Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Manjusaka

Manjusaka

Manjusaka is a Chinese-language intrusion framework, similar toSliver andCobalt Strike, with an ELF binary written in GoLang as the controller for Windows and Linux implants written in Rust. First identified in 2022,Manjusaka consists of multiple components, only one of which (a command and control module) is freely available.[1]

ID: S1156
Type: MALWARE
Platforms: Linux, Windows
Contributors: Subhash Thapa
Version: 1.0
Created: 04 September 2024
Last Modified: 06 September 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Manjusaka has used HTTP for command and control communication.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Manjusaka can execute arbitrary commands passed to it from the C2 controller viacmd.exe /c.[1]

EnterpriseT1555Credentials from Password Stores

Manjusaka extracts credentials from the Windows Registry associated with Premiumsoft Navicat, a utility used to facilitate access to various database types.[1]

.003Credentials from Web Browsers

Manjusaka gathers credentials from Chromium-based browsers.[1]

EnterpriseT1132.001Data Encoding:Standard Encoding

Manjusaka communication includes a client-created session cookie with base64-encoded information representing information from the victim system.[1]

EnterpriseT1041Exfiltration Over C2 Channel

Manjusaka data exfiltration takes place over HTTP channels.[1]

EnterpriseT1083File and Directory Discovery

Manjusaka can gather information about specific files on the victim system.[1]

EnterpriseT1113Screen Capture

Manjusaka can take screenshots of the victim desktop.[1]

EnterpriseT1082System Information Discovery

Manjusaka performs basic system profiling actions to fingerprint and register the victim system with the C2 controller.[1]

EnterpriseT1016System Network Configuration Discovery

Manjusaka gathers information about current network connections, local and remote addresses associated with them, and associated processes.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp