Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. BeaverTail

BeaverTail

BeaverTail is a malware that has both a JavaScript and C++ variant. Active since 2022,BeaverTail is capable of stealing logins from browsers and serves as a downloader for second stage payloads.BeaverTail has previously been leveraged by North Korea-affiliated actors identified as DeceptiveDevelopment orContagious Interview.BeaverTail has been delivered to victims through code repository sites and has been embedded within malicious attachments.[1][2][3][4]

ID: S1246
Type: MALWARE
Platforms: Linux, macOS, Windows
Version: 1.0
Created: 19 October 2025
Last Modified: 24 October 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

BeaverTail has used HTTP GET request to download malicious payloads to includeInvisibleFerret and HTTP POST to exfiltrate data to C2 infrastructure.[5][1]

EnterpriseT1560.001Archive Collected Data:Archive via Utility

BeaverTail has collected and archived sensitive data in a zip file.[5]

EnterpriseT1217Browser Information Discovery

BeaverTail has searched the victim device for browser extensions including those commonly associated with cryptocurrency wallets.[2][6][5][7][3][1][8]

EnterpriseT1059.007Command and Scripting Interpreter:JavaScript

BeaverTail has executed malicious JavaScript code.[2][6][3][4][1]BeaverTail has also been compiled with the Qt framework to execute in both Windows and macOS.[8]

EnterpriseT1555Credentials from Password Stores

BeaverTail has collected keys stored for Solana stored in.config/solana/id.json and other login details associated with macOS within/Library/Keychains/login.keychain or for Linux within/.local/share/keyrings.[3]

.001Keychain

BeaverTail has collected keys associated with macOS within/Library/Keychains/login.keychain.[5][7][3]

.003Credentials from Web Browsers

BeaverTail has stolen passwords saved in web browsers.[2][5][7][8]BeaverTail has also been known to collect login data from Firefox within key3.db, key4.db and logins.json from/.mozilla/firefox/ for exfiltration.[3]

EnterpriseT1005Data from Local System

BeaverTail has exfiltrated data collected from local systems.[5][3][1][8]

EnterpriseT1001.001Data Obfuscation:Junk Data

BeaverTail has added junk data or a dummy character prepended to a string to hamper decoding attempts.[3]

EnterpriseT1074.001Data Staged:Local Data Staging

BeaverTail has staged collected data to the system’s temporary directory.[5]

EnterpriseT1041Exfiltration Over C2 Channel

BeaverTail has exfiltrated data collected from victim devices to C2 servers.[5][1][8]

EnterpriseT1083File and Directory Discovery

BeaverTail has searched for .ldb and .log files stored in browser extension directories for collection and exfiltration.[5][7][3]

EnterpriseT1657Financial Theft

BeaverTail has searched the victim device for browser extensions commonly associated with cryptocurrency wallets.[2][6][3][1][8]

EnterpriseT1070.004Indicator Removal:File Deletion

BeaverTail has deleted files from a compromised host after they were exfiltrated.[5]

EnterpriseT1105Ingress Tool Transfer

BeaverTail has been used to download a malicious payload to include Python based malwareInvisibleFerret.[2][5][7][3][1][8]

EnterpriseT1654Log Enumeration

BeaverTail has identified .ldb and .log files stored in browser extension directories for collection and exfiltration.[3]

EnterpriseT1036Masquerading

BeaverTail has masqueraded as MiroTalk installation packages: "MiroTalk.dmg" for macOS and "MiroTalk.msi" for Windows, and has included login GUIs with MiroTalk themes.[8]

EnterpriseT1571Non-Standard Port

BeaverTail has communicated with C2 IP addresses over ports 1224 or 1244.[3][1][8]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

BeaverTail has obfuscated strings of code with Base64 encoding within the JavaScript version of the malware.[3][1][8]BeaverTail has also utilized the open-source tool JavaScript-Obfuscator to obfuscate strings and functions.[2][4]

EnterpriseT1195.001Supply Chain Compromise:Compromise Software Dependencies and Development Tools

BeaverTail has been hosted on code repositories and disseminated to victims through NPM packages.[2][6][4][1][8]

EnterpriseT1082System Information Discovery

BeaverTail has been known to collect basic system information.[2][1]BeaverTail has also collected data to include hostname and current timestamp prior to uploading data to the API endpoint/uploads on the C2 server.[3]

EnterpriseT1124System Time Discovery

BeaverTail has obtained and sent the current timestamp associated with the victim device to C2.[3]

EnterpriseT1204.002User Execution:Malicious File

BeaverTail has been executed through lures involving malicious JavaScript projects or trojanized remote conferencing software such as MicroTalk or FreeConference.[3][8]BeaverTail has also been executed through macOS and Windows installers disguised as chat applications.[2][4]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp