SpicyOmelette is a JavaScript based remote access tool that has been used by Cobalt Group since at least 2018.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .007 | Command and Scripting Interpreter: JavaScript |
SpicyOmelette has the ability to execute arbitrary JavaScript code on a compromised host.[1] |
Enterprise | T1005 | Data from Local System |
SpicyOmelette has collected data and other information from a compromised host.[1] |
|
Enterprise | T1105 | Ingress Tool Transfer |
SpicyOmelette can download malicious files from threat actor controlled AWS URL's.[1] |
|
Enterprise | T1566 | .002 | Phishing: Spearphishing Link |
SpicyOmelette has been distributed via emails containing a malicious link that appears to be a PDF document.[1] |
Enterprise | T1018 | Remote System Discovery |
SpicyOmelette can identify payment systems, payment gateways, and ATM systems in compromised environments.[1] |
|
Enterprise | T1518 | Software Discovery |
SpicyOmelette can enumerate running software on a targeted system.[1] |
|
.001 | Security Software Discovery |
SpicyOmelette can check for the presence of 29 different antivirus tools.[1] |
||
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
SpicyOmelette has been signed with valid digital certificates.[1] |
Enterprise | T1082 | System Information Discovery |
SpicyOmelette can identify the system name of a compromised host.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery |
SpicyOmelette can identify the IP of a compromised system.[1] |
|
Enterprise | T1204 | .001 | User Execution: Malicious Link |
SpicyOmelette has been executed through malicious links within spearphishing emails.[1] |
ID | Name | References |
---|---|---|
G0080 | Cobalt Group |