Torisma is a second stage implant designed for specialized monitoring that has been used by Lazarus Group. Torisma was discovered during an investigation into the 2020 Operation North Star campaign that targeted the defense sector.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | |
Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
Torisma has encrypted its C2 communications using XOR and VEST-32.[1] |
Enterprise | T1480 | Execution Guardrails |
Torisma is only delivered to a compromised host if the victim's IP address is on an allow-list.[1] |
|
Enterprise | T1041 | Exfiltration Over C2 Channel |
Torisma can send victim data to an actor-controlled C2 server.[1] |
|
Enterprise | T1106 | Native API | ||
Enterprise | T1027 | .002 | Obfuscated Files or Information: Software Packing | |
.013 | Obfuscated Files or Information: Encrypted/Encoded File | |||
Enterprise | T1082 | System Information Discovery |
Torisma can use |
|
Enterprise | T1016 | System Network Configuration Discovery |
Torisma can collect the local MAC address using |
|
Enterprise | T1049 | System Network Connections Discovery |
Torisma can use |
|
Enterprise | T1124 | System Time Discovery |
Torisma can collect the current time on a victim machine.[1] |
ID | Name | Description |
---|---|---|
C0022 | Operation Dream Job |
During Operation Dream Job, Lazarus Group used Torisma to actively monitor for new drives and remote desktop connections on an infected system.[3][1] |