SysUpdate is a backdoor written in C++ that has been used by Threat Group-3390 since at least 2020.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .004 | Application Layer Protocol: DNS |
SysUpdate has used DNS TXT requests as for its C2 communication.[2] |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
SysUpdate can use a Registry Run key to establish persistence.[1] |
Enterprise | T1543 | .002 | Create or Modify System Process: Systemd Service |
SysUpdate can copy a script to the user owned |
.003 | Create or Modify System Process: Windows Service | |||
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | |
Enterprise | T1005 | Data from Local System |
SysUpdate can collect information and files from a compromised host.[2] |
|
Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography | |
Enterprise | T1041 | Exfiltration Over C2 Channel | ||
Enterprise | T1083 | File and Directory Discovery | ||
Enterprise | T1564 | .001 | Hide Artifacts: Hidden Files and Directories |
SysUpdate has the ability to set file attributes to hidden.[1] |
Enterprise | T1574 | .002 | Hijack Execution Flow: DLL Side-Loading |
SysUpdate can load DLLs through vulnerable legitimate executables.[1] |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
SysUpdate can delete its configuration file from the targeted system.[1] |
Enterprise | T1105 | Ingress Tool Transfer |
SysUpdate has the ability to download files to a compromised host.[1][2] |
|
Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
SysUpdate has named their unit configuration file similarly to other unit files residing in the same directory, |
Enterprise | T1112 | Modify Registry |
SysUpdate can write its configuration file to |
|
Enterprise | T1106 | Native API |
SysUpdate can call the |
|
Enterprise | T1027 | .002 | Obfuscated Files or Information: Software Packing | |
.011 | Obfuscated Files or Information: Fileless Storage |
SysUpdate can store its encoded configuration file within |
||
.013 | Obfuscated Files or Information: Encrypted/Encoded File | |||
Enterprise | T1057 | Process Discovery |
SysUpdate can collect information about running processes.[2] |
|
Enterprise | T1113 | Screen Capture | ||
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
SysUpdate has been signed with stolen digital certificates.[2] |
Enterprise | T1082 | System Information Discovery |
SysUpdate can collect a system's architecture, operating system version, hostname, and drive information.[1][2] |
|
Enterprise | T1016 | System Network Configuration Discovery |
SysUpdate can collected the IP address and domain name of a compromised host.[2] |
|
.001 | Internet Connection Discovery |
SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process.[2] |
||
Enterprise | T1033 | System Owner/User Discovery |
SysUpdate can collect the username from a compromised host.[2] |
|
Enterprise | T1007 | System Service Discovery |
SysUpdate can collect a list of services on a victim machine.[2] |
|
Enterprise | T1569 | .002 | System Services: Service Execution | |
Enterprise | T1047 | Windows Management Instrumentation |
SysUpdate can use WMI for execution on a compromised host.[1] |
ID | Name | References |
---|---|---|
G0027 | Threat Group-3390 |