Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. InvisibleFerret

InvisibleFerret

InvisibleFerret is a modular python malware that is leveraged for data exfiltration and remote access capabilities.[1][2][3]InvisibleFerret consists of four modules: main, payload, browser, and AnyDesk.[1]InvisibleFerret malware has been leveraged by North Korea-affiliated threat actors identified as DeceptiveDevelopment orContagious Interview since 2023.[4][2][3][5]InvisibleFerret has historically been introduced to the victim environment through the use of theBeaverTail malware.[6][1][2][3][5]

ID: S1245
Type: MALWARE
Platforms: Linux, macOS, Windows
Version: 1.0
Created: 17 October 2025
Last Modified: 24 October 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087.001Account Discovery:Local Account

InvisibleFerret has queried the victim device using Python scripts to obtain the User and Hostname.[4][3]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

InvisibleFerret has used HTTP for C2 communications.[6][1][3]

EnterpriseT1560.001Archive Collected Data:Archive via Utility

InvisibleFerret has used 7zip, RAR and zip files to archive collected data for exfiltration.[1][2]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

InvisibleFerret has established persistence within Windows devices by creating a .bat file "queue.bat" within the Startup folder to run a Python script.[2]

.013Boot or Logon Autostart Execution:XDG Autostart Entries

InvisibleFerret has established persistence within GNOME-based Linux environments by placing entries within.desktop that run on Startup.[2]

EnterpriseT1115Clipboard Data

InvisibleFerret has stolen data from the clipboard using the Python project "pyperclip".[6][1][3]InvisibleFerret has also captured clipboard contents during copy and paste operations.[2]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

InvisibleFerret has utilized a PowerShell script created in the victim’s home directory named "conf.ps1" that is used to modify configuration files for AnyDesk remote services.[1]

.006Command and Scripting Interpreter:Python

InvisibleFerret is written in Python and has used Python scripts for execution.[6][4][1][2][3]

EnterpriseT1543.001Create or Modify System Process:Launch Agent

InvisibleFerret has established persistence using LaunchAgents on macOS that run on Startup using a file named "com.avatar.update.wake.plist".[2]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

InvisibleFerret has stolen login data, autofill data, cryptocurrency wallets, and payment information saved in web browsers such as Chrome, Brave, Opera, Yandex and Edge, to include versions affiliated with major operating systems on Windows, Linux, and macOS.[6][1]InvisibleFerret has also leveraged the commandssh_zcp to copy browser data to include extensions and cryptocurrency wallet data.[2]

.005Credentials from Password Stores:Password Managers

InvisibleFerret has utilized the commandssh_zcp to exfiltrate data from browser extensions and password managers via Telegram and FTP.[1][2]

EnterpriseT1005Data from Local System

InvisibleFerret has collected data utilizing a script that contained a list of excluded files and directory names and naming patterns of interest such as environment and configuration files, documents, spreadsheets, and other files that contained the words secret, wallet, private, and password.[1]

EnterpriseT1074.001Data Staged:Local Data Staging

InvisibleFerret has staged data in consolidated folders prior to exfiltration.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

InvisibleFerret has decoded XOR-encrypted and Base-64-encoded payloads prior to execution.[1]

EnterpriseT1048.003Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol

InvisibleFerret has used FTP to exfiltrate files and directories using the commandssh_upload which contains with six subcommands of.sdira,sdir,sfile,sfinda,sfindr andsfind that had varying functions.[1][2]InvisibleFerret has exfiltrated stolen files and data to the C2 servers over ports 1224, 2245 and 8637.[6]

EnterpriseT1041Exfiltration Over C2 Channel

InvisibleFerret has used HTTP communications to the "/Uploads" URI for file exfiltration.[2]

EnterpriseT1567Exfiltration Over Web Service

InvisibleFerret has leveraged Telegram chat to upload stolen data using the Telegram API with a bot token.[1][2]

EnterpriseT1083File and Directory Discovery

InvisibleFerret has identified specific directories and files for exfiltration using thessh_upload command which contains subcommands of.sdira,sdir,sfile,sfinda,sfindr,sfind.[1][2]InvisibleFerret also has the capability to scan and upload files of interest from multiple OS systems through the use of scripts that check file names, file extensions, and avoids certain path names.[6][3]InvisibleFerret has utilized thefindstr on Windows or the macOSfind commands to search for files of interest.[5]

EnterpriseT1657Financial Theft

InvisibleFerret has searched the victim device credentials and files commonly associated with cryptocurrency wallets.[6][1][2][3]

EnterpriseT1564.003Hide Artifacts:Hidden Window

InvisibleFerret has executed Python instances of the browser module ".n2/bow" utilizing theCREATE_NO_WINDOW process creation flag.[1]

EnterpriseT1105Ingress Tool Transfer

InvisibleFerret has downloaded "AnyDesk.exe" into the user’s home directory from the C2 server when checks for the service fail to identify its presence in the victim environment.[1]InvisibleFerret has also been configured to download additional payloads using a command which calls to the /bow URI.[2][3]

EnterpriseT1056Input Capture

InvisibleFerret has collected mouse and keyboard events using "pyWinhook".[3]

.001Keylogging

InvisibleFerret has conducted keylogging using the Python project "pyWinHook" and "Pyhook".[6][1][3]InvisibleFerret has also captured keylogging thread checks for changes in an active window and key presses.[2]

EnterpriseT1095Non-Application Layer Protocol

InvisibleFerret has established a connection with the C2 server over TCP traffic.[3]InvisibleFerret has also created a TCP reverse shell communicating via a socket connection over ports 1245, 80, 2245, 3001, and 5000.[1]

EnterpriseT1571Non-Standard Port

InvisibleFerret has been observed utilizing HTTP communications to the C2 server over ports 1224, 2245 and 8637.[6]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

InvisibleFerret has utilized the XOR and Base64 encoding for each of its modules.[1]InvisibleFerret has also obfuscated files with a combination of zlib, Base64 and reverse string order.[6]InvisibleFerret has also utilized the XOR and Base64 encoding some of its Python scripts.[3]

EnterpriseT1057Process Discovery

InvisibleFerret has the capability to query installed programs and running processes.[2]InvisibleFerret has also identified running processes using the Python project "psutil".[3]

EnterpriseT1219Remote Access Tools

InvisibleFerret has utilized remote access software including AnyDesk client through the "adc" module.[6][1][3]InvisibleFerret has also downloaded the AnyDesk client should it not already exist on the compromised host by searching forC:/Program Files(x86)/AnyDesk/AnyDesk.exe.[2]

EnterpriseT1679Selective Exclusion

InvisibleFerret has the capability to scan for file names, file extensions, and avoids pre-designated path names and file types.[6][3]

EnterpriseT1489Service Stop

InvisibleFerret has terminated Chrome and Brave browsers using thetaskkill command on Windows and thekillall command on other systems such as Linux and macOS.[1]InvisibleFerret has also utilized it’sssh_kill command to terminate Chrome and Brave browser processes.[3]

EnterpriseT1518Software Discovery

InvisibleFerret has gathered installed programs and running processes.[2]

EnterpriseT1082System Information Discovery

InvisibleFerret has collected OS type, hostname and system version through the "pay" module.[6][1]InvisibleFerret has also queried the victim device using Python scripts to obtain the User and Hostname.[4][3]

EnterpriseT1614System Location Discovery

InvisibleFerret has collected the internal IP address, IP geolocation information of the infected host and sends the data to a C2 server.[3]InvisibleFerret has also leveraged the "pay" module to obtain region name, country, city, zip code, ISP, latitude and longitude using "http://ip-api.com/json".[1]

EnterpriseT1016System Network Configuration Discovery

InvisibleFerret has collected the local IP address, and external IP.[1][3]

EnterpriseT1033System Owner/User Discovery

InvisibleFerret has identified the user’s UUID and username through the "pay" module.[6][1][3]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp