BeaverTail is a malware that has both a JavaScript and C++ variant. Active since 2022,BeaverTail is capable of stealing logins from browsers and serves as a downloader for second stage payloads.BeaverTail has previously been leveraged by North Korea-affiliated actors identified as DeceptiveDevelopment orContagious Interview.BeaverTail has been delivered to victims through code repository sites and has been embedded within malicious attachments.[1][2][3][4]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol:Web Protocols | BeaverTail has used HTTP GET request to download malicious payloads to includeInvisibleFerret and HTTP POST to exfiltrate data to C2 infrastructure.[5][1] |
| Enterprise | T1560 | .001 | Archive Collected Data:Archive via Utility | BeaverTail has collected and archived sensitive data in a zip file.[5] |
| Enterprise | T1217 | Browser Information Discovery | BeaverTail has searched the victim device for browser extensions including those commonly associated with cryptocurrency wallets.[2][6][5][7][3][1][8] | |
| Enterprise | T1059 | .007 | Command and Scripting Interpreter:JavaScript | BeaverTail has executed malicious JavaScript code.[2][6][3][4][1]BeaverTail has also been compiled with the Qt framework to execute in both Windows and macOS.[8] |
| Enterprise | T1555 | Credentials from Password Stores | BeaverTail has collected keys stored for Solana stored in | |
| .001 | Keychain | BeaverTail has collected keys associated with macOS within | ||
| .003 | Credentials from Web Browsers | BeaverTail has stolen passwords saved in web browsers.[2][5][7][8]BeaverTail has also been known to collect login data from Firefox within key3.db, key4.db and logins.json from | ||
| Enterprise | T1005 | Data from Local System | BeaverTail has exfiltrated data collected from local systems.[5][3][1][8] | |
| Enterprise | T1001 | .001 | Data Obfuscation:Junk Data | BeaverTail has added junk data or a dummy character prepended to a string to hamper decoding attempts.[3] |
| Enterprise | T1074 | .001 | Data Staged:Local Data Staging | BeaverTail has staged collected data to the system’s temporary directory.[5] |
| Enterprise | T1041 | Exfiltration Over C2 Channel | BeaverTail has exfiltrated data collected from victim devices to C2 servers.[5][1][8] | |
| Enterprise | T1083 | File and Directory Discovery | BeaverTail has searched for .ldb and .log files stored in browser extension directories for collection and exfiltration.[5][7][3] | |
| Enterprise | T1657 | Financial Theft | BeaverTail has searched the victim device for browser extensions commonly associated with cryptocurrency wallets.[2][6][3][1][8] | |
| Enterprise | T1070 | .004 | Indicator Removal:File Deletion | BeaverTail has deleted files from a compromised host after they were exfiltrated.[5] |
| Enterprise | T1105 | Ingress Tool Transfer | BeaverTail has been used to download a malicious payload to include Python based malwareInvisibleFerret.[2][5][7][3][1][8] | |
| Enterprise | T1654 | Log Enumeration | BeaverTail has identified .ldb and .log files stored in browser extension directories for collection and exfiltration.[3] | |
| Enterprise | T1036 | Masquerading | BeaverTail has masqueraded as MiroTalk installation packages: "MiroTalk.dmg" for macOS and "MiroTalk.msi" for Windows, and has included login GUIs with MiroTalk themes.[8] | |
| Enterprise | T1571 | Non-Standard Port | BeaverTail has communicated with C2 IP addresses over ports 1224 or 1244.[3][1][8] | |
| Enterprise | T1027 | .013 | Obfuscated Files or Information:Encrypted/Encoded File | BeaverTail has obfuscated strings of code with Base64 encoding within the JavaScript version of the malware.[3][1][8]BeaverTail has also utilized the open-source tool JavaScript-Obfuscator to obfuscate strings and functions.[2][4] |
| Enterprise | T1195 | .001 | Supply Chain Compromise:Compromise Software Dependencies and Development Tools | BeaverTail has been hosted on code repositories and disseminated to victims through NPM packages.[2][6][4][1][8] |
| Enterprise | T1082 | System Information Discovery | BeaverTail has been known to collect basic system information.[2][1]BeaverTail has also collected data to include hostname and current timestamp prior to uploading data to the API endpoint | |
| Enterprise | T1124 | System Time Discovery | BeaverTail has obtained and sent the current timestamp associated with the victim device to C2.[3] | |
| Enterprise | T1204 | .002 | User Execution:Malicious File | BeaverTail has been executed through lures involving malicious JavaScript projects or trojanized remote conferencing software such as MicroTalk or FreeConference.[3][8]BeaverTail has also been executed through macOS and Windows installers disguised as chat applications.[2][4] |