Octopus is a Windows Trojan written in the Delphi programming language that has been used by Nomadic Octopus to target government organizations in Central Asia since at least 2014.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Octopus has used wmic.exe for local discovery information.[1] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
Octopus can exfiltrate files from the system using a documents collector tool.[3] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Octopus has been disguised as legitimate programs, such as Java and Telegram Messenger.[1][3] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Octopus achieved persistence by placing a malicious executable in the startup directory and has added the |
| Enterprise | T1113 | 屏幕捕获 |
Octopus can capture screenshots of the victims’ machine.[1][2][3] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Octopus has used HTTP GET and POST requests for C2 communications.[1][3] |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Octopus has compressed data before exfiltrating it using a tool called Abbrevia.[3] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Octopus has stored collected information in the Application Data directory on a compromised host.[1][3] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1083 | 文件和目录发现 |
Octopus can collect information on the Windows directory and searches for compressed RAR files on the host.[1][2][3] |
|
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
Octopus has relied upon users clicking on a malicious attachment delivered through spearphishing.[3] |
| Enterprise | T1082 | 系统信息发现 |
Octopus can collect system drive information, the computer name, the size of the disk, OS version, and OS architecture information.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Octopus can collect the username from the victim’s machine.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Octopus can collect the host IP address from the victim’s machine.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
Octopus can download additional files and tools onto the victim’s machine.[1][2][3] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Octopus has uploaded stolen files and data from a victim's machine over its C2 channel.[1] |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage | |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment | |
| ID | Name | References |
|---|---|---|
| G0133 | Nomadic Octopus |