Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. Tropic Trooper

Tropic Trooper

Tropic Trooper is an unaffiliated threat group that has led targeted campaigns against targets in Taiwan, the Philippines, and Hong Kong.Tropic Trooper focuses on targeting government, healthcare, transportation, and high-tech industries and has been active since 2011.[1][2][3]

ID: G0081
Associated Groups: Pirate Panda, KeyBoy
Contributors: Edward Millington
Version: 1.6
Created: 29 January 2019
Last Modified: 21 October 2025

Associated Group Descriptions

NameDescription
Pirate Panda

[4]

KeyBoy

[2][1]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Tropic Trooper has used HTTP in communication with the C2.[5][3]

.004Application Layer Protocol:DNS

Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol.[3]

EnterpriseT1119Automated Collection

Tropic Trooper has collected information automatically using the adversary'sUSBferry attack.[3]

EnterpriseT1020Automated Exfiltration

Tropic Trooper has used a copy function to automatically exfiltrate sensitive data from air-gapped systems using USB storage.[3]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Tropic Trooper has created shortcuts in the Startup folder to establish persistence.[5][3]

.004Boot or Logon Autostart Execution:Winlogon Helper DLL

Tropic Trooper has created the Registry keyHKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell and sets the value to establish persistence.[2][3]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Tropic Trooper has used Windows command scripts.[3]

EnterpriseT1543.003Create or Modify System Process:Windows Service

Tropic Trooper has installed a service pointing to a malicious DLL dropped to disk.[6]

EnterpriseT1132.001Data Encoding:Standard Encoding

Tropic Trooper has used base64 encoding to hide command strings delivered from the C2.[3]

EnterpriseT1140Deobfuscate/Decode Files or Information

Tropic Trooper used shellcode with an XOR algorithm to decrypt a payload.Tropic Trooper also decrypted image files which contained a payload.[2][3]

EnterpriseT1573Encrypted Channel

Tropic Trooper has encrypted traffic with the C2 to prevent network detection.[3]

.002Asymmetric Cryptography

Tropic Trooper has used SSL to connect to C2 servers.[1][3]

EnterpriseT1052.001Exfiltration Over Physical Medium:Exfiltration over USB

Tropic Trooper has exfiltrated data using USB storage devices.[3]

EnterpriseT1203Exploitation for Client Execution

Tropic Trooper has executed commands through Microsoft security vulnerabilities, including CVE-2017-11882, CVE-2018-0802, and CVE-2012-0158.[1][2]

EnterpriseT1083File and Directory Discovery

Tropic Trooper has monitored files' modified time.[3]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

Tropic Trooper has created a hidden directory underC:\ProgramData\Apple\Updates\ andC:\Users\Public\Documents\Flash\.[1][3]

EnterpriseT1574.001Hijack Execution Flow:DLL

Tropic Trooper has been known to side-load DLLs using a valid version of a Windows Address Book and Windows Defender executable with one of their tools.[7][5]

EnterpriseT1070.004Indicator Removal:File Deletion

Tropic Trooper has deleted dropper files on an infected system using command scripts.[3]

EnterpriseT1105Ingress Tool Transfer

Tropic Trooper has used a delivered trojan to download additional files.[3]

EnterpriseT1680Local Storage Discovery

Tropic Trooper has detected a target system’s system volume information.[8][3]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

Tropic Trooper has hidden payloads in Flash directories and fake installer files.[3]

EnterpriseT1106Native API

Tropic Trooper has used multiple Windows APIs including HttpInitialize, HttpCreateHttpHandle, and HttpAddUrl.[3]

EnterpriseT1046Network Service Discovery

Tropic Trooper usedpr and an openly available tool to scan for open ports on target systems.[8][3]

EnterpriseT1135Network Share Discovery

Tropic Trooper usednetview to scan target systems for shared resources.[8]

EnterpriseT1027.003Obfuscated Files or Information:Steganography

Tropic Trooper has used JPG files with encrypted payloads to mask their backdoor routines and evade detection.[3]

.013Obfuscated Files or Information:Encrypted/Encoded File

Tropic Trooper has encrypted configuration files.[1][3]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.[2][8][9][5][3]

EnterpriseT1057Process Discovery

Tropic Trooper is capable of enumerating the running processes on the system usingpslist.[2][3]

EnterpriseT1055.001Process Injection:Dynamic-link Library Injection

Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe.[1][3]

EnterpriseT1091Replication Through Removable Media

Tropic Trooper has attempted to transferUSBferry from an infected USB device by copying an Autorun function to the target machine.[3]

EnterpriseT1505.003Server Software Component:Web Shell

Tropic Trooper has started a web service in the target host and wait for the adversary to connect, acting as a web shell.[3]

EnterpriseT1518Software Discovery

Tropic Trooper's backdoor could list the infected system's installed software.[3]

.001Security Software Discovery

Tropic Trooper can search for anti-virus software running on the system.[2]

EnterpriseT1082System Information Discovery

Tropic Trooper has detected a target system’s OS version.[8][3]

EnterpriseT1016System Network Configuration Discovery

Tropic Trooper has used scripts to collect the host's network topology.[3]

EnterpriseT1049System Network Connections Discovery

Tropic Trooper has tested if the localhost network is available and other connection capability on an infected system using command scripts.[3]

EnterpriseT1033System Owner/User Discovery

Tropic Trooper usedletmein to scan for saved usernames on the target system.[8]

EnterpriseT1221Template Injection

Tropic Trooper delivered malicious documents with the XLSX extension, typically used by OpenXML documents, but the file itself was actually an OLE (XLS) document.[2]

EnterpriseT1204.002User Execution:Malicious File

Tropic Trooper has lured victims into executing malware via malicious e-mail attachments.[5]

EnterpriseT1078.003Valid Accounts:Local Accounts

Tropic Trooper has used known administrator account credentials to execute the backdoor directly.[3]

Software

IDNameReferencesTechniques
S0190BITSAdmin[1]BITS Jobs,Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,Ingress Tool Transfer,Lateral Tool Transfer
S0387KeyBoy[2][9]Boot or Logon Autostart Execution:Winlogon Helper DLL,Command and Scripting Interpreter:Python,Command and Scripting Interpreter:Visual Basic,Command and Scripting Interpreter:PowerShell,Command and Scripting Interpreter:Windows Command Shell,Create or Modify System Process:Windows Service,Credentials from Password Stores:Credentials from Web Browsers,Data Obfuscation:Protocol or Service Impersonation,File and Directory Discovery,Hide Artifacts:Hidden Window,Indicator Removal:Timestomp,Ingress Tool Transfer,Input Capture:Keylogging,Inter-Process Communication:Dynamic Data Exchange,Obfuscated Files or Information:Encrypted/Encoded File,Screen Capture,System Information Discovery,System Network Configuration Discovery
S0012PoisonIvy[2]Application Window Discovery,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Boot or Logon Autostart Execution:Active Setup,Command and Scripting Interpreter:Windows Command Shell,Create or Modify System Process:Windows Service,Data from Local System,Data Staged:Local Data Staging,Encrypted Channel:Symmetric Cryptography,Execution Guardrails:Mutual Exclusion,Ingress Tool Transfer,Input Capture:Keylogging,Modify Registry,Obfuscated Files or Information,Process Injection:Dynamic-link Library Injection,Rootkit
S0596ShadowPad[10]Application Layer Protocol:DNS,Application Layer Protocol:File Transfer Protocols,Application Layer Protocol:Web Protocols,Data Encoding:Non-Standard Encoding,Deobfuscate/Decode Files or Information,Dynamic Resolution:Domain Generation Algorithms,Indicator Removal,Ingress Tool Transfer,Local Storage Discovery,Modify Registry,Non-Application Layer Protocol,Obfuscated Files or Information:Fileless Storage,Obfuscated Files or Information,Process Discovery,Process Injection,Process Injection:Dynamic-link Library Injection,Scheduled Transfer,System Information Discovery,System Network Configuration Discovery,System Owner/User Discovery,System Time Discovery
S0452USBferry[3]Account Discovery:Local Account,Command and Scripting Interpreter:Windows Command Shell,Data from Local System,File and Directory Discovery,Peripheral Device Discovery,Process Discovery,Remote System Discovery,Replication Through Removable Media,System Binary Proxy Execution:Rundll32,System Network Configuration Discovery,System Network Connections Discovery
S0388YAHOYAH[8]Application Layer Protocol:Web Protocols,Deobfuscate/Decode Files or Information,Ingress Tool Transfer,Obfuscated Files or Information:Encrypted/Encoded File,Software Discovery:Security Software Discovery,System Information Discovery

References

×

[8]ページ先頭

©2009-2026 Movatter.jp