ShimRatReporter

ShimRatReporter is a tool used by suspected Chinese adversary Mofang to automatically conduct initial discovery. The details from this discovery are used to customize follow-on payloads (such as ShimRat) as well as set up faux infrastructure which mimics the adversary's targets. ShimRatReporter has been used in campaigns targeting multiple countries and sectors including government, military, critical infrastructure, automobile, and weapons development.[1]

ID: S0445
Type: TOOL
Platforms: Windows
Version: 1.0
Created: 12 May 2020
Last Modified: 27 May 2020

Techniques Used

Domain ID Name Use
Enterprise T1036 .005 伪装: Match Legitimate Name or Location

ShimRatReporter spoofed itself as AlphaZawgyl_font.exe, a specialized Unicode font.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

ShimRatReporter communicated over HTTP with preconfigured C2 servers.[1]

Enterprise T1560 归档收集数据

ShimRatReporter used LZ compression to compress initial reconnaissance reports before sending to the C2.[1]

Enterprise T1106 本机API

ShimRatReporter used several Windows API functions to gather information from the infected system.[1]

Enterprise T1069 权限组发现

ShimRatReporter gathered the local privileges for the infected host.[1]

Enterprise T1027 混淆文件或信息

ShimRatReporter encrypted gathered information with a combination of shifting and XOR using a static key.[1]

Enterprise T1082 系统信息发现

ShimRatReporter gathered the operating system name and specific Windows version of an infected machine.[1]

Enterprise T1049 系统网络连接发现

ShimRatReporter used the Windows function GetExtendedUdpTable to detect connected UDP endpoints.[1]

Enterprise T1016 系统网络配置发现

ShimRatReporter gathered the local proxy, domain, IP, routing tables, mac address, gateway, DNS servers, and DHCP status information from an infected host.[1]

Enterprise T1119 自动化收集

ShimRatReporter gathered information automatically, without instruction from a C2, related to the user and host machine that is compiled into a report and sent to the operators.[1]

Enterprise T1020 自动化渗出

ShimRatReporter sent collected system and network information compiled into a report to an adversary-controlled C2.[1]

Enterprise T1087 账号发现

ShimRatReporter listed all non-privileged and privileged accounts available on the machine.[1]

Enterprise T1518 软件发现

ShimRatReporter gathered a list of installed software on the infected host.[1]

Enterprise T1105 输入工具传输

ShimRatReporter had the ability to download additional payloads.[1]

Enterprise T1057 进程发现

ShimRatReporter listed all running processes on the machine.[1]

Enterprise T1041 通过C2信道渗出

ShimRatReporter sent generated reports to the C2 via HTTP POST requests.[1]

Groups That Use This Software

ID Name References
G0103 Mofang

References