Okrum

Okrum is a Windows backdoor that has been seen in use since December 2016 with strong links to Ke3chang.[1]

ID: S0439
Type: MALWARE
Platforms: Windows
Contributors: ESET
Version: 1.0
Created: 06 May 2020
Last Modified: 14 May 2020

Techniques Used

Domain ID Name Use
Enterprise T1090 .002 代理: External Proxy

Okrum can identify proxy servers configured and used by the victim, and use it to make HTTP requests to C2 its server.[1]

Enterprise T1036 .004 伪装: Masquerade Task or Service

Okrum can establish persistence by adding a new service NtmsSvc with the display name Removable Storage to masquerade as a legitimate Removable Storage Manager.[1]

Enterprise T1543 .003 创建或修改系统进程: Windows Service

To establish persistence, Okrum can install itself as a new service named NtmSsvc.[1]

Enterprise T1573 .001 加密通道: Symmetric Cryptography

Okrum uses AES to encrypt network traffic. The key can be hardcoded or negotiated with the C2 server in the registration phase. [1]

Enterprise T1140 反混淆/解码文件或信息

Okrum's loader can decrypt the backdoor code, embedded within the loader or within a legitimate PNG file. A custom XOR cipher or RC4 is used for decryption.[1]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Okrum establishes persistence by creating a .lnk shortcut to itself in the Startup folder.[1]

.009 启动或登录自动启动执行: Shortcut Modification

Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

Okrum uses HTTP for communication with its C2.[1]

Enterprise T1560 .001 归档收集数据: Archive via Utility

Okrum was seen using a RAR archiver tool to compress/decompress data.[1]

.003 归档收集数据: Archive via Custom Method

Okrum has used a custom implementation of AES encryption to encrypt collected data.[1]

Enterprise T1003 .001 操作系统凭证转储: LSASS Memory

Okrum was seen using MimikatzLite to perform credential dumping.[1]

.005 操作系统凭证转储: Cached Domain Credentials

Okrum was seen using modified Quarks PwDump to perform credential dumping.[1]

Enterprise T1001 数据混淆

Okrum leverages the HTTP protocol for C2 communication, while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests.[1]

.003 Protocol or Service Impersonation

Okrum leverages the HTTP protocol for C2 communication, while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests.[1]

Enterprise T1132 .001 数据编码: Standard Encoding

Okrum has used base64 to encode C2 communication.[1]

Enterprise T1083 文件和目录发现

Okrum has used DriveLetterView to enumerate drive information.[1]

Enterprise T1027 .003 混淆文件或信息: Steganography

Okrum's payload is encrypted and embedded within its loader, or within a legitimate PNG file.[1]

Enterprise T1070 .004 移除指标: File Deletion

Okrum's backdoor deletes files after they have been successfully uploaded to C2 servers.[1]

Enterprise T1082 系统信息发现

Okrum can collect computer name, locale information, and information about the OS and architecture.[1]

Enterprise T1033 系统所有者/用户发现

Okrum can collect the victim username.[1]

Enterprise T1124 系统时间发现

Okrum can obtain the date and time of the compromised system.[1]

Enterprise T1569 .002 系统服务: Service Execution

Okrum's loader can create a new service named NtmsSvc to execute the payload.[1]

Enterprise T1049 系统网络连接发现

Okrum was seen using NetSess to discover NetBIOS sessions.[1]

Enterprise T1016 系统网络配置发现

Okrum can collect network information, including the host IP address, DNS, and proxy information.[1]

Enterprise T1497 .001 虚拟化/沙盒规避: System Checks

Okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 Gigabytes of physical memory in total.[1]

.002 虚拟化/沙盒规避: User Activity Based Checks

Okrum loader only executes the payload after the left mouse button has been pressed at least three times, in order to avoid being executed within virtualized or emulated environments.[1]

.003 虚拟化/沙盒规避: Time Based Evasion

Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API, and checking whether the time has been accelerated.[1]

Enterprise T1134 .001 访问令牌操控: Token Impersonation/Theft

Okrum can impersonate a logged-on user's security context using a call to the ImpersonateLoggedOnUser API.[1]

Enterprise T1105 输入工具传输

Okrum has built-in commands for uploading, downloading, and executing files to the system.[1]

Enterprise T1056 .001 输入捕获: Keylogging

Okrum was seen using a keylogger tool to capture keystrokes. [1]

Enterprise T1041 通过C2信道渗出

Data exfiltration is done by Okrum using the already opened channel with the C2 server.[1]

Enterprise T1564 .001 隐藏伪装: Hidden Files and Directories

Before exfiltration, Okrum's backdoor has used hidden files to store logs and outputs from backdoor commands.[1]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

Okrum's installer can attempt to achieve persistence by creating a scheduled task.[1]

Groups That Use This Software

ID Name References
G0004 Ke3chang

[1]

References