Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Backdoor.Oldrea

Backdoor.Oldrea

Backdoor.Oldrea is a modular backdoor that used byDragonfly against energy companies since at least 2013.Backdoor.Oldrea was distributed via supply chain compromise, and included specialized modules to enumerate and map ICS-specific systems, processes, and protocols.[1][2][3]

ID: S0093
Associated Software: Havex
Type: MALWARE
Platforms: Windows
Version: 2.0
Created: 31 May 2017
Last Modified: 16 April 2025
Enterprise Layer
downloadview
ICS Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087.003Account Discovery:Email Account

Backdoor.Oldrea collects address book information from Outlook.[1]

EnterpriseT1560Archive Collected Data

Backdoor.Oldrea writes collected data to a temporary file in an encrypted form before exfiltration to a C2 server.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Backdoor.Oldrea adds Registry Run keys to achieve persistence.[1][2]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

SomeBackdoor.Oldrea samples contain a publicly available Web browser password recovery tool.[1]

EnterpriseT1132.001Data Encoding:Standard Encoding

SomeBackdoor.Oldrea samples use standard Base64 + bzip2, and some use standard Base64 + reverse XOR + RSA-2048 to decrypt data received from C2 servers.[1]

EnterpriseT1083File and Directory Discovery

Backdoor.Oldrea collects information about available drives, default browser, desktop file list, My Documents, Internet history, program files, and root of available drives. It also searches for ICS-related software files.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim.[1]

EnterpriseT1105Ingress Tool Transfer

Backdoor.Oldrea can download additional modules from C2.[2]

EnterpriseT1046Network Service Discovery

Backdoor.Oldrea can use a network scanning module to identify ICS-related ports.[2]

EnterpriseT1057Process Discovery

Backdoor.Oldrea collects information about running processes.[1]

EnterpriseT1055Process Injection

Backdoor.Oldrea injects itself into explorer.exe.[1][2]

EnterpriseT1018Remote System Discovery

Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments.[2]

EnterpriseT1218.011System Binary Proxy Execution:Rundll32

Backdoor.Oldrea can use rundll32 for execution on compromised hosts.[2]

EnterpriseT1082System Information Discovery

Backdoor.Oldrea collects information about the OS and computer name.[1][2]

EnterpriseT1016System Network Configuration Discovery

Backdoor.Oldrea collects information about the Internet adapter configuration.[1][2]

EnterpriseT1033System Owner/User Discovery

Backdoor.Oldrea collects the current username from the victim.[1]

ICST0802Automated Collection

Using OPC, a component ofBackdoor.Oldrea gathers any details about connected devices and sends them back to the C2 for the attackers to analyze.[4]

ICST0814Denial of Service

TheBackdoor.Oldrea payload has caused multiple common OPC platforms to intermittently crash. This could cause a denial of service effect on applications reliant on OPC communications.[5]

ICST0861Point & Tag Identification

TheBackdoor.Oldrea payload has the capability of enumerating OPC tags, in addition to more generic OPC server information. The server data and tag names can provide information about the names and function of control devices.[5][4]

ICST0846Remote System Discovery

TheBackdoor.Oldrea ICS malware plugin relies on Windows networking (WNet) to discover all the servers, including OPC servers, that are reachable by the compromised machine over the network.[6]

ICST0888Remote System Information Discovery

TheBackdoor.Oldrea payload gathers server information that includes CLSID, server name, Program ID, OPC version, vendor information, running state, group count, and server bandwidth. This information helps indicate the role the server has in the control process.[5][4]

ICST0865Spearphishing Attachment

TheBackdoor.Oldrea RAT is distributed through a trojanized installer attached to emails.[4]

ICST0862Supply Chain Compromise

TheBackdoor.Oldrea RAT is distributed through trojanized installers planted on compromised vendor sites.[4]

ICST0863User Execution

Execution ofBackdoor.Oldrea relies on a user opening a trojanized installer attached to an email.[4][7]

Groups That Use This Software

IDNameReferences
G0035Dragonfly

[1][2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp