RotaJakiro is a 64-bit Linux backdoor used by APT32. First seen in 2018, it uses a plugin architecture to extend capabilities. RotaJakiro can determine it's permission level and execute according to access type (root or user).[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .004 | 事件触发执行: Unix Shell Configuration Modification |
When executing with non-root level permissions, RotaJakiro can install persistence by adding a command to the .bashrc file that executes a binary in the |
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
RotaJakiro has used the filename |
| Enterprise | T1129 | 共享模块 |
RotaJakiro uses dynamically linked shared libraries ( |
|
| Enterprise | T1543 | .002 | 创建或修改系统进程: Systemd Service |
Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
RotaJakiro encrypts C2 communication using a combination of AES, XOR, ROTATE encryption, and ZLIB compression.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
RotaJakiro uses the AES algorithm, bit shifts in a function called |
|
| Enterprise | T1037 | 启动或登录初始化脚本 |
Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a |
|
| Enterprise | T1547 | .013 | 启动或登录自动启动执行: XDG Autostart Entries |
When executing with user-level permissions, RotaJakiro can install persistence using a .desktop file under the |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
RotaJakiro uses ZLIB Compression to compresses data sent to the C2 server in the |
| Enterprise | T1106 | 本机API |
When executing with non-root permissions, RotaJakiro uses the the |
|
| Enterprise | T1082 | 系统信息发现 |
RotaJakiro executes a set of commands to collect device information, including |
|
| Enterprise | T1119 | 自动化收集 |
Depending on the Linux distribution, RotaJakiro executes a set of commands to collect device information and sends the collected information to the C2 server.[1] |
|
| Enterprise | T1057 | 进程发现 |
RotaJakiro can monitor the |
|
| Enterprise | T1559 | 进程间通信 |
When executing with non-root permissions, RotaJakiro uses the the |
|
| Enterprise | T1041 | 通过C2信道渗出 |
RotaJakiro sends device and other collected data back to the C2 using the established C2 channels over TCP. [1] |
|
| Enterprise | T1095 | 非应用层协议 |
RotaJakiro uses a custom binary protocol using a type, length, value format over TCP.[2] |
|
| Enterprise | T1571 | 非标准端口 |
RotaJakiro uses a custom binary protocol over TCP port 443.[2] |
|