Torisma is a second stage implant designed for specialized monitoring that has been used by Lazarus Group. Torisma was discovered during an investigation into the 2020 Operation North Star campaign that targeted the defense sector.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Torisma has encrypted its C2 communications using XOR and VEST-32.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1480 | 执行保护 |
Torisma is only delivered to a compromised host if the victim's IP address is on an allow-list.[1] |
|
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1106 | 本机API | ||
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing | |
| .013 | 混淆文件或信息: Encrypted/Encoded File | |||
| Enterprise | T1082 | 系统信息发现 |
Torisma can use |
|
| Enterprise | T1124 | 系统时间发现 |
Torisma can collect the current time on a victim machine.[1] |
|
| Enterprise | T1049 | 系统网络连接发现 |
Torisma can use |
|
| Enterprise | T1016 | 系统网络配置发现 |
Torisma can collect the local MAC address using |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Torisma can send victim data to an actor-controlled C2 server.[1] |
|
| ID | Name | Description |
|---|---|---|
| C0022 | Operation Dream Job |
During Operation Dream Job, Lazarus Group used Torisma to actively monitor for new drives and remote desktop connections on an infected system.[3][1] |