Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Astaroth

Astaroth

Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017.[1][2][3]

ID: S0373
Associated Software: Guildma
Type: MALWARE
Platforms: Windows
Contributors: Carlos Borges, @huntingneo, CIP
Version: 2.3
Created: 17 April 2019
Last Modified: 25 September 2024

Associated Software Descriptions

NameDescription
Guildma

[3]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Astaroth creates a startup item for persistence.[2]

.009Boot or Logon Autostart Execution:Shortcut Modification

Astaroth's initial payload is a malicious .LNK file.[2][1]

EnterpriseT1115Clipboard Data

Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Astaroth spawns a CMD process to execute commands.[1]

.005Command and Scripting Interpreter:Visual Basic

Astaroth has used malicious VBS e-mail attachments for execution.[3]

.007Command and Scripting Interpreter:JavaScript

Astaroth uses JavaScript to perform its core functionalities.[2][3]

EnterpriseT1555Credentials from Password Stores

Astaroth uses an external software known as NetPass to recover passwords.[1]

EnterpriseT1132.001Data Encoding:Standard Encoding

Astaroth encodes data using Base64 before sending it to the C2 server.[2]

EnterpriseT1074.001Data Staged:Local Data Staging

Astaroth collects data in a plaintext file named r1.log before exfiltration.[2]

EnterpriseT1140Deobfuscate/Decode Files or Information

Astaroth uses a fromCharCode() deobfuscation method to avoid explicitly writing execution commands and to hide its code.[1][3]

EnterpriseT1568.002Dynamic Resolution:Domain Generation Algorithms

Astaroth has used a DGA in C2 communications.[1]

EnterpriseT1041Exfiltration Over C2 Channel

Astaroth exfiltrates collected information from its r1.log file to the external C2 server.[1]

EnterpriseT1564.003Hide Artifacts:Hidden Window

Astaroth loads its module with the XSL script parametervShow set to zero, which opens the application with a hidden window.[1]

.004Hide Artifacts:NTFS File Attributes

Astaroth can abuse alternate data streams (ADS) to store content for malicious payloads.[3]

EnterpriseT1574.001Hijack Execution Flow:DLL

Astaroth can launch itself via DLL Search Order Hijacking.[3]

EnterpriseT1105Ingress Tool Transfer

Astaroth usescertutil andBITSAdmin to download additional malware.[2][1][3]

EnterpriseT1056.001Input Capture:Keylogging

Astaroth logs keystrokes from the victim's machine.[2]

EnterpriseT1027.002Obfuscated Files or Information:Software Packing

Astaroth uses a software packer called Pe123\RPolyCryptor.[1]

.010Obfuscated Files or Information:Command Obfuscation

Astaroth has obfuscated and randomized parts of the JScript code it is initiating.[1]

.013Obfuscated Files or Information:Encrypted/Encoded File

Astaroth has used an XOR-based algorithm to encrypt payloads twice with different keys.[3]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Astaroth has been delivered via malicious e-mail attachments.[3]

EnterpriseT1057Process Discovery

Astaroth searches for different processes on the system.[1]

EnterpriseT1055.012Process Injection:Process Hollowing

Astaroth can create a new process in a suspended state from a targeted legitimate process in order to unmap its memory and replace it with malicious code.[1][3]

EnterpriseT1129Shared Modules

Astaroth uses the LoadLibraryExW() function to load additional modules.[1]

EnterpriseT1518.001Software Discovery:Security Software Discovery

Astaroth checks for the presence of Avast antivirus in theC:\Program\Files\ folder.[2]

EnterpriseT1218.001System Binary Proxy Execution:Compiled HTML File

Astaroth uses ActiveX objects for file execution and manipulation.[2]

.010System Binary Proxy Execution:Regsvr32

Astaroth can be loaded through regsvr32.exe.[1]

EnterpriseT1082System Information Discovery

Astaroth collects the machine name and keyboard language from the system.[2][1]

EnterpriseT1016System Network Configuration Discovery

Astaroth collects the external IP address from the system.[2]

EnterpriseT1124System Time Discovery

Astaroth collects the timestamp from the infected machine.[2]

EnterpriseT1552Unsecured Credentials

Astaroth uses an external software known as NetPass to recover passwords.[1]

EnterpriseT1204.002User Execution:Malicious File

Astaroth has used malicious files including VBS, LNK, and HTML for execution.[3]

EnterpriseT1497.001Virtualization/Sandbox Evasion:System Checks

Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments.[3]

EnterpriseT1102.001Web Service:Dead Drop Resolver

Astaroth can store C2 information on cloud hosting services such as AWS and CloudFlare and websites like YouTube and Facebook.[3]

EnterpriseT1047Windows Management Instrumentation

Astaroth uses WMIC to execute payloads.[2]

EnterpriseT1220XSL Script Processing

Astaroth executes embedded JScript or VBScript in an XSL stylesheet located on a remote domain.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp