CORESHELL

CORESHELL is a downloader used by APT28. The older versions of this malware are known as SOURFACE and newer versions as CORESHELL.[1] [2]

ID: S0137
Associated Software: Sofacy, SOURFACE
Type: MALWARE
Platforms: Windows
Version: 2.1
Created: 31 May 2017
Last Modified: 26 March 2023

Associated Software Descriptions

Name Description
Sofacy

This designation has been used in reporting both to refer to the threat group (APT28) and its associated malware.[1] [2][3]

SOURFACE

[1] [2][3]

Techniques Used

Domain ID Name Use
Enterprise T1573 .001 加密通道: Symmetric Cryptography

CORESHELL C2 messages are encrypted with custom stream ciphers using six-byte or eight-byte keys.[1]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

CORESHELL has established persistence by creating autostart extensibility point (ASEP) Registry entries in the Run key and other Registry keys, as well as by creating shortcuts in the Internet Explorer Quick Start folder.[4]

Enterprise T1071 .001 应用层协议: Web Protocols

CORESHELL can communicate over HTTP for C2.[1][4]

.003 应用层协议: Mail Protocols

CORESHELL can communicate over SMTP and POP3 for C2.[1][4]

Enterprise T1132 .001 数据编码: Standard Encoding

CORESHELL C2 messages are Base64-encoded.[1]

Enterprise T1027 混淆文件或信息

CORESHELL obfuscates strings using a custom stream cipher.[1]

.001 Binary Padding

CORESHELL contains unused machine instructions in a likely attempt to hinder analysis.[1]

Enterprise T1218 .011 系统二进制代理执行: Rundll32

CORESHELL is installed via execution of rundll32 with an export named "init" or "InitW."[4]

Enterprise T1082 系统信息发现

CORESHELL collects hostname, volume serial number and OS version data from the victim and sends the information to its C2 server.[1]

Enterprise T1105 输入工具传输

CORESHELL downloads another dropper from its C2 server.[1]

Groups That Use This Software

ID Name References
G0007 APT28

[1][5]

References