Havoc is an open-source post-exploitation command and control (C2) framework first released on GitHub in October 2022 by C5pider (Paul Ungur), who continues to maintain and develop it with community contributors. Havoc provides a wide range of offensive security capabilities and has been adopted by multiple threat actors to establish and maintain control over compromised systems.
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1134 | .001 | Access Token Manipulation: Token Impersonation/Theft | |
| Enterprise | T1087 | Account Discovery |
Havoc can identify privileged user accounts on infected systems.[2] |
|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Havoc can use HTTP/S listeners to establish and maintain C2 communications. [1][3][2][4] |
| .002 | Application Layer Protocol: File Transfer Protocols |
Havoc can use an SMB listener for C2 communication.[1][3][4] |
||
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Havoc can facilitate the execution of PowerShell commands.[4] |
| .003 | Command and Scripting Interpreter: Windows Command Shell | |||
| Enterprise | T1005 | Data from Local System | ||
| Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
Havoc can send an AES encrypted check-in request to the C2 server.[3][2] |
| Enterprise | T1083 | File and Directory Discovery |
The Havoc interface can display a file explorer view of the compromised host.[1] |
|
| Enterprise | T1105 | Ingress Tool Transfer |
Havoc has the ability to upload files to infected systems.[1][4] |
|
| Enterprise | T1559 | Inter-Process Communication |
The Havoc SMB demon can use named pipes for communication through a parent demon.[1] |
|
| Enterprise | T1570 | Lateral Tool Transfer |
Havoc has the ability to copy files from one location to another.[1] |
|
| Enterprise | T1106 | Native API |
Havoc can use |
|
| Enterprise | T1566 | .002 | Phishing: Spearphishing Link |
Havoc has been distributed through ClickFix phishing campaigns.[2] |
| Enterprise | T1057 | Process Discovery | ||
| Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection | |
| .002 | Process Injection: Portable Executable Injection |
Havoc has itself injected into |
||
| Enterprise | T1090 | Proxy |
Havoc has the ability to route HTTP/S communications through designated proxies.[1] |
|
| Enterprise | T1018 | Remote System Discovery | ||
| Enterprise | T1113 | Screen Capture | ||
| Enterprise | T1082 | System Information Discovery |
Havoc can gather system information including hostname, domain, and OS details.[2] |
|
| Enterprise | T1016 | System Network Configuration Discovery |
Havoc has a module for network enumeration including determining IP addresses.[1] |
|
| .001 | Internet Connection Discovery |
The Havoc demon can check for a connection to the C2 server from the target machine.[3] |
||
| Enterprise | T1033 | System Owner/User Discovery |
Havoc can trigger exection of |
|
| Enterprise | T1204 | .004 | User Execution: Malicious Copy and Paste |
The Havoc infection chain has been initiated via ClickFix lures in phishing emails.[2] |
| Enterprise | T1497 | .003 | Virtualization/Sandbox Evasion: Time Based Checks |
The Havoc demon agent can be set to sleep for a specified time.[1][3] |