Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
xCaon has communicated with the C2 server by sending POST requests over HTTP.[1] |
Enterprise | T1547 | Boot or Logon Autostart Execution |
xCaon has added persistence via the Registry key |
|
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | |
Enterprise | T1005 | Data from Local System | ||
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
xCaon has decoded strings from the C2 server before executing commands.[1] |
|
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
xCaon has encrypted data sent to the C2 server using a XOR key.[1] |
Enterprise | T1105 | Ingress Tool Transfer |
xCaon has a command to download files to the victim's machine.[1] |
|
Enterprise | T1106 | Native API |
xCaon has leveraged native OS function calls to retrieve victim's network adapter's information using GetAdapterInfo() API.[1] |
|
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
xCaon has checked for the existence of Kaspersky antivirus software on the system.[1] |
Enterprise | T1016 | System Network Configuration Discovery |
xCaon has used the GetAdaptersInfo() API call to get the victim's MAC address.[1] |
ID | Name | References |
---|---|---|
G0136 | IndigoZebra |