Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. CorKLOG

CorKLOG

CorKLOG is a keylogger known to be leveraged byMustang Panda and was first observed utilized in 2024.CorKLOG is delivered through a RAR archive (e.g., src.rar), which contains two files: an executable (lcommute.exe) and theCorKLOG DLL (mscorsvc.dll).CorKLOG has established persistence on the system by creating services or with scheduled tasks.[1]

ID: S1235
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 12 September 2025
Last Modified: 21 October 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1543.003Create or Modify System Process:Windows Service

CorKLOG has created a service to establish persistence.[1]

EnterpriseT1074.001Data Staged:Local Data Staging

CorKLOG has stored the captured data in an encrypted file using a 48-character RC4 key.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

CorKLOG has decoded XOR encrypted strings.[1]

EnterpriseT1574.001Hijack Execution Flow:DLL

CorKLOG has leveraged legitimate binaries to conduct DLL side-loading.[1]

EnterpriseT1056.001Input Capture:Keylogging

CorKLOG has captured keystrokes.[1]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

CorKLOG has encrypted collected contents using RC4.[1]CorKLOG has also utilized XOR encrypted strings.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

CorKLOG has achieved persistence through the creation of a scheduled task named TableInputServices by using the commandschtasks /create /tn TabletlnputServices /tr /sc minute /mo 10 /f.[1]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

CorKLOG has used legitimate signed binaries such as lcommute.exe for follow-on execution of malicious DLLs through DLL side-loading.[1]

Groups That Use This Software

IDNameReferences
G0129Mustang Panda

[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp