Hannotog is a type of backdoor malware uniquely assoicated with Lotus Blossom operations since at least 2022.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1020 | Automated Exfiltration | ||
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service | |
Enterprise | T1562 | .004 | Impair Defenses: Disable or Modify System Firewall |
Hannotog can modify local firewall settings via |
Enterprise | T1105 | Ingress Tool Transfer |
Hannotog can download additional files to the victim machine.[1] |
|
Enterprise | T1571 | Non-Standard Port |
Hannotog uses non-standard listening ports, such as UDP 5900, for command and control purposes.[1] |
|
Enterprise | T1489 | Service Stop |
ID | Name | References |
---|---|---|
G0030 | Lotus Blossom |
Hannotog is a backdoor associated with Lotus Blossom operations.[1] |