Kapeka is a backdoor written in C++ used against victims in Eastern Europe since at least mid-2022. Kapeka has technical overlaps with Exaramel for Windows and Prestige malware variants, both of which are linked to Sandworm Team. Kapeka may have been used in advance of Prestige deployment in late 2022.[1][2]
Name | Description |
---|---|
KnuckleTouch |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding |
Kapeka utilizes JSON objects to send and receive information from command and control nodes.[1] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
Kapeka utilizes obfuscated JSON structures for various data storage and configuration management items.[1] |
|
Enterprise | T1070 | .009 | Indicator Removal: Clear Persistence |
Kapeka will clear registry values used for persistent configuration storage when uninstalled.[1] |
Enterprise | T1036 | .008 | Masquerading: Masquerade File Type |
Kapeka masquerades as a Microsoft Word Add-In file, with the extension |
Enterprise | T1112 | Modify Registry |
Kapeka writes persistent configuration information to the victim host registry.[1] |
|
Enterprise | T1106 | Native API |
Kapeka utilizes WinAPI calls to gather victim system information.[1] |
|
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
Kapeka utilizes AES-256 (CBC mode), XOR, and RSA-2048 encryption schemas for various configuration and other objects.[1] |
Enterprise | T1090 | Proxy |
Kapeka can identify system proxy settings via |
|
Enterprise | T1012 | Query Registry |
Kapeka queries registry values for stored configuration information.[1] |
|
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task | |
Enterprise | T1218 | .011 | System Binary Proxy Execution: Rundll32 |
Kapeka is a Windows DLL file executed via ordinal by |
Enterprise | T1082 | System Information Discovery |
Kapeka utilizes WinAPI calls and registry queries to gather system information.[1] |
ID | Name | References |
---|---|---|
G0034 | Sandworm Team |
Kapeka is associated with Sandworm Team operations and previous malware variants such as GreyEnergy.[2][1] |