Bisonal is a remote access tool (RAT) that has been used by Tonto Team against public and private sector organizations in Russia, South Korea, and Japan since at least December 2010.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
Bisonal has collected information from a compromised host.[2] |
|
| Enterprise | T1090 | 代理 | ||
| Enterprise | T1036 | 伪装 |
Bisonal dropped a decoy payload with a .jpg extension that contained a malicious Visual Basic script.[2] |
|
| .005 | Match Legitimate Name or Location |
Bisonal has renamed malicious code to |
||
| Enterprise | T1112 | 修改注册表 |
Bisonal has deleted Registry keys to clean up its prior activity.[2] |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Bisonal has been modified to be used as a Windows service.[2] |
| Enterprise | T1137 | .006 | 办公应用启动: Add-ins |
Bisonal has been loaded through a |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4.[1][3][2] |
| Enterprise | T1568 | 动态解析 | ||
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Bisonal has decoded strings in the malware using XOR and RC4.[1][2] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Bisonal has added itself to the Registry key |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Bisonal has launched cmd.exe and used the ShellExecuteW() API function to execute commands on the system.[1][3][2] |
| .005 | 命令与脚本解释器: Visual Basic |
Bisonal's dropper creates VBS scripts on the victim’s machine.[1][2] |
||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
Bisonal has encoded binary data with Base64 and ASCII.[3][2] |
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1106 | 本机API |
Bisonal has used the Windows API to communicate with the Service Control Manager to execute a thread.[2] |
|
| Enterprise | T1012 | 查询注册表 |
Bisonal has used the RegQueryValueExA function to retrieve proxy information in the Registry.[2] |
|
| Enterprise | T1027 | .001 | 混淆文件或信息: Binary Padding |
Bisonal has appended random binary data to the end of itself to generate a large binary.[2] |
| .002 | 混淆文件或信息: Software Packing |
Bisonal has used the MPRESS packer and similar tools for obfuscation.[2] |
||
| .013 | 混淆文件或信息: Encrypted/Encoded File |
Bisonal's DLL file and non-malicious decoy file are encrypted with RC4 and some function name strings are obfuscated.[1][2] |
||
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
Bisonal has relied on users to execute malicious file attachments delivered via spearphishing emails.[2] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Bisonal will delete its dropper and VBS scripts from the victim’s machine.[1][3][2] |
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
Bisonal has used rundll32.exe to execute as part of the Registry Run key it adds: |
| Enterprise | T1082 | 系统信息发现 |
Bisonal has used commands and API calls to gather system information.[1][3][2] |
|
| Enterprise | T1124 | 系统时间发现 |
Bisonal can check the system time set on the infected host.[3] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Bisonal can execute |
|
| Enterprise | T1497 | 虚拟化/沙盒规避 |
Bisonal can check to determine if the compromised system is running on VMware.[2] |
|
| .003 | Time Based Evasion |
Bisonal has checked if the malware is running in a virtual environment with the anti-debug function GetTickCount() to compare the timing.[3][2] |
||
| Enterprise | T1105 | 输入工具传输 |
Bisonal has the capability to download files to execute on the victim’s machine.[1][3][2] |
|
| Enterprise | T1057 | 进程发现 |
Bisonal can obtain a list of running processes on the victim’s machine.[1][3][2] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Bisonal has added the exfiltrated data to the URL over the C2 channel.[2] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Bisonal has been delivered as malicious email attachments.[2] |
| Enterprise | T1095 | 非应用层协议 | ||
| ID | Name | References |
|---|---|---|
| G0131 | Tonto Team |