Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Clambling

Clambling

Clambling is a modular backdoor written in C++ that has been used byThreat Group-3390 since at least 2017.[1]

ID: S0660
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 12 November 2021
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1548.002Abuse Elevation Control Mechanism:Bypass User Account Control

Clambling has the ability to bypass UAC using apassuac.dll file.[1][2]

EnterpriseT1071Application Layer Protocol

Clambling has the ability to use Telnet for communication.[1]

.001Web Protocols

Clambling has the ability to communicate over HTTP.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Clambling can establish persistence by adding a Registry run key.[1][2]

EnterpriseT1115Clipboard Data

Clambling has the ability to capture and store clipboard data.[1][2]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

TheClambling dropper can use PowerShell to download the malware.[1]

.003Command and Scripting Interpreter:Windows Command Shell

Clambling can use cmd.exe for command execution.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

Clambling can register itself as a system service to gain persistence.[2]

EnterpriseT1005Data from Local System

Clambling can collect information from a compromised host.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Clambling can deobfuscate its payload prior to execution.[1][2]

EnterpriseT1567.002Exfiltration Over Web Service:Exfiltration to Cloud Storage

Clambling can send files from a victim's machine to Dropbox.[1][2]

EnterpriseT1083File and Directory Discovery

Clambling can browse directories on a compromised host.[1][2]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

Clambling has the ability to set its file attributes to hidden.[1]

EnterpriseT1574.001Hijack Execution Flow:DLL

Clambling can store a file namedmpsvc.dll, which opens a maliciousmpsvc.mui file, in the same folder as the legitimate Microsoft executableMsMpEng.exe to gain execution.[1][2]

EnterpriseT1056.001Input Capture:Keylogging

Clambling can capture keystrokes on a compromised host.[1][2]

EnterpriseT1112Modify Registry

Clambling can set and delete Registry keys.[1]

EnterpriseT1135Network Share Discovery

Clambling has the ability to enumerate network shares.[1]

EnterpriseT1095Non-Application Layer Protocol

Clambling has the ability to use TCP and UDP for communication.[1]

EnterpriseT1027Obfuscated Files or Information

TheClambling executable has been obfuscated when dropped on a compromised host.[1]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Clambling has been delivered to victim's machines through malicious e-mail attachments.[1]

EnterpriseT1057Process Discovery

Clambling can enumerate processes on a targeted system.[1]

EnterpriseT1055Process Injection

Clambling can inject into thesvchost.exe process for execution.[1]

.012Process Hollowing

Clambling can execute binaries through process hollowing.[1]

EnterpriseT1012Query Registry

Clambling has the ability to enumerate Registry keys, includingKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt\strDataDir to search for a bitcoin wallet.[1][2]

EnterpriseT1113Screen Capture

Clambling has the ability to capture screenshots.[1]

EnterpriseT1082System Information Discovery

Clambling can discover the hostname, computer name, and Windows version of a targeted machine.[1][2]

EnterpriseT1016System Network Configuration Discovery

Clambling can enumerate the IP address of a compromised machine.[1][2]

EnterpriseT1033System Owner/User Discovery

Clambling can identify the username on a compromised host.[1][2]

EnterpriseT1569.002System Services:Service Execution

Clambling can create and start services on a compromised host.[1]

EnterpriseT1124System Time Discovery

Clambling can determine the current time.[1]

EnterpriseT1204.002User Execution:Malicious File

Clambling has gained execution through luring victims into opening malicious files.[1]

EnterpriseT1125Video Capture

Clambling can record screen content in AVI format.[1][2]

EnterpriseT1497.003Virtualization/Sandbox Evasion:Time Based Checks

Clambling can wait 30 minutes before initiating contact with C2.[1]

EnterpriseT1102.002Web Service:Bidirectional Communication

Clambling can use Dropbox to download malicious payloads, send commands, and receive information.[1][2]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp