Hi-Zor

Hi-Zor is a remote access tool (RAT) that has characteristics similar to Sakula. It was used in a campaign named INOCNATION. [1]

ID: S0087
Type: MALWARE
Platforms: Windows
Version: 1.0

Techniques Used

Domain ID Name Use
Enterprise T1059 Command-Line Interface Hi-Zor has the ability to create a reverse shell.[2]
Enterprise T1043 Commonly Used Port Hi-Zor communicates with its C2 server over port 443.[2]
Enterprise T1107 File Deletion Hi-Zor deletes its RAT installer file as it executes its DLL payload file.[2]
Enterprise T1079 Multilayer Encryption Hi-Zor encrypts C2 traffic with HTTPS and also encodes it with a single-byte XOR key.[2]
Enterprise T1027 Obfuscated Files or Information Hi-Zor uses various XOR techniques to obfuscate its components.[2]
Enterprise T1060 Registry Run Keys / Startup Folder Hi-Zor creates a Registry Run key to establish persistence.[2]
Enterprise T1117 Regsvr32 Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism.[2]
Enterprise T1105 Remote File Copy Hi-Zor has the ability to upload and download files from its C2 server.[2]
Enterprise T1071 Standard Application Layer Protocol Hi-Zor communicates with its C2 server over HTTPS.[2]

References