Green Lambert is a modular backdoor that security researchers assess has been used by an advanced threat group referred to as Longhorn and The Lamberts. First reported in 2017, the Windows variant of Green Lambert may have been used as early as 2008; a macOS version was uploaded to a multiscanner service in September 2014.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .004 | 事件触发执行: Unix Shell Configuration Modification |
Green Lambert can establish persistence on a compromised host through modifying the |
| Enterprise | T1555 | .001 | 从密码存储中获取凭证: Keychain |
Green Lambert can use Keychain Services API functions to find and collect passwords, such as |
| Enterprise | T1005 | 从本地系统获取数据 |
Green Lambert can collect data from a compromised host.[2] |
|
| Enterprise | T1090 | 代理 |
Green Lambert can use proxies for C2 traffic.[2][3] |
|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
Green Lambert has created a new executable named |
| .005 | 伪装: Match Legitimate Name or Location |
Green Lambert has been disguised as a Growl help file.[2][3] |
||
| Enterprise | T1543 | .001 | 创建或修改系统进程: Launch Agent |
Green Lambert can create a Launch Agent with the |
| .004 | 创建或修改系统进程: Launch Daemon |
Green Lambert can add a plist file in the |
||
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Green Lambert can use multiple custom routines to decrypt strings prior to execution.[2][3] |
|
| Enterprise | T1037 | .004 | 启动或登录初始化脚本: RC Scripts |
Green Lambert can add |
| Enterprise | T1547 | .015 | 启动或登录自动启动执行: Login Items |
Green Lambert can add Login Items to establish persistence.[2][3] |
| Enterprise | T1059 | .004 | 命令与脚本解释器: Unix Shell |
Green Lambert can use shell scripts for execution, such as |
| Enterprise | T1071 | .004 | 应用层协议: DNS |
Green Lambert can use DNS for C2 communications.[2][3] |
| Enterprise | T1027 | 混淆文件或信息 |
Green Lambert has encrypted strings.[2][3] |
|
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Green Lambert can delete the original executable after initial installation in addition to unused functions.[2][3] |
| Enterprise | T1082 | 系统信息发现 |
Green Lambert can use |
|
| Enterprise | T1124 | 系统时间发现 |
Green Lambert can collect the date and time from a compromised host.[2][3] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Green Lambert can obtain proxy information from a victim's machine using system environment variables.[2][3] |
|