Hannotog is a type of backdoor malware uniquely assoicated withLotus Blossom operations since at least 2022.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1020 | Automated Exfiltration | ||
| Enterprise | T1059 | .003 | Command and Scripting Interpreter:Windows Command Shell | |
| Enterprise | T1543 | .003 | Create or Modify System Process:Windows Service | |
| Enterprise | T1562 | .004 | Impair Defenses:Disable or Modify System Firewall | Hannotog can modify local firewall settings via |
| Enterprise | T1105 | Ingress Tool Transfer | Hannotog can download additional files to the victim machine.[1] | |
| Enterprise | T1571 | Non-Standard Port | Hannotog uses non-standard listening ports, such as UDP 5900, for command and control purposes.[1] | |
| Enterprise | T1489 | Service Stop | ||
| ID | Name | References |
|---|---|---|
| G0030 | Lotus Blossom | Hannotog is a backdoor associated withLotus Blossom operations.[1] |