPBrowser's code may be obfuscated through structured exception handling and return-oriented programming.[2] |
|
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
HTTPBrowser deletes its original installer file once installation is complete.[4] |
| Enterprise | T1105 | 输入工具传输 |
HTTPBrowser is capable of writing a file to the compromised system from the C2 server.[2] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
HTTPBrowser is capable of capturing keystrokes on victims.[2] |