Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. ZLib

ZLib

ZLib is a full-featured backdoor that was used as a second-stage implant duringOperation Dust Storm since at least 2014.ZLib is malware and should not be confused with the legitimate compression library from which its name is derived.[1]

ID: S0086
Type: MALWARE
Platforms: Windows
Version: 1.2
Created: 31 May 2017
Last Modified: 16 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

ZLib communicates over HTTP for C2.[1]

EnterpriseT1560.002Archive Collected Data:Archive via Library

TheZLib backdoor compresses communications using the standard Zlib compression library.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

ZLib has the ability to execute shell commands.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

ZLib creates Registry keys to allow itself to run as various services.[1]

EnterpriseT1041Exfiltration Over C2 Channel

ZLib has sent data and files from a compromised host to its C2 servers.[1]

EnterpriseT1083File and Directory Discovery

ZLib has the ability to enumerate files and drives.[1]

EnterpriseT1105Ingress Tool Transfer

ZLib has the ability to download files.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

ZLib mimics the resource version information of legitimate Realtek Semiconductor, Nvidia, or Synaptics modules.[1]

EnterpriseT1113Screen Capture

ZLib has the ability to obtain screenshots of the compromised system.[1]

EnterpriseT1082System Information Discovery

ZLib has the ability to enumerate system information.[1]

EnterpriseT1007System Service Discovery

ZLib has the ability to discover and manipulate Windows services.[1]

Campaigns

References

×

[8]ページ先頭

©2009-2026 Movatter.jp