DarkTortilla is a highly configurable .NET-based crypter that has been possibly active since at least August 2015. DarkTortilla has been used to deliver popular information stealers, RATs, and payloads such as Agent Tesla, AsyncRat, NanoCore, RedLine, Cobalt Strike, and Metasploit.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
DarkTortilla has used HTTP and HTTPS for C2.[1] |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
DarkTortilla has established persistence via the |
.004 | Boot or Logon Autostart Execution: Winlogon Helper DLL |
DarkTortilla has established persistence via the |
||
Enterprise | T1115 | Clipboard Data |
DarkTortilla can download a clipboard information stealer module.[1] |
|
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
DarkTortilla can use |
Enterprise | T1622 | Debugger Evasion |
DarkTortilla can detect debuggers by using functions such as |
|
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
DarkTortilla can decrypt its payload and associated configuration elements using the Rijndael cipher.[1] |
|
Enterprise | T1564 | Hide Artifacts |
DarkTortilla has used |
|
Enterprise | T1574 | .012 | Hijack Execution Flow: COR_PROFILER |
DarkTortilla can detect profilers by verifying the |
Enterprise | T1105 | Ingress Tool Transfer |
DarkTortilla can download additional packages for keylogging, cryptocurrency mining, and other capabilities; it can also retrieve malicious payloads such as Agent Tesla, AsyncRat, NanoCore, RedLine, Cobalt Strike, and Metasploit.[1] |
|
Enterprise | T1056 | .001 | Input Capture: Keylogging |
DarkTortilla can download a keylogging module.[1] |
Enterprise | T1559 | .001 | Inter-Process Communication: Component Object Model |
DarkTortilla has used the |
Enterprise | T1036 | Masquerading |
DarkTortilla's payload has been renamed |
|
Enterprise | T1112 | Modify Registry |
DarkTortilla has modified registry keys for persistence.[1] |
|
Enterprise | T1106 | Native API |
DarkTortilla can use a variety of API calls for persistence and defense evasion.[1] |
|
Enterprise | T1027 | Obfuscated Files or Information |
DarkTortilla has been obfuscated with the DeepSea .NET and ConfuserEx code obfuscators.[1] |
|
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
DarkTortilla has been distributed via spearphishing emails containing archive attachments, with file types such as .iso, .zip, .img, .dmg, and .tar, as well as through malicious documents.[1] |
Enterprise | T1057 | Process Discovery |
DarkTortilla can enumerate a list of running processes on a compromised system.[1] |
|
Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection |
DarkTortilla can use a .NET-based DLL named |
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
DarkTortilla can check for the Kaspersky Anti-Virus suite.[1] |
Enterprise | T1082 | System Information Discovery |
DarkTortilla can obtain system information by querying the |
|
Enterprise | T1016 | .001 | System Network Configuration Discovery: Internet Connection Discovery |
DarkTortilla can check for internet connectivity by issuing HTTP GET requests.[1] |
Enterprise | T1007 | System Service Discovery |
DarkTortilla can retrieve information about a compromised system's running services.[1] |
|
Enterprise | T1204 | .002 | User Execution: Malicious File |
DarkTortilla has relied on a user to open a malicious document or archived file delivered via email for initial execution.[1] |
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
DarkTortilla can search a compromised system's running processes and services to detect Hyper-V, QEMU, Virtual PC, Virtual Box, and VMware, as well as Sandboxie.[1] |
.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
DarkTortilla can implement the |
||
Enterprise | T1102 | Web Service |
DarkTortilla can retrieve its primary payload from public sites such as Pastebin and Textbin.[1] |
|
Enterprise | T1047 | Windows Management Instrumentation |
DarkTortilla can use WMI queries to obtain system information.[1] |