IPsec Helper is a post-exploitation remote access tool linked to Agrius operations. This malware shares significant programming and functional overlaps with Apostle ransomware, also linked to Agrius. IPsec Helper provides basic remote access tool functionality such as uploading files from victim systems, running commands, and deploying additional payloads.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
IPsec Helper can identify specific files and folders for follow-on exfiltration.[1] |
|
| Enterprise | T1112 | 修改注册表 |
IPsec Helper can make arbitrary changes to registry keys based on provided input.[1] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
IPsec Helper can run arbitrary PowerShell commands passed to it.[1] |
| .003 | 命令与脚本解释器: Windows Command Shell |
IPsec Helper can run arbitrary commands passed to it through |
||
| .005 | 命令与脚本解释器: Visual Basic |
IPsec Helper can run arbitrary Visual Basic scripts and commands passed to it.[1] |
||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
IPsec Helper connects to command and control servers via HTTP POST requests based on parameters hard-coded into the malware.[1] |
| Enterprise | T1570 | 横向工具传输 |
IPsec Helper can download additional payloads from command and control nodes and execute them.[1] |
|
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File |
IPsec Helper contains an embedded XML configuration file with an encrypted list of command and control servers. These are written to an external configuration file during execution.[1] |
| Enterprise | T1070 | 移除指标 |
IPsec Helper can delete various registry keys related to its execution and use.[1] |
|
| .004 | File Deletion |
IPsec Helper can delete itself when given the appropriate command.[1] |
||
| .009 | Clear Persistence |
IPsec Helper can delete various service traces related to persistent execution when commanded.[1] |
||
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
IPsec Helper is run as a Windows service in victim environments.[1] |
| Enterprise | T1497 | .003 | 虚拟化/沙盒规避: Time Based Evasion |
IPsec Helper will sleep for a random number of seconds, iterating 200 times over sleeps between one to three seconds, before continuing execution flow.[1] |
| Enterprise | T1057 | 进程发现 |
IPsec Helper can identify the process it is currently running under and its number, and pass this back to a command and control node.[1] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
IPsec Helper exfiltrates specific files through its command and control framework.[1] |
|
| ID | Name | References |
|---|---|---|
| G1030 | Agrius |
Agrius uses IPsec Helper as a post-exploitation remote access tool framework.[1] |