Cardinal RAT is a potentially low volume remote access trojan (RAT) observed since December 2015. Cardinal RAT is notable for its unique utilization of uncompiled C# source code and the Microsoft Windows built-in csc.exe compiler.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | 代理 |
Cardinal RAT can act as a reverse proxy.[1] |
|
| Enterprise | T1112 | 修改注册表 |
Cardinal RAT sets |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Cardinal RAT decodes many of its artifacts and is decrypted (AES-128) after being downloaded.[1] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Cardinal RAT establishes Persistence by setting the |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Cardinal RAT can execute commands.[1] |
| Enterprise | T1008 | 回退信道 |
Cardinal RAT can communicate over multiple C2 host and port combinations.[1] |
|
| Enterprise | T1113 | 屏幕捕获 |
Cardinal RAT can capture screenshots.[1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Cardinal RAT is downloaded using HTTP over port 443.[1] |
| Enterprise | T1560 | .002 | 归档收集数据: Archive via Library |
Cardinal RAT applies compression to C2 traffic using the ZLIB library.[1] |
| Enterprise | T1083 | 文件和目录发现 |
Cardinal RAT checks its current working directory upon execution and also contains watchdog functionality that ensures its executable is located in the correct path (else it will rewrite the payload).[1] |
|
| Enterprise | T1012 | 查询注册表 |
Cardinal RAT contains watchdog functionality that periodically ensures |
|
| Enterprise | T1027 | .004 | 混淆文件或信息: Compile After Delivery |
Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code.[1] |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
Cardinal RAT encodes many of its artifacts and is encrypted (AES-128) when downloaded.[1] |
||
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
Cardinal RAT lures victims into executing malicious macros embedded within Microsoft Excel documents.[1] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Cardinal RAT can uninstall itself, including deleting its executable.[1] |
| Enterprise | T1082 | 系统信息发现 |
Cardinal RAT can collect the hostname, Microsoft Windows version, and processor architecture from a victim machine.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Cardinal RAT can collect the username from a victim machine.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
Cardinal RAT can download and execute additional payloads.[1] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
Cardinal RAT can log keystrokes.[1] |
| Enterprise | T1057 | 进程发现 |
Cardinal RAT contains watchdog functionality that ensures its process is always running, else spawns a new instance.[1] |
|
| Enterprise | T1055 | 进程注入 |
Cardinal RAT injects into a newly spawned process created from a native Windows executable.[1] |
|