SysUpdate is a backdoor written in C++ that has been used by Threat Group-3390 since at least 2020.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
SysUpdate can use WMI for execution on a compromised host.[1] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
SysUpdate can collect information and files from a compromised host.[2] |
|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
SysUpdate has named their unit configuration file similarly to other unit files residing in the same directory, |
| Enterprise | T1112 | 修改注册表 |
SysUpdate can write its configuration file to |
|
| Enterprise | T1543 | .002 | 创建或修改系统进程: Systemd Service |
SysUpdate can copy a script to the user owned |
| .003 | 创建或修改系统进程: Windows Service | |||
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
SysUpdate can load DLLs through vulnerable legitimate executables.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
SysUpdate can use a Registry Run key to establish persistence.[1] |
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1071 | .004 | 应用层协议: DNS |
SysUpdate has used DNS TXT requests as for its C2 communication.[2] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1106 | 本机API |
SysUpdate can call the |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing | |
| .011 | 混淆文件或信息: Fileless Storage |
SysUpdate can store its encoded configuration file within |
||
| .013 | 混淆文件或信息: Encrypted/Encoded File | |||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
SysUpdate can delete its configuration file from the targeted system.[1] |
| Enterprise | T1082 | 系统信息发现 |
SysUpdate can collect a system's architecture, operating system version, hostname, and drive information.[1][2] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
SysUpdate can collect the username from a compromised host.[2] |
|
| Enterprise | T1569 | .002 | 系统服务: Service Execution | |
| Enterprise | T1007 | 系统服务发现 |
SysUpdate can collect a list of services on a victim machine.[2] |
|
| Enterprise | T1016 | 系统网络配置发现 |
SysUpdate can collected the IP address and domain name of a compromised host.[2] |
|
| .001 | Internet Connection Discovery |
SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process.[2] |
||
| Enterprise | T1105 | 输入工具传输 |
SysUpdate has the ability to download files to a compromised host.[1][2] |
|
| Enterprise | T1057 | 进程发现 |
SysUpdate can collect information about running processes.[2] |
|
| Enterprise | T1041 | 通过C2信道渗出 | ||
| Enterprise | T1564 | .001 | 隐藏伪装: Hidden Files and Directories |
SysUpdate has the ability to set file attributes to hidden.[1] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
SysUpdate has been signed with stolen digital certificates.[2] |
| ID | Name | References |
|---|---|---|
| G0027 | Threat Group-3390 |