Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. ShimRatReporter

ShimRatReporter

ShimRatReporter is a tool used by suspected Chinese adversaryMofang to automatically conduct initial discovery. The details from this discovery are used to customize follow-on payloads (such asShimRat) as well as set up faux infrastructure which mimics the adversary's targets.ShimRatReporter has been used in campaigns targeting multiple countries and sectors including government, military, critical infrastructure, automobile, and weapons development.[1]

ID: S0445
Type: TOOL
Platforms: Windows
Version: 1.0
Created: 12 May 2020
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087Account Discovery

ShimRatReporter listed all non-privileged and privileged accounts available on the machine.[1]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

ShimRatReporter communicated over HTTP with preconfigured C2 servers.[1]

EnterpriseT1560Archive Collected Data

ShimRatReporter used LZ compression to compress initial reconnaissance reports before sending to the C2.[1]

EnterpriseT1119Automated Collection

ShimRatReporter gathered information automatically, without instruction from a C2, related to the user and host machine that is compiled into a report and sent to the operators.[1]

EnterpriseT1020Automated Exfiltration

ShimRatReporter sent collected system and network information compiled into a report to an adversary-controlled C2.[1]

EnterpriseT1041Exfiltration Over C2 Channel

ShimRatReporter sent generated reports to the C2 via HTTP POST requests.[1]

EnterpriseT1105Ingress Tool Transfer

ShimRatReporter had the ability to download additional payloads.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

ShimRatReporter spoofed itself asAlphaZawgyl_font.exe, a specialized Unicode font.[1]

EnterpriseT1106Native API

ShimRatReporter used several Windows API functions to gather information from the infected system.[1]

EnterpriseT1027Obfuscated Files or Information

ShimRatReporter encrypted gathered information with a combination of shifting and XOR using a static key.[1]

EnterpriseT1069Permission Groups Discovery

ShimRatReporter gathered the local privileges for the infected host.[1]

EnterpriseT1057Process Discovery

ShimRatReporter listed all running processes on the machine.[1]

EnterpriseT1518Software Discovery

ShimRatReporter gathered a list of installed software on the infected host.[1]

EnterpriseT1082System Information Discovery

ShimRatReporter gathered the operating system name and specific Windows version of an infected machine.[1]

EnterpriseT1016System Network Configuration Discovery

ShimRatReporter gathered the local proxy, domain, IP, routing tables, mac address, gateway, DNS servers, and DHCP status information from an infected host.[1]

EnterpriseT1049System Network Connections Discovery

ShimRatReporter used the Windows functionGetExtendedUdpTable to detect connected UDP endpoints.[1]

Groups That Use This Software

IDNameReferences
G0103Mofang

References

×

[8]ページ先頭

©2009-2026 Movatter.jp