Hi-Zor

Hi-Zor is a remote access tool (RAT) that has characteristics similar to Sakula. It was used in a campaign named INOCNATION. [1]

ID: S0087
Aliases: Hi-Zor
Type: MALWARE
Platforms: Windows

Version: 1.0

Techniques Used

DomainIDNameUse
EnterpriseT1059Command-Line InterfaceHi-Zor has the ability to create a reverse shell.[2]
EnterpriseT1043Commonly Used PortHi-Zor communicates with its C2 server over port 443.[2]
EnterpriseT1107File DeletionHi-Zor deletes its RAT installer file as it executes its DLL payload file.[2]
EnterpriseT1079Multilayer EncryptionHi-Zor encrypts C2 traffic with HTTPS and also encodes it with a single-byte XOR key.[2]
EnterpriseT1027Obfuscated Files or InformationHi-Zor uses various XOR techniques to obfuscate its components.[2]
EnterpriseT1060Registry Run Keys / Startup FolderHi-Zor creates a Registry Run key to establish persistence.[2]
EnterpriseT1117Regsvr32Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Start Folder persistence mechanism.[2]
EnterpriseT1105Remote File CopyHi-Zor has the ability to upload and download files from its C2 server.[2]
EnterpriseT1071Standard Application Layer ProtocolHi-Zor communicates with its C2 server over HTTPS.[2]

References