LITTLELAMB.WOOLTEA is a backdoor that was used by UNC5325 during Cutting Edge to deploy malware on targeted Ivanti Connect Secure VPNs and to establish persistence across system upgrades and patches.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1554 | Compromise Host Software Binary |
LITTLELAMB.WOOLTEA can append malicious components to the |
|
Enterprise | T1543 | Create or Modify System Process |
LITTLELAMB.WOOLTEA can initialize itself as a daemon to run persistently in the background.[1] |
|
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography |
LITTLELAMB.WOOLTEA can communicate over SSL using the private key from the Ivanti Connect Secure web server.[1] |
Enterprise | T1083 | File and Directory Discovery |
LITTLELAMB.WOOLTEA can monitor for system upgrade events by checking for the presence of |
|
Enterprise | T1095 | Non-Application Layer Protocol |
LITTLELAMB.WOOLTEA can function as a stand-alone backdoor communicating over the |
|
Enterprise | T1090 | Proxy |
LITTLELAMB.WOOLTEA has the ability to function as a SOCKS proxy.[1] |
|
Enterprise | T1082 | System Information Discovery |
LITTLELAMB.WOOLTEA can check the type of Ivanti VPN device it is running on by executing |
ID | Name | Description |
---|---|---|
C0029 | Cutting Edge |