Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. SnappyTCP

SnappyTCP

SnappyTCP is a web shell used bySea Turtle between 2021 and 2023 against multiple victims.SnappyTCP appears to be based on a public GitHub project that has since been removed from the code-sharing site.SnappyTCP includes a simple reverse TCP shell for Linux and Unix environments with basic command and control capabilities.[1]

ID: S1163
Type: MALWARE
Platforms: Linux
Version: 1.0
Created: 20 November 2024
Last Modified: 07 January 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

SnappyTCP connects to the command and control server via a TCP socket using HTTP.[1]

EnterpriseT1059.004Command and Scripting Interpreter:Unix Shell

SnappyTCP creates the reverse shell using a pthread spawning a bash shell.[1]

EnterpriseT1573.002Encrypted Channel:Asymmetric Cryptography

SnappyTCP can use OpenSSL and TLS certificates to encrypt traffic.[1]

EnterpriseT1095Non-Application Layer Protocol

SnappyTCP spawns a reverse TCP shell following an HTTP-based negotiation.[1]

EnterpriseT1505.003Server Software Component:Web Shell

SnappyTCP is a reverse TCP shell with command and control capabilities used for persistence purposes.[1]

Groups That Use This Software

IDNameReferences
G1041Sea Turtle

Sea Turtle usedSnappyTCP following initial access in intrusions from 2021 to 2023.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp