Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. TYPEFRAME

TYPEFRAME

TYPEFRAME is a remote access tool that has been used byLazarus Group.[1]

ID: S0263
Type: MALWARE
Platforms: Windows
Version: 1.3
Created: 17 October 2018
Last Modified: 10 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

TYPEFRAME can uninstall malware components using a batch script.[1]TYPEFRAME can execute commands using a shell.[1]

.005Command and Scripting Interpreter:Visual Basic

TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

TYPEFRAME variants can add malicious DLL modules as new services.TYPEFRAME can also delete services from the victim’s machine.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

OneTYPEFRAME variant decrypts an archive using an RC4 key, then decompresses and installs the decrypted malicious DLL module. Another variant decodes the embedded file by XORing it with the value "0x35".[1]

EnterpriseT1083File and Directory Discovery

TYPEFRAME can search directories for files on the victim’s machine.[1]

EnterpriseT1562.004Impair Defenses:Disable or Modify System Firewall

TYPEFRAME can open the Windows Firewall on the victim’s machine to allow incoming connections.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

TYPEFRAME can delete files off the system.[1]

EnterpriseT1105Ingress Tool Transfer

TYPEFRAME can upload and download files to the victim’s machine.[1]

EnterpriseT1680Local Storage Discovery

TYPEFRAME can gather the disk volume information.[1]

EnterpriseT1112Modify Registry

TYPEFRAME can install encrypted configuration data under the Registry keyHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellCompatibility\Applications\laxhost.dll andHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrintConfigs.[1]

EnterpriseT1571Non-Standard Port

TYPEFRAME has used ports 443, 8080, and 8443 with a FakeTLS method.[1]

EnterpriseT1027.011Obfuscated Files or Information:Fileless Storage

TYPEFRAME can install and store encrypted configuration data under the Registry keyHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellCompatibility\Applications\laxhost.dll andHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrintConfigs.[1]

.013Obfuscated Files or Information:Encrypted/Encoded File

APIs and strings in someTYPEFRAME variants are RC4 encrypted. Another variant is encoded with XOR.[1]

EnterpriseT1090Proxy

ATYPEFRAME variant can force the compromised system to function as a proxy server.[1]

EnterpriseT1204.002User Execution:Malicious File

A Word document deliveringTYPEFRAME prompts the user to enable macro execution.[1]

Groups That Use This Software

IDNameReferences
G0032Lazarus Group

[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp