Turian is a backdoor that has been used by BackdoorDiplomacy to target Ministries of Foreign Affairs, telecommunication companies, and charities in Africa, Europe, the Middle East, and Asia. First reported in 2021, Turian is likely related to Quarian, an older backdoor that was last observed being used in 2013 against diplomatic targets in Syria and the United States.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
Turian can disguise as a legitimate service to blend into normal operations.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Turian has the ability to use a XOR decryption key to extract C2 server domains and IP addresses.[1] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Turian can establish persistence by adding Registry Run keys.[1] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Turian can create a remote shell and execute commands using cmd.[1] |
| .004 | 命令与脚本解释器: Unix Shell |
Turian has the ability to use |
||
| .006 | 命令与脚本解释器: Python |
Turian has the ability to use Python to spawn a Unix shell.[1] |
||
| Enterprise | T1120 | 外围设备发现 | ||
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Turian can use WinRAR to create a password-protected archive for files of interest.[1] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Turian can store copied files in a specific directory prior to exfiltration.[1] |
| Enterprise | T1001 | .001 | 数据混淆: Junk Data |
Turian can insert pseudo-random characters into its network encryption setup.[1] |
| Enterprise | T1083 | 文件和目录发现 |
Turian can search for specific files and list directories.[1] |
|
| Enterprise | T1027 | 混淆文件或信息 | ||
| Enterprise | T1082 | 系统信息发现 |
Turian can retrieve system information including OS version, memory usage, local hostname, and system adapter information.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1016 | 系统网络配置发现 |
Turian can retrieve the internal IP address of a compromised host.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
Turian can download additional files and tools from its C2.[1] |
|
| ID | Name | References |
|---|---|---|
| G0135 | BackdoorDiplomacy |