PLAINTEE is a malware sample that has been used by Rancor in targeted attacks in Singapore and Cambodia. [1]

ID: S0254
Platforms: Windows

Version: 1.0

Techniques Used

EnterpriseT1088Bypass User Account ControlAn older variant of PLAINTEE performs UAC bypass.[1]
EnterpriseT1059Command-Line InterfacePLAINTEE uses cmd.exe to execute commands on the victim’s machine.[1]
EnterpriseT1094Custom Command and Control ProtocolPLAINTEE uses a custom UDP protocol to communicate.[1]
EnterpriseT1024Custom Cryptographic ProtocolPLAINTEE encodes C2 beacons using XOR.[1]
EnterpriseT1112Modify RegistryPLAINTEE uses reg add to add a Registry Run key for persistence.[1]
EnterpriseT1057Process DiscoveryPLAINTEE performs the tasklist command to list running processes.[1]
EnterpriseT1060Registry Run Keys / Startup FolderPLAINTEE gains persistence by adding the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.[1]
EnterpriseT1105Remote File CopyPLAINTEE has downloaded and executed additional plugins.[1]
EnterpriseT1082System Information DiscoveryPLAINTEE collects general system enumeration data about the infected machine and checks the OS version.[1]
EnterpriseT1016System Network Configuration DiscoveryPLAINTEE uses the ipconfig /all command to gather the victim’s IP address.[1]


Groups that use this software: