NGLite is a backdoor Trojan that is only capable of running commands received through its C2 channel. While the capabilities are standard for a backdoor, NGLite uses a novel C2 channel that leverages a decentralized network based on the legitimate NKN to communicate between the backdoor and the actors.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | .003 | 代理: Multi-hop Proxy |
NGLite has abused NKN infrastructure for its C2 communication.[1] |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
NGLite will use an AES encrypted channel for command and control purposes, in one case using the key |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
NGLite will initially beacon out to the NKN network via an HTTP POST over TCP 30003.[1] |
| Enterprise | T1033 | 系统所有者/用户发现 |
NGLite will run the |
|
| Enterprise | T1016 | 系统网络配置发现 |
NGLite identifies the victim system MAC and IPv4 addresses and uses these to establish a victim identifier.[1] |
|