HTTPTroy is a highly obfuscated backdoor that facilitates collection, command and control, defense evasion and exfiltration. HTTPTroy was first reported in October 2025. HTTPTroy has been observed in operations attributed to DPRK-affiliated threat actors, including Kimsuky. HTTPTroy has been delivered to victims through a separate loader leveraged by Kimsuky.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1548 | .002 | Abuse Elevation Control Mechanism: Bypass User Account Control |
HTTPTroy has leveraged the ability to execute commands with system privileges using the |
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
HTTPTroy has used HTTP POST requests to communicate with C2.[1] |
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
HTTPTroy has the ability to generate a reverse shell using the command |
| Enterprise | T1132 | .002 | Data Encoding: Non-Standard Encoding |
HTTPTroy has obfuscated HTTP POST request communications utilizing XOR with a designated key of 0x56, followed by Base64 encoding.[1] |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
HTTPTroy has decoded strings encoded with Base64 and XOR prior to execution.[1] |
|
| Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
HTTPTroy has obfuscated request communications utilizing XOR encryption.[1] |
| Enterprise | T1041 | Exfiltration Over C2 Channel |
HTTPTroy has exfiltrated encrypted data over the C2 channel using the |
|
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
HTTPTroy can terminate its running process and then remove traces of itself through the |
| Enterprise | T1105 | Ingress Tool Transfer |
HTTPTroy has the ability to download files from C2 using the |
|
| Enterprise | T1106 | Native API |
HTTPTroy has leveraged Windows Native API calls, including |
|
| Enterprise | T1027 | Obfuscated Files or Information |
HTTPTroy has obfuscated strings using Single Instruction Multiple Data (SIMD) instructions to hinder analysis and detection.[1] |
|
| .007 | Dynamic API Resolution |
HTTPTroy has utilized dynamic API resolution by reconstructing API calls during runtime using combinations of arithmetic and logical operations to complicate static analysis.[1] |
||
| Enterprise | T1113 | Screen Capture |
HTTPTroy has obtained screen captures leveraging the |
|