Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. GoldenSpy

GoldenSpy

GoldenSpy is a backdoor malware which has been packaged with legitimate tax preparation software.GoldenSpy was discovered targeting organizations in China, being delivered with the "Intelligent Tax" software suite which is produced by the Golden Tax Department of Aisino Credit Information Co. and required to pay local taxes.[1]

ID: S0493
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 23 July 2020
Last Modified: 11 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

GoldenSpy has used the Ryeol HTTP Client to facilitate HTTP internet communication.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

GoldenSpy can execute remote commands via the command-line interface.[1]

EnterpriseT1136.001Create Account:Local Account

GoldenSpy can create new users on an infected system.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

GoldenSpy has established persistence by running in the background as an autostart service.[1]

EnterpriseT1041Exfiltration Over C2 Channel

GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.[1]

EnterpriseT1083File and Directory Discovery

GoldenSpy has included a program "ExeProtector", which monitors for the existence ofGoldenSpy on the infected system and redownloads if necessary.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

GoldenSpy's uninstaller can delete registry entries, files and folders, and finally itself once these tasks have been completed.[2]

EnterpriseT1105Ingress Tool Transfer

GoldenSpy constantly attempts to download and execute files from the remote C2, includingGoldenSpy itself if not found on the system.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

GoldenSpy's setup file installs initial executables under the folder%WinDir%\System32\PluginManager.[1]

EnterpriseT1106Native API

GoldenSpy can execute remote commands in the Windows command shell using theWinExec() API.[1]

EnterpriseT1571Non-Standard Port

GoldenSpy has used HTTP over ports 9005 and 9006 for network traffic, 9002 for C2 requests, 33666 as a WebSocket, and 8090 to download files.[1]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

GoldenSpy's uninstaller has base64-encoded its variables.[2]

EnterpriseT1195.002Supply Chain Compromise:Compromise Software Supply Chain

GoldenSpy has been packaged with a legitimate tax preparation software.[1]

EnterpriseT1082System Information Discovery

GoldenSpy has gathered operating system information.[1]

EnterpriseT1497.003Virtualization/Sandbox Evasion:Time Based Checks

GoldenSpy's installer has delayed installation ofGoldenSpy for two hours after it reaches a victim system.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp