SUGARDUMP is a proprietary browser credential harvesting tool that was used by UNC3890 during theC0010 campaign. The first knownSUGARDUMP version was used since at least early 2021, a second SMTP C2 version was used from late 2021-early 2022, and a third HTTP C2 variant was used since at least April 2022.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol:Web Protocols | |
| .003 | Application Layer Protocol:Mail Protocols | |||
| Enterprise | T1560 | .003 | Archive Collected Data:Archive via Custom Method | SUGARDUMP has encrypted collected data using AES CBC mode and encoded it using Base64.[1] |
| Enterprise | T1217 | Browser Information Discovery | SUGARDUMP has collected browser bookmark and history information.[1] | |
| Enterprise | T1555 | .003 | Credentials from Password Stores:Credentials from Web Browsers | SUGARDUMP variants have harvested credentials from browsers such as Firefox, Chrome, Opera, and Edge.[1] |
| Enterprise | T1074 | .001 | Data Staged:Local Data Staging | SUGARDUMP has stored collected data under |
| Enterprise | T1041 | Exfiltration Over C2 Channel | SUGARDUMP has sent stolen credentials and other data to its C2 server.[1] | |
| Enterprise | T1083 | File and Directory Discovery | SUGARDUMP can search for and collect data from specific Chrome, Opera, Microsoft Edge, and Firefox files, including any folders that have the string | |
| Enterprise | T1036 | .004 | Masquerading:Masquerade Task or Service | SUGARDUMP's scheduled task has been named |
| .005 | Masquerading:Match Legitimate Resource Name or Location | SUGARDUMP has been named | ||
| Enterprise | T1053 | .005 | Scheduled Task/Job:Scheduled Task | SUGARDUMP has created scheduled tasks called |
| Enterprise | T1518 | Software Discovery | SUGARDUMP can identify Chrome, Opera, Edge Chromium, and Firefox browsers, including version number, on a compromised host.[1] | |
| Enterprise | T1204 | .002 | User Execution:Malicious File | SomeSUGARDUMP variants required a user to enable a macro within a malicious .xls file for execution.[1] |