USBferry is an information stealing malware and has been used byTropic Trooper in targeted attacks against Taiwanese and Philippine air-gapped military environments.USBferry shares an overlapping codebase withYAHOYAH, though it has several features which makes it a distinct piece of malware.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1087 | .001 | Account Discovery:Local Account | USBferry can use |
| Enterprise | T1059 | .003 | Command and Scripting Interpreter:Windows Command Shell | |
| Enterprise | T1005 | Data from Local System | USBferry can collect information from an air-gapped host machine.[1] | |
| Enterprise | T1083 | File and Directory Discovery | ||
| Enterprise | T1120 | Peripheral Device Discovery | ||
| Enterprise | T1057 | Process Discovery | USBferry can use | |
| Enterprise | T1018 | Remote System Discovery | USBferry can use | |
| Enterprise | T1091 | Replication Through Removable Media | USBferry can copy its installer to attached USB storage devices.[1] | |
| Enterprise | T1218 | .011 | System Binary Proxy Execution:Rundll32 | USBferry can execute rundll32.exe in memory to avoid detection.[1] |
| Enterprise | T1016 | System Network Configuration Discovery | USBferry can detect the infected machine's network topology using | |
| Enterprise | T1049 | System Network Connections Discovery | USBferry can use | |
| ID | Name | References |
|---|---|---|
| G0081 | Tropic Trooper |