WEBC2

WEBC2 is a family of backdoor malware used by APT1 as early as July 2006. WEBC2 backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server. [1][2]

ID: S0109
Type: MALWARE
Platforms: Windows
Contributors: Wes Hurd
Version: 2.0
Created: 31 May 2017
Last Modified: 26 December 2023

Techniques Used

Domain ID Name Use
Enterprise T1574 .001 劫持执行流: DLL Search Order Hijacking

Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll).[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

WEBC2 can open an interactive command shell.[2]

Enterprise T1105 输入工具传输

WEBC2 can download and execute a file.[2]

Groups That Use This Software

ID Name References
G0006 APT1

[2]

References