Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. SysUpdate

SysUpdate

SysUpdate is a backdoor written in C++ that has been used byThreat Group-3390 since at least 2020.[1]

ID: S0663
Associated Software: HyperSSL, Soldier, FOCUSFJORD
Type: MALWARE
Platforms: Windows, Linux
Version: 1.3
Created: 29 November 2021
Last Modified: 21 October 2025

Associated Software Descriptions

NameDescription
HyperSSL

[1]

Soldier

[1]

FOCUSFJORD

[1]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.004Application Layer Protocol:DNS

SysUpdate has used DNS TXT requests as for its C2 communication.[2]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

SysUpdate can use a Registry Run key to establish persistence.[1]

EnterpriseT1543.002Create or Modify System Process:Systemd Service

SysUpdate can copy a script to the user owned/usr/lib/systemd/system/ directory with a symlink mapped to aroot owned directory,/etc/ystem/system, in the unit configuration file'sExecStart directive to establish persistence and elevate privileges.[2]

.003Create or Modify System Process:Windows Service

SysUpdate can create a service to establish persistence.[1]

EnterpriseT1132.001Data Encoding:Standard Encoding

SysUpdate has used Base64 to encode its C2 traffic.[2]

EnterpriseT1005Data from Local System

SysUpdate can collect information and files from a compromised host.[2]

EnterpriseT1140Deobfuscate/Decode Files or Information

SysUpdate can deobfuscate packed binaries in memory.[1]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

SysUpdate has used DES to encrypt all C2 communications.[2]

EnterpriseT1041Exfiltration Over C2 Channel

SysUpdate has exfiltrated data over its C2 channel.[2]

EnterpriseT1083File and Directory Discovery

SysUpdate can search files on a compromised host.[1][2]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

SysUpdate has the ability to set file attributes to hidden.[1]

EnterpriseT1574.001Hijack Execution Flow:DLL

SysUpdate can load DLLs through vulnerable legitimate executables.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

SysUpdate can delete its configuration file from the targeted system.[1]

EnterpriseT1105Ingress Tool Transfer

SysUpdate has the ability to download files to a compromised host.[1][2]

EnterpriseT1680Local Storage Discovery

SysUpdate can collect a system's drive information.[1][2]

EnterpriseT1036.004Masquerading:Masquerade Task or Service

SysUpdate has named their unit configuration file similarly to other unit files residing in the same directory,/usr/lib/systemd/system/, to appear benign.[2]

EnterpriseT1112Modify Registry

SysUpdate can write its configuration file toSoftware\Classes\scConfig in eitherHKEY_LOCAL_MACHINE orHKEY_CURRENT_USER.[1]

EnterpriseT1106Native API

SysUpdate can call theGetNetworkParams API as part of its C2 establishment process.[2]

EnterpriseT1027.002Obfuscated Files or Information:Software Packing

SysUpdate has been packed with VMProtect.[1][2]

.011Obfuscated Files or Information:Fileless Storage

SysUpdate can store its encoded configuration file withinSoftware\Classes\scConfig in eitherHKEY_LOCAL_MACHINE orHKEY_CURRENT_USER.[1]

.013Obfuscated Files or Information:Encrypted/Encoded File

SysUpdate can encrypt and encode its configuration file.[1]

EnterpriseT1057Process Discovery

SysUpdate can collect information about running processes.[2]

EnterpriseT1113Screen Capture

SysUpdate has the ability to capture screenshots.[1]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

SysUpdate has been signed with stolen digital certificates.[2]

EnterpriseT1082System Information Discovery

SysUpdate can collect a system's architecture, operating system version, and hostname.[1][2]

EnterpriseT1016System Network Configuration Discovery

SysUpdate can collected the IP address and domain name of a compromised host.[2]

.001Internet Connection Discovery

SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process.[2]

EnterpriseT1033System Owner/User Discovery

SysUpdate can collect the username from a compromised host.[2]

EnterpriseT1007System Service Discovery

SysUpdate can collect a list of services on a victim machine.[2]

EnterpriseT1569.002System Services:Service Execution

SysUpdate can manage services and processes.[1]

EnterpriseT1047Windows Management Instrumentation

SysUpdate can use WMI for execution on a compromised host.[1]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp