Register to stream ATT&CKcon 2.0 October 29-30

KEYMARBLE

KEYMARBLE is a Trojan that has reportedly been used by the North Korean government. [1]

ID: S0271
Type: MALWARE
Platforms: Windows
Version: 1.0

Techniques Used

Domain ID Name Use
Enterprise T1059 Command-Line Interface KEYMARBLE can execute shell commands using cmd.exe. [1]
Enterprise T1043 Commonly Used Port KEYMARBLE uses port 443 for C2. [1]
Enterprise T1024 Custom Cryptographic Protocol KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications. [1]
Enterprise T1083 File and Directory Discovery KEYMARBLE has a command to search for files on the victim’s machine. [1]
Enterprise T1107 File Deletion KEYMARBLE has the capability to delete files off the victim’s machine. [1]
Enterprise T1112 Modify Registry KEYMARBLE has a command to create Registry entries for storing data under HKEY_CURRENT_USER\SOFTWARE\Microsoft\WABE\DataPath. [1]
Enterprise T1057 Process Discovery KEYMARBLE can obtain a list of running processes on the system. [1]
Enterprise T1105 Remote File Copy KEYMARBLE can upload files to the victim’s machine and can download additional payloads. [1]
Enterprise T1113 Screen Capture KEYMARBLE can capture screenshots of the victim’s machine. [1]
Enterprise T1082 System Information Discovery KEYMARBLE has the capability to collect the computer name, language settings, the OS version, CPU information, disk devices, and time elapsed since system start. [1]
Enterprise T1016 System Network Configuration Discovery KEYMARBLE gathers the MAC address of the victim’s machine. [1]

Groups That Use This Software

ID Name References
G0032 Lazarus Group [1]

References