Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. AppleSeed

AppleSeed

AppleSeed is a backdoor that has been used byKimsuky to target South Korean government, academic, and commercial targets since at least 2021.[1]

ID: S0622
Type: MALWARE
Platforms: Windows, Android
Version: 1.1
Created: 10 June 2021
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1134Access Token Manipulation

AppleSeed can gain system level privilege by passingSeDebugPrivilege to theAdjustTokenPrivilege API.[1]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

AppleSeed has the ability to communicate with C2 over HTTP.[1][2]

EnterpriseT1560Archive Collected Data

AppleSeed has compressed collected data before exfiltration.[2]

.001Archive via Utility

AppleSeed can zip and encrypt data collected on a target system.[1]

EnterpriseT1119Automated Collection

AppleSeed has automatically collected data from USB drives, keystrokes, and screen images before exfiltration.[2]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

AppleSeed has the ability to create the Registry key nameEstsoftAutoUpdate atHKCU\Software\Microsoft/Windows\CurrentVersion\RunOnce to establish persistence.[1]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

AppleSeed has the ability to execute its payload via PowerShell.[1]

.007Command and Scripting Interpreter:JavaScript

AppleSeed has the ability to use JavaScript to execute PowerShell.[1]

EnterpriseT1005Data from Local System

AppleSeed can collect data on a compromised host.[1][2]

EnterpriseT1025Data from Removable Media

AppleSeed can find and collect data from removable media devices.[1][2]

EnterpriseT1074.001Data Staged:Local Data Staging

AppleSeed can stage files in a central location prior to exfiltration.[1]

EnterpriseT1030Data Transfer Size Limits

AppleSeed has divided files if the size is 0x1000000 bytes or more.[2]

EnterpriseT1140Deobfuscate/Decode Files or Information

AppleSeed can decode its payload prior to execution.[1]

EnterpriseT1041Exfiltration Over C2 Channel

AppleSeed can exfiltrate files via the C2 channel.[1]

EnterpriseT1567Exfiltration Over Web Service

AppleSeed has exfiltrated files using web services.[2]

EnterpriseT1008Fallback Channels

AppleSeed can use a second channel for C2 when the primary channel is in upload mode.[1]

EnterpriseT1083File and Directory Discovery

AppleSeed has the ability to search for .txt, .ppt, .hwp, .pdf, and .doc files in specified directories.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

AppleSeed can delete files from a compromised host after they are exfiltrated.[1]

EnterpriseT1056.001Input Capture:Keylogging

AppleSeed can useGetKeyState andGetKeyboardState to capture keystrokes on the victim’s machine.[1][2]

EnterpriseT1036Masquerading

AppleSeed can disguise JavaScript files as PDFs.[1]

.005Match Legitimate Resource Name or Location

AppleSeed has the ability to rename its payload to ESTCommon.dll to masquerade as a DLL belonging to ESTsecurity.[1]

EnterpriseT1106Native API

AppleSeed has the ability to use multiple dynamically resolved API calls.[1]

EnterpriseT1027Obfuscated Files or Information

AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls.[1]

.002Software Packing

AppleSeed has used UPX packers for its payload DLL.[1]

EnterpriseT1566.001Phishing:Spearphishing Attachment

AppleSeed has been distributed to victims through malicious e-mail attachments.[1]

EnterpriseT1057Process Discovery

AppleSeed can enumerate the current process on a compromised host.[1]

EnterpriseT1113Screen Capture

AppleSeed can take screenshots on a compromised host by calling a series of APIs.[1][2]

EnterpriseT1218.010System Binary Proxy Execution:Regsvr32

AppleSeed can call regsvr32.exe for execution.[1]

EnterpriseT1082System Information Discovery

AppleSeed can identify the OS version of a targeted system.[1]

EnterpriseT1016System Network Configuration Discovery

AppleSeed can identify the IP of a targeted system.[1]

EnterpriseT1124System Time Discovery

AppleSeed can pull a timestamp from the victim's machine.[1]

EnterpriseT1204.002User Execution:Malicious File

AppleSeed can achieve execution through users running malicious file attachments distributed via email.[1]

Groups That Use This Software

IDNameReferences
G0094Kimsuky

[1][2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp