Hi-Zor is a remote access tool (RAT) that has characteristics similar to Sakula. It was used in a campaign named INOCNATION. [1]

ID: S0087
Platforms: Windows
Version: 1.1
Created: 31 May 2017
Last Modified: 09 February 2021

Techniques Used

Domain ID Name Use
Enterprise T1071 .001 Application Layer Protocol: Web Protocols

Hi-Zor communicates with its C2 server over HTTPS.[2]

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Hi-Zor creates a Registry Run key to establish persistence.[2]

Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

Hi-Zor has the ability to create a reverse shell.[2]

Enterprise T1573 .001 Encrypted Channel: Symmetric Cryptography

Hi-Zor encrypts C2 traffic with a double XOR using two distinct single-byte keys.[1]

.002 Encrypted Channel: Asymmetric Cryptography

Hi-Zor encrypts C2 traffic with TLS.[1]

Enterprise T1070 .004 Indicator Removal: File Deletion

Hi-Zor deletes its RAT installer file as it executes its DLL payload file.[2]

Enterprise T1105 Ingress Tool Transfer

Hi-Zor has the ability to upload and download files from its C2 server.[2]

Enterprise T1027 Obfuscated Files or Information

Hi-Zor uses various XOR techniques to obfuscate its components.[2]

Enterprise T1218 .010 System Binary Proxy Execution: Regsvr32

Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism.[2]