Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Ixeshe

Ixeshe

Ixeshe is a malware family that has been used since at least 2009 against targets in East Asia.[1]

ID: S0015
Type: MALWARE
Platforms: Windows
Version: 1.2
Created: 31 May 2017
Last Modified: 17 November 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Ixeshe uses HTTP for command and control.[1][2]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Ixeshe can achieve persistence by adding itself to theHKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key.[2]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Ixeshe is capable of executing commands viacmd.[2]

EnterpriseT1132.001Data Encoding:Standard Encoding

Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests.[1][2]

EnterpriseT1005Data from Local System

Ixeshe can collect data from a local system.[2]

EnterpriseT1083File and Directory Discovery

Ixeshe can list file and directory information.[2]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

Ixeshe sets its own executable file's attributes to hidden.[2]

EnterpriseT1070.004Indicator Removal:File Deletion

Ixeshe has a command to delete a file from the machine.[2]

EnterpriseT1105Ingress Tool Transfer

Ixeshe can download and execute additional files.[2]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

Ixeshe has used registry values and file names associated with Adobe software, such as AcroRd32.exe.[2]

EnterpriseT1057Process Discovery

Ixeshe can list running processes.[2]

EnterpriseT1082System Information Discovery

Ixeshe collects the computer name of the victim's system during the initial infection.[2]

EnterpriseT1016System Network Configuration Discovery

Ixeshe enumerates the IP address, network proxy settings, and domain name from a victim's system.[2]

EnterpriseT1033System Owner/User Discovery

Ixeshe collects the username from the victim’s machine.[2]

EnterpriseT1007System Service Discovery

Ixeshe can list running services.[2]

Groups That Use This Software

IDNameReferences
G0005APT12

[1][3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp