Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Turian

Turian

Turian is a backdoor that has been used byBackdoorDiplomacy to target Ministries of Foreign Affairs, telecommunication companies, and charities in Africa, Europe, the Middle East, and Asia. First reported in 2021,Turian is likely related to Quarian, an older backdoor that was last observed being used in 2013 against diplomatic targets in Syria and the United States.[1]

ID: S0647
Type: MALWARE
Platforms: Windows, Linux
Contributors: Zaw Min Htun, @Z3TAE
Version: 1.0
Created: 21 September 2021
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Turian has the ability to use HTTP for its C2.[1]

EnterpriseT1560.001Archive Collected Data:Archive via Utility

Turian can use WinRAR to create a password-protected archive for files of interest.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Turian can establish persistence by adding Registry Run keys.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Turian can create a remote shell and execute commands usingcmd.[1]

.004Command and Scripting Interpreter:Unix Shell

Turian has the ability to use/bin/sh to execute commands.[1]

.006Command and Scripting Interpreter:Python

Turian has the ability to use Python to spawn a Unix shell.[1]

EnterpriseT1001.001Data Obfuscation:Junk Data

Turian can insert pseudo-random characters into its network encryption setup.[1]

EnterpriseT1074.001Data Staged:Local Data Staging

Turian can store copied files in a specific directory prior to exfiltration.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Turian has the ability to use a XOR decryption key to extract C2 server domains and IP addresses.[1]

EnterpriseT1083File and Directory Discovery

Turian can search for specific files and list directories.[1]

EnterpriseT1105Ingress Tool Transfer

Turian can download additional files and tools from its C2.[1]

EnterpriseT1036.004Masquerading:Masquerade Task or Service

Turian can disguise as a legitimate service to blend into normal operations.[1]

EnterpriseT1027Obfuscated Files or Information

Turian can use VMProtect for obfuscation.[1]

EnterpriseT1120Peripheral Device Discovery

Turian can scan for removable media to collect data.[1]

EnterpriseT1113Screen Capture

Turian has the ability to take screenshots.[1]

EnterpriseT1082System Information Discovery

Turian can retrieve system information including OS version, memory usage, local hostname, and system adapter information.[1]

EnterpriseT1016System Network Configuration Discovery

Turian can retrieve the internal IP address of a compromised host.[1]

EnterpriseT1033System Owner/User Discovery

Turian can retrieve usernames.[1]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp