Hannotog is a type of backdoor malware uniquely assoicated with Lotus Blossom operations since at least 2022.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1020 | Automated Exfiltration | ||
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
| Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service | |
| Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall |
Hannotog can modify local firewall settings via |
| Enterprise | T1105 | Ingress Tool Transfer |
Hannotog can download additional files to the victim machine.[1] |
|
| Enterprise | T1571 | Non-Standard Port |
Hannotog uses non-standard listening ports, such as UDP 5900, for command and control purposes.[1] |
|
| Enterprise | T1489 | Service Stop | ||
| ID | Name | References |
|---|---|---|
| G0030 | Lotus Blossom |
Hannotog is a backdoor associated with Lotus Blossom operations.[1] |