| Name | Description |
|---|---|
| Roarur | |
| MdmBot | |
| HomeUnix | |
| Homux | |
| HidraQ | |
| HydraQ | |
| McRat | |
| Aurora | |
| 9002 RAT |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
Hydraq creates a backdoor through which remote attackers can read data from files.[3][10] |
|
| Enterprise | T1112 | 修改注册表 |
Hydraq creates a Registry subkey to register its created service, and can also uninstall itself later by deleting this value. Hydraq's backdoor also enables remote attackers to modify and delete subkeys.[3][10] |
|
| Enterprise | T1129 | 共享模块 |
Hydraq creates a backdoor through which remote attackers can load and call DLL functions.[3][10] |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Hydraq creates new services to establish persistence.[3][10][11] |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Hydraq C2 traffic is encrypted using bitwise NOT and XOR operations.[10] |
| Enterprise | T1113 | 屏幕捕获 |
Hydraq includes a component based on the code of VNC that can stream a live feed of the desktop of an infected host.[10] |
|
| Enterprise | T1083 | 文件和目录发现 |
Hydraq creates a backdoor through which remote attackers can check for the existence of files, including its own components, as well as retrieve a list of logical drives.[3][10] |
|
| Enterprise | T1048 | 替代协议渗出 |
Hydraq connects to a predefined domain on port 443 to exfil gathered information.[10] |
|
| Enterprise | T1012 | 查询注册表 |
Hydraq creates a backdoor through which remote attackers can retrieve system information, such as CPU speed, from Registry keys.[3][10] |
|
| Enterprise | T1027 | 混淆文件或信息 |
Hydraq uses basic obfuscation in the form of spaghetti code.[2][3] |
|
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs |
Hydraq creates a backdoor through which remote attackers can clear all system event logs.[3][10] |
| .004 | 移除指标: File Deletion |
Hydraq creates a backdoor through which remote attackers can delete files.[3][10] |
||
| Enterprise | T1082 | 系统信息发现 |
Hydraq creates a backdoor through which remote attackers can retrieve information such as computer name, OS version, processor speed, memory size, and CPU speed.[10] |
|
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
Hydraq uses svchost.exe to execute a malicious DLL included in a new service group.[11] |
| Enterprise | T1007 | 系统服务发现 |
Hydraq creates a backdoor through which remote attackers can monitor services.[3][10] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Hydraq creates a backdoor through which remote attackers can retrieve IP addresses of compromised machines.[3][10] |
|
| Enterprise | T1134 | 访问令牌操控 |
Hydraq creates a backdoor through which remote attackers can adjust token privileges.[10] |
|
| Enterprise | T1105 | 输入工具传输 |
Hydraq creates a backdoor through which remote attackers can download files and additional malware components.[3][10] |
|
| Enterprise | T1057 | 进程发现 |
Hydraq creates a backdoor through which remote attackers can monitor processes.[3][10] |
|