TrailBlazer is a modular malware that has been used by APT29 since at least 2019.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
TrailBlazer has the ability to use WMI for persistence.[1] |
| Enterprise | T1036 | 伪装 |
TrailBlazer has used filenames that match the name of the compromised system in attempt to avoid detection.[1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
TrailBlazer has used HTTP requests for C2.[1] |
| Enterprise | T1001 | 数据混淆 |
TrailBlazer can masquerade its C2 traffic as legitimate Google Notifications HTTP requests.[1] |
|
| .001 | Junk Data |
TrailBlazer has used random identifier strings to obscure its C2 operations and result codes.[1] |
||
| ID | Name | Description |
|---|---|---|
| C0024 | SolarWinds Compromise |