Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. NativeZone

NativeZone

NativeZone is the name given collectively to disposable customCobalt Strike loaders used byAPT29 since at least 2021.[1][2]

ID: S0637
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 04 August 2021
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1140Deobfuscate/Decode Files or Information

NativeZone can decrypt and decode embeddedCobalt Strike beacon stage shellcode.[1]

EnterpriseT1480Execution Guardrails

NativeZone can check for the presence of KM.EkeyAlmaz1C.dll and will halt execution unless it is in the same directory as the rest of the malware's components.[1][2]

EnterpriseT1036Masquerading

NativeZone has, upon execution, displayed a message box that appears to be related to a Ukrainian electronic document management system.[2]

EnterpriseT1218.011System Binary Proxy Execution:Rundll32

NativeZone has used rundll32 to execute a malicious DLL.[2]

EnterpriseT1204.002User Execution:Malicious File

NativeZone can display an RTF document to the user to enable execution ofCobalt Strike stage shellcode.[1]

EnterpriseT1497.001Virtualization/Sandbox Evasion:System Checks

NativeZone has checked if Vmware or VirtualBox VM is running on a compromised host.[1]

Groups That Use This Software

IDNameReferences
G0016APT29

[2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp