SoreFang

SoreFang is first stage downloader used by APT29 for exfiltration and to load other malware.[1][2]

ID: S0516
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 29 September 2020
Last Modified: 06 October 2020

Techniques Used

Domain ID Name Use
Enterprise T1087 .001 Account Discovery: Local Account

SoreFang can collect usernames from the local system via net.exe user.[2]

.002 Account Discovery: Domain Account

SoreFang can enumerate domain accounts via net.exe user /domain.[2]

Enterprise T1071 .001 Application Layer Protocol: Web Protocols

SoreFang can use HTTP in C2 communications.[2][1]

Enterprise T1140 Deobfuscate/Decode Files or Information

SoreFang can decode and decrypt exfiltrated data sent to C2.[2]

Enterprise T1190 Exploit Public-Facing Application

SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries.[2]

Enterprise T1083 File and Directory Discovery

SoreFang has the ability to list directories.[2]

Enterprise T1105 Ingress Tool Transfer

SoreFang can download additional payloads from C2.[2][1]

Enterprise T1027 Obfuscated Files or Information

SoreFang has the ability to encode and RC6 encrypt data sent to C2.[2]

Enterprise T1069 .002 Permission Groups Discovery: Domain Groups

SoreFang can enumerate domain groups by executing net.exe group /domain.[2]

Enterprise T1057 Process Discovery

SoreFang can enumerate processes on a victim machine through use of Tasklist.[2]

Enterprise T1053 .005 Scheduled Task/Job: Scheduled Task

SoreFang can gain persistence through use of scheduled tasks.[2]

Enterprise T1082 System Information Discovery

SoreFang can collect the hostname, operating system configuration, product ID, and disk space on victim machines by executing Systeminfo.[2]

Enterprise T1016 System Network Configuration Discovery

SoreFang can collect the TCP/IP, DNS, DHCP, and network adapter configuration on a compromised host via ipconfig.exe /all.[2]

Groups That Use This Software

ID Name References
G0016 APT29

[1][2]

References