Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. HotCroissant

HotCroissant

HotCroissant is a remote access trojan (RAT) attributed by U.S. government entities to malicious North Korean government cyber activity, tracked collectively as HIDDEN COBRA.[1]HotCroissant shares numerous code similarities withRifdoor.[2]

ID: S0431
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 01 May 2020
Last Modified: 11 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1010Application Window Discovery

HotCroissant has the ability to list the names of all open windows on the infected host.[2]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

HotCroissant can remotely open applications on the infected host with theShellExecuteA command.[2]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

HotCroissant has compressed network communications and encrypted them with a custom stream cipher.[2][1]

EnterpriseT1041Exfiltration Over C2 Channel

HotCroissant has the ability to download files from the infected host to the command and control (C2) server.[2]

EnterpriseT1083File and Directory Discovery

HotCroissant has the ability to retrieve a list of files in a given directory as well as drives and drive types.[2]

EnterpriseT1564.003Hide Artifacts:Hidden Window

HotCroissant has the ability to hide the window for operations performed on a given file.[2]

EnterpriseT1070.004Indicator Removal:File Deletion

HotCroissant has the ability to clean up installed files, delete files, and delete itself from the victim’s machine.[2]

EnterpriseT1105Ingress Tool Transfer

HotCroissant has the ability to upload a file from the command and control (C2) server to the victim machine.[2]

EnterpriseT1106Native API

HotCroissant can perform dynamic DLL importing and API lookups usingLoadLibrary andGetProcAddress on obfuscated strings.[1]

EnterpriseT1027.002Obfuscated Files or Information:Software Packing

HotCroissant has used the open source UPX executable packer.[2]

.013Obfuscated Files or Information:Encrypted/Encoded File

HotCroissant has encrypted strings with single-byte XOR and base64 encoded RC4.[2]

EnterpriseT1057Process Discovery

HotCroissant has the ability to list running processes on the infected host.[2]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

HotCroissant has attempted to install a scheduled task named "Java Maintenance64" on startup to establish persistence.[2]

EnterpriseT1113Screen Capture

HotCroissant has the ability to do real time screen viewing on an infected host.[2]

EnterpriseT1489Service Stop

HotCroissant has the ability to stop services on the infected host.[2]

EnterpriseT1518Software Discovery

HotCroissant can retrieve a list of applications from theSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths registry key.[2]

EnterpriseT1082System Information Discovery

HotCroissant has the ability to determine if the current user is an administrator, Windows product name, processor name, screen resolution, and physical RAM of the infected host.[1]

EnterpriseT1016System Network Configuration Discovery

HotCroissant has the ability to identify the IP address of the compromised machine.[1]

EnterpriseT1033System Owner/User Discovery

HotCroissant has the ability to collect the username on the infected host.[2]

EnterpriseT1007System Service Discovery

HotCroissant has the ability to retrieve a list of services on the infected host.[2]

Groups That Use This Software

IDNameReferences
G0032Lazarus Group

[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp