The sub-techniques beta is now live! Read the release blog post for more info.


HARDRAIN is a Trojan malware variant reportedly used by the North Korean government. [1]

ID: S0246
Platforms: Windows
Version: 1.0
Created: 17 October 2018
Last Modified: 17 October 2018

Techniques Used

Domain ID Name Use
Enterprise T1059 Command-Line Interface

HARDRAIN uses cmd.exe to execute netshcommands.[1]

Enterprise T1043 Commonly Used Port

HARDRAIN binds and listens on port 443.[1]

Enterprise T1090 Connection Proxy

HARDRAIN uses the command cmd.exe /c netsh firewall add portopening TCP 443 "adp" and makes the victim machine function as a proxy server.[1]

Enterprise T1024 Custom Cryptographic Protocol

HARDRAIN uses FakeTLS to communicate with its C2 server.[1]

Enterprise T1089 Disabling Security Tools

HARDRAIN opens the Windows Firewall to modify incoming connections.[1]

Groups That Use This Software

ID Name References
G0032 Lazarus Group [1]