Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Gomir periodically communicates to its command and control infrastructure through HTTP POST requests.[1] |
Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell |
Gomir reads command line arguments and parses them for functionality when executed from a Linux shell, and can execute arbitrary strings passed to it as shell commands.[1] |
Enterprise | T1543 | .002 | Create or Modify System Process: Systemd Service |
Gomir creates a systemd service named |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding |
Gomir uses Base64-encoded content in HTTP communications to command and control infrastructure.[1] |
Enterprise | T1573 | Encrypted Channel |
Gomir uses a custom encryption algorithm for content sent to command and control infrastructure.[1] |
|
.002 | Asymmetric Cryptography |
Gomir uses reverse proxy functionality that employs SSL to encrypt communications.[1] |
||
Enterprise | T1083 | File and Directory Discovery |
Gomir collects information about directory and file structures, including total number of subdirectories, total number of files, and total size of files on infected systems.[1] |
|
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
Gomir deletes its original executable and terminates its original process after creating a systemd service.[1] |
Enterprise | T1069 | .001 | Permission Groups Discovery: Local Groups |
Gomir checks the effective group ID of its process when initially executed to determine if it is in group 0, denoting superuser privileges in Linux environments.[1] |
Enterprise | T1090 | .001 | Proxy: Internal Proxy |
Gomir can start a reverse proxy to initiate connections to arbitrary endpoints in victim networks.[1] |
Enterprise | T1018 | Remote System Discovery |
Gomir probes arbitrary network endpoints for TCP connectivity.[1] |
|
Enterprise | T1053 | .003 | Scheduled Task/Job: Cron |
Gomir will configure a crontab for process execution to start the backdoor on reboot if it is not initially running under group 0 privileges.[1] |
Enterprise | T1082 | System Information Discovery |
Gomir collects information on infected systems such as hostname, username, CPU, and RAM information.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery |
Gomir collects network information on infected systems such as listing interface names, MAC and IP addresses, and IPv6 addresses.[1] |