Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Daserf

Daserf

Daserf is a backdoor that has been used to spy on and steal from Japanese, South Korean, Russian, Singaporean, and Chinese victims. Researchers have identified versions written in both Visual C and Delphi.[1][2]

ID: S0187
Associated Software: Muirim, Nioupale
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 16 January 2018
Last Modified: 25 April 2025

Associated Software Descriptions

NameDescription
Muirim

[1]

Nioupale

[1]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Daserf uses HTTP for C2.[2]

EnterpriseT1560Archive Collected Data

Daserf hides collected data in password-protected .rar archives.[3]

.001Archive via Utility

Daserf hides collected data in password-protected .rar archives.[3]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Daserf can execute shell commands.[1][2]

EnterpriseT1132.001Data Encoding:Standard Encoding

Daserf uses custom base64 encoding to obfuscate HTTP traffic.[2]

EnterpriseT1001.002Data Obfuscation:Steganography

Daserf can use steganography to hide malicious code downloaded to the victim.[1]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

Daserf uses RC4 encryption to obfuscate HTTP traffic.[2]

EnterpriseT1105Ingress Tool Transfer

Daserf can download remote files.[1][2]

EnterpriseT1056.001Input Capture:Keylogging

Daserf can log keystrokes.[1][2]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

Daserf uses file and folder names related to legitimate programs in order to blend in, such as HP, Intel, Adobe, and perflogs.[3]

EnterpriseT1027Obfuscated Files or Information

Daserf uses encrypted Windows APIs and also encrypts data using the alternative base64+RC4 or the Caesar cipher.[1]

.002Software Packing

A version ofDaserf uses the MPRESS packer.[1]

.005Indicator Removal from Tools

Analysis ofDaserf has shown that it regularly undergoes technical improvements to evade anti-virus detection.[1]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

Daserf leveragesMimikatz andWindows Credential Editor to steal credentials.[3]

EnterpriseT1113Screen Capture

Daserf can take screenshots.[1][2]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

SomeDaserf samples were signed with a stolen digital certificate.[3]

Groups That Use This Software

IDNameReferences
G0060BRONZE BUTLER

[1][3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp