VIRTUALPITA is a passive backdoor with ESXi and Linux vCenter variants capable of command execution, file transfer, and starting and stopping processes. VIRTUALPITA has been in use since at least 2022 including by UNC3886 who leveraged malicious vSphere Installation Bundles (VIBs) for install on ESXi hypervisors.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1037 | Boot or Logon Initialization Scripts |
VIRTUALPITA can persist as an init.d startup service on Linux vCenter systems.[1] |
|
| Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell |
VIRTUALPITA has the ability to spawn a bash shell for script execution.[1] |
| .006 | Command and Scripting Interpreter: Python |
VIRTUALPITA can call a Python script to run commands on a targeted guest virtual machine.[1] |
||
| Enterprise | T1675 | ESXi Administration Command |
VIRTUALPITA can execute commands on guest virtual machines from compromised ESXi hypervisors.[1] |
|
| Enterprise | T1562 | .003 | Impair Defenses: Impair Command History Logging |
VIRTUALPITA can impair logging by setting the |
| Enterprise | T1105 | Ingress Tool Transfer |
VIRTUALPITA has the ability to upload and download files.[1] |
|
| Enterprise | T1570 | Lateral Tool Transfer |
VIRTUALPITA is capable of file transfer and arbitrary command execution.[1] |
|
| Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
VIRTUALPITA has utilized VMware service names and ports to masquerade as legitimate services.[1] |
| .005 | Masquerading: Match Legitimate Resource Name or Location |
VIRTUALPITA samples have been found in |
||
| Enterprise | T1571 | Non-Standard Port |
VIRTUALPITA has created listeners on hard coded TCP ports such as 2233, 7475, and 18098.[1] |
|
| Enterprise | T1489 | Service Stop |
VIRTUALPITA can start and stop the |
|
| Enterprise | T1673 | Virtual Machine Discovery |
VIRTUALPITA can target specific guest virtual machines for script execution.[1] |
|