Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. DropBook

DropBook

DropBook is a Python-based backdoor compiled with PyInstaller.[1]

ID: S0547
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 22 December 2020
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

DropBook can execute arbitrary shell commands on the victims' machines.[1][2]

.006Command and Scripting Interpreter:Python

DropBook is a Python-based backdoor compiled with PyInstaller.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

DropBook can unarchive data downloaded from the C2 to obtain the payload and persistence modules.[1]

EnterpriseT1567Exfiltration Over Web Service

DropBook has used legitimate web services to exfiltrate data.[2]

EnterpriseT1083File and Directory Discovery

DropBook can collect the names of all files and folders in the Program Files directories.[1][2]

EnterpriseT1105Ingress Tool Transfer

DropBook can download and execute additional files.[1][2]

EnterpriseT1082System Information Discovery

DropBook has checked for the presence of Arabic language in the infected machine's settings.[1]

EnterpriseT1614.001System Location Discovery:System Language Discovery

DropBook has checked for the presence of Arabic language in the infected machine's settings.[2]

EnterpriseT1102Web Service

DropBook can communicate with its operators by exploiting the Simplenote, DropBox, and the social media platform, Facebook, where it can create fake accounts to control the backdoor and receive instructions.[1][2]

Groups That Use This Software

IDNameReferences
G0021Molerats

[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp