WEBC2

WEBC2 is a backdoor used by APT1 to retrieve a Web page from a predetermined C2 server. [1][2]

ID: S0109
Type: MALWARE
Platforms: Windows

Version: 1.1

Techniques Used

DomainIDNameUse
EnterpriseT1059Command-Line InterfaceWEBC2 can open an interactive command shell.[2]
EnterpriseT1038DLL Search Order HijackingVariants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll).[1]
EnterpriseT1105Remote File CopyWEBC2 can download and execute a file.[2]

Groups

Groups that use this software:

APT1

References