Metador is a suspected cyber espionage group that was first reported in September 2022. Metador has targeted a limited number of telecommunication companies, internet service providers, and universities in the Middle East and Africa. Security researchers named the group Metador based on the "I am meta" string in one of the group's malware samples and the expectation of Spanish-language responses from C2 servers.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
Metador has used the Windows command line to execute commands.[1] |
Enterprise | T1546 | .003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
Metador has established persistence through the use of a WMI event subscription combined with unusual living-off-the-land binaries such as |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
Metador has quickly deleted |
Enterprise | T1105 | Ingress Tool Transfer |
Metador has downloaded tools and malware onto a compromised system.[1] |
|
Enterprise | T1095 | Non-Application Layer Protocol | ||
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File | |
Enterprise | T1588 | .001 | Obtain Capabilities: Malware |
Metador has used unique malware in their operations, including metaMain and Mafalda.[1] |
.002 | Obtain Capabilities: Tool |
Metador has used Microsoft's Console Debugger in some of their operations.[1] |