Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Saint Bot

Saint Bot

Saint Bot is a .NET downloader that has been used bySaint Bear since at least March 2021.[1][2]

ID: S1018
Type: MALWARE
Platforms: Windows
Version: 2.0
Created: 09 June 2022
Last Modified: 08 October 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1548.002Abuse Elevation Control Mechanism:Bypass User Account Control

Saint Bot has attempted to bypass UAC usingfodhelper.exe to escalate privileges.[2]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

Saint Bot has used HTTP for C2 communications.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Saint Bot has established persistence by being copied to the Startup directory or through the\Software\Microsoft\Windows\CurrentVersion\Run registry key.[1][2]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

Saint Bot has used PowerShell for execution.[2]

.003Command and Scripting Interpreter:Windows Command Shell

Saint Bot has usedcmd.exe and.bat scripts for execution.[2]

.005Command and Scripting Interpreter:Visual Basic

Saint Bot has used.vbs scripts for execution.[2]

EnterpriseT1132.001Data Encoding:Standard Encoding

Saint Bot has used Base64 to encode its C2 communications.[1]

EnterpriseT1005Data from Local System

Saint Bot can collect files and information from a compromised host.[1]

EnterpriseT1622Debugger Evasion

Saint Bot has usedis_debugger_present as part of its environmental checks.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Saint Bot can deobfuscate strings and files for execution.[1]

EnterpriseT1083File and Directory Discovery

Saint Bot can search a compromised host for specific files.[2]

EnterpriseT1574Hijack Execution Flow

Saint Bot will use the malicious fileslideshow.mp4 if present to load the core API provided byntdll.dll to avoid any hooks placed on calls to the originalntdll.dll file by endpoint detection and response or antimalware software.[2]

EnterpriseT1070.004Indicator Removal:File Deletion

Saint Bot can run a batch script nameddel.bat to remove anySaint Bot payload-linked files from a compromise system if anti-analysis or locale checks fail.[2]

EnterpriseT1105Ingress Tool Transfer

Saint Bot can download additional files onto a compromised host.[2]

EnterpriseT1036Masquerading

Saint Bot has renamed malicious binaries aswallpaper.mp4 andslideshow.mp4 to avoid detection.[1][2]

.005Match Legitimate Resource Name or Location

Saint Bot has been disguised as a legitimate executable, including as Windows SDK.[1]

EnterpriseT1106Native API

Saint Bot has used different API calls, includingGetProcAddress,VirtualAllocEx,WriteProcessMemory,CreateProcessA, andSetThreadContext.[1][2]

EnterpriseT1027Obfuscated Files or Information

Saint Bot has been obfuscated to help avoid detection.[2]

.002Software Packing

Saint Bot has been packed using a dark market crypter.[1]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Saint Bot has been distributed as malicious attachments within spearphishing emails.[1][2]

.002Phishing:Spearphishing Link

Saint Bot has been distributed through malicious links contained within spearphishing emails.[2]

EnterpriseT1057Process Discovery

Saint Bot has enumerated running processes on a compromised host to determine if it is running under the process namedfrgui.exe.[2]

EnterpriseT1055.001Process Injection:Dynamic-link Library Injection

Saint Bot has injected its DLL component intoEhStorAurhn.exe.[1]

.004Process Injection:Asynchronous Procedure Call

Saint Bot has written its payload into a newly-createdEhStorAuthn.exe process usingZwWriteVirtualMemory and executed it usingNtQueueApcThread andZwAlertResumeThread.[1]

.012Process Injection:Process Hollowing

TheSaint Bot loader has used API calls to spawnMSBuild.exe in a suspended state before injecting the decryptedSaint Bot binary into it.[2]

EnterpriseT1012Query Registry

Saint Bot has usedcheck_registry_keys as part of its environmental checks.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Saint Bot has created a scheduled task named "Maintenance" to establish persistence.[1]

EnterpriseT1218.004System Binary Proxy Execution:InstallUtil

Saint Bot had usedInstallUtil.exe to download and deploy executables.[1]

.010System Binary Proxy Execution:Regsvr32

Saint Bot has usedregsvr32 to execute scripts.[1][2]

EnterpriseT1082System Information Discovery

Saint Bot can identify the OS version, CPU, and other details from a victim's machine.[1]

EnterpriseT1614System Location Discovery

Saint Bot has conducted system locale checks to see if the compromised host is in Russia, Ukraine, Belarus, Armenia, Kazakhstan, or Moldova.[1][2]

EnterpriseT1016System Network Configuration Discovery

Saint Bot can collect the IP address of a victim machine.[1]

EnterpriseT1033System Owner/User Discovery

Saint Bot can collect the username from a compromised host.[1]

EnterpriseT1204.001User Execution:Malicious Link

Saint Bot has relied on users to click on a malicious link delivered via a spearphishing.[2]

.002User Execution:Malicious File

Saint Bot has relied on users to execute a malicious attachment delivered via spearphishing.[1][2]

EnterpriseT1497.001Virtualization/Sandbox Evasion:System Checks

Saint Bot has run several virtual machine and sandbox checks, including checking ifSbiedll.dll is present in a list of loaded modules, comparing the machine name toHAL9TH and the user name toJohnDoe, and checking the BIOS version for known virtual machine identifiers.[2]

.003Virtualization/Sandbox Evasion:Time Based Checks

Saint Bot has used the commandtimeout 20 to pause the execution of its initial loader.[2]

Groups That Use This Software

IDNameReferences
G1003Ember Bear

Ember Bear has usedSaint Bot during operations, but is distinct from the threat actorSaint Bear.[3]

G1031Saint Bear

Saint Bot is closely correlated withSaint Bear operations as a common post-exploitation toolset.[2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp