NGLite is a backdoor Trojan that is only capable of running commands received through its C2 channel. While the capabilities are standard for a backdoor, NGLite uses a novel C2 channel that leverages a decentralized network based on the legitimate NKN to communicate between the backdoor and the actors.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol:Web Protocols | NGLite will initially beacon out to the NKN network via an HTTP POST over TCP 30003.[1] |
| Enterprise | T1573 | .001 | Encrypted Channel:Symmetric Cryptography | NGLite will use an AES encrypted channel for command and control purposes, in one case using the key |
| Enterprise | T1090 | .003 | Proxy:Multi-hop Proxy | NGLite has abused NKN infrastructure for its C2 communication.[1] |
| Enterprise | T1016 | System Network Configuration Discovery | NGLite identifies the victim system MAC and IPv4 addresses and uses these to establish a victim identifier.[1] | |
| Enterprise | T1033 | System Owner/User Discovery | NGLite will run the | |