Hi-Zor

Hi-Zor is a remote access tool (RAT) that has characteristics similar to Sakula. It was used in a campaign named INOCNATION. [1]

ID: S0087
Type: MALWARE
Platforms: Windows
Version: 1.0

Techniques Used

Domain ID Name Use
Enterprise T1059 Command-Line Interface

Hi-Zor has the ability to create a reverse shell.[2]

Enterprise T1043 Commonly Used Port

Hi-Zor communicates with its C2 server over port 443.[2]

Enterprise T1107 File Deletion

Hi-Zor deletes its RAT installer file as it executes its DLL payload file.[2]

Enterprise T1079 Multilayer Encryption

Hi-Zor encrypts C2 traffic with HTTPS and also encodes it with a single-byte XOR key.[2]

Enterprise T1027 Obfuscated Files or Information

Hi-Zor uses various XOR techniques to obfuscate its components.[2]

Enterprise T1060 Registry Run Keys / Startup Folder

Hi-Zor creates a Registry Run key to establish persistence.[2]

Enterprise T1117 Regsvr32

Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism.[2]

Enterprise T1105 Remote File Copy

Hi-Zor has the ability to upload and download files from its C2 server.[2]

Enterprise T1071 Standard Application Layer Protocol

Hi-Zor communicates with its C2 server over HTTPS.[2]

References