USBferry is an information stealing malware and has been used by Tropic Trooper in targeted attacks against Taiwanese and Philippine air-gapped military environments. USBferry shares an overlapping codebase with YAHOYAH, though it has several features which makes it a distinct piece of malware.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
USBferry can collect information from an air-gapped host machine.[1] |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| Enterprise | T1120 | 外围设备发现 | ||
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
USBferry can execute rundll32.exe in memory to avoid detection.[1] |
| Enterprise | T1049 | 系统网络连接发现 |
USBferry can use |
|
| Enterprise | T1016 | 系统网络配置发现 |
USBferry can detect the infected machine's network topology using |
|
| Enterprise | T1087 | .001 | 账号发现: Local Account |
USBferry can use |
| Enterprise | T1057 | 进程发现 |
USBferry can use |
|
| Enterprise | T1018 | 远程系统发现 |
USBferry can use |
|
| Enterprise | T1091 | 通过可移动媒体复制 |
USBferry can copy its installer to attached USB storage devices.[1] |
|
| ID | Name | References |
|---|---|---|
| G0081 | Tropic Trooper |