Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. CosmicDuke

CosmicDuke

CosmicDuke is malware that was used byAPT29 from 2010 to 2015.[1]

ID: S0050
Associated Software: TinyBaron, BotgenStudios, NemesisGemina
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 31 May 2017
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

CosmicDuke can use HTTP or HTTPS for command and control to hard-coded C2 servers.[1][2]

EnterpriseT1020Automated Exfiltration

CosmicDuke exfiltrates collected files automatically over FTP to remote servers.[2]

EnterpriseT1115Clipboard Data

CosmicDuke copies and exfiltrates the clipboard contents every 30 seconds.[2]

EnterpriseT1543.003Create or Modify System Process:Windows Service

CosmicDuke uses Windows services typically named "javamtsup" for persistence.[2]

EnterpriseT1555Credentials from Password Stores

CosmicDuke collects user credentials, including passwords, for various programs including popular instant messaging applications and email clients as well as WLAN keys.[1]

.003Credentials from Web Browsers

CosmicDuke collects user credentials, including passwords, for various programs including Web browsers.[1]

EnterpriseT1005Data from Local System

CosmicDuke steals user files from local hard drives with file extensions that match a predefined list.[2]

EnterpriseT1039Data from Network Shared Drive

CosmicDuke steals user files from network shared drives with file extensions and keywords that match a predefined list.[2]

EnterpriseT1025Data from Removable Media

CosmicDuke steals user files from removable media with file extensions and keywords that match a predefined list.[2]

EnterpriseT1114.001Email Collection:Local Email Collection

CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration.[2]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

CosmicDuke contains a custom version of the RC4 algorithm that includes a programming error.[2]

EnterpriseT1048.003Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol

CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers.[2]

EnterpriseT1068Exploitation for Privilege Escalation

CosmicDuke attempts to exploit privilege escalation vulnerabilities CVE-2010-0232 or CVE-2010-4398.[1]

EnterpriseT1083File and Directory Discovery

CosmicDuke searches attached and mounted drives for file extensions and keywords that match a predefined list.[2]

EnterpriseT1056.001Input Capture:Keylogging

CosmicDuke uses a keylogger.[1]

EnterpriseT1003.002OS Credential Dumping:Security Account Manager

CosmicDuke collects Windows account hashes.[1]

.004OS Credential Dumping:LSA Secrets

CosmicDuke collects LSA secrets.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

CosmicDuke uses scheduled tasks typically named "Watchmon Service" for persistence.[2]

EnterpriseT1113Screen Capture

CosmicDuke takes periodic screenshots and exfiltrates them.[2]

Groups That Use This Software

IDNameReferences
G0016APT29

[1][3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp