Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. QUIETCANARY

QUIETCANARY

QUIETCANARY is a backdoor tool written in .NET that has been used since at least 2022 to gather and exfiltrate data from victim networks.[1]

ID: S1076
Associated Software: Tunnus
Type: MALWARE
Platforms: Windows
Contributors: Yoshihiro Kori, NEC Corporation; Manikantan Srinivasan, NEC Corporation India; Pooja Natarajan, NEC Corporation India
Version: 1.0
Created: 19 May 2023
Last Modified: 16 April 2025

Associated Software Descriptions

NameDescription
Tunnus

[1]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

QUIETCANARY can use HTTPS for C2 communications.[1]

EnterpriseT1132.001Data Encoding:Standard Encoding

QUIETCANARY can base64 encode C2 communications.[1]

EnterpriseT1074Data Staged

QUIETCANARY has the ability to stage data prior to exfiltration.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

QUIETCANARY can use a custom parsing routine to decode the command codes and additional parameters from the C2 before executing them.[1]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

QUIETCANARY can RC4 encrypt C2 communications.[1]

EnterpriseT1564.003Hide Artifacts:Hidden Window

QUIETCANARY can execute processes in a hidden window.[1]

EnterpriseT1106Native API

QUIETCANARY can callSystem.Net.HttpWebRequest to identify the default proxy configured on the victim computer.[1]

EnterpriseT1012Query Registry

QUIETCANARY has the ability to retrieve information from the Registry.[1]

EnterpriseT1016System Network Configuration Discovery

QUIETCANARY can identify the default proxy setting on a compromised host.[1]

Campaigns

IDNameDescription
C0026C0026

DuringC0026, the threat actors usedQUIETCANARY to gather and exfiltrate data.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp