HiddenFace

HiddenFace is a modular backdoor developed and used exclusively by MirrorFace since at least 2021. HiddenFace can communicate both actively and passively and has been used against political and academic targets.[1][2][3]

ID: S9023
Associated Software: NOOPDOOR
Type: MALWARE
Platforms: Windows
Contributors: Dominik Breitenbacher, ESET
Version: 1.0
Created: 17 April 2026
Last Modified: 24 April 2026

Associated Software Descriptions

Name Description
NOOPDOOR

[4][2][3]

Techniques Used

Domain ID Name Use
Enterprise T1005 Data from Local System

HiddenFace can upload files from the victim machine to C2 nodes.[2][1]

Enterprise T1140 Deobfuscate/Decode Files or Information

HiddenFace has the ability to decrypt its payload prior to execution.[4][1]

Enterprise T1686 .003 Disable or Modify System Firewall: Windows Host Firewall

HiddenFace can reconfigure Windows firewalls to enable communication by adding a rule named "Cortana" to allow inbound connection to TCP/47000.[4][2]

Enterprise T1568 .002 Dynamic Resolution: Domain Generation Algorithms

HiddenFace has used dynamic domain generation algorithms in C2.[4][2][3][1]

Enterprise T1573 .001 Encrypted Channel: Symmetric Cryptography

HiddenFace can use a randomly selected symmetric encryption algorithm for C2.[4]

.002 Encrypted Channel: Asymmetric Cryptography

HiddenFace can use RSA-2048 in addition to symmetric algorithms in C2.[2]

Enterprise T1480 Execution Guardrails

HiddenFace can check for the presence of specific analysis tools and will terminate itself if they are found.[2]

.002 Mutual Exclusion

HiddenFace can create a mutex to ensure only one instance is running at a time.[4]

Enterprise T1190 Exploit Public-Facing Application

HiddenFace has exploited vulnerabilities in FortiOS/FortiProxy devices for initial access.[4]

Enterprise T1008 Fallback Channels

HiddenFace can use active and passive C2 modes that use different encryption algorithms and backdoor commands.[2]

Enterprise T1070 .006 Indicator Removal: Timestomp

HiddenFace can alter timestamps for directory content on targeted machines.[4][2][1]

Enterprise T1105 Ingress Tool Transfer

HiddenFace can download files from the C2 to victim systems.[2][1]

Enterprise T1112 Modify Registry

HiddenFace can store its configuration file in the Registry.[1]

Enterprise T1095 Non-Application Layer Protocol

HiddenFace can use a custom TCP protocol over Port 443 for C2.[4][2][1]

Enterprise T1571 Non-Standard Port

HiddenFace's passive mode listens on TCP 47000.[2][1]

Enterprise T1027 .007 Obfuscated Files or Information: Dynamic API Resolution

HiddenFace can dynamically resolve Windows APIs.[4][2]

.013 Obfuscated Files or Information: Encrypted/Encoded File

HiddenFace has encrypted its payload with AES.[4][1]

Enterprise T1057 Process Discovery

HiddenFace can check running processes against a list of blocklisted applications.[4]

Enterprise T1055 Process Injection

HiddenFace can inject code directly into legitimate applications.[1]

Enterprise T1572 Protocol Tunneling

HiddenFace can hide its IP lookup by using DNS over HTTPS (DoH) for C2.[3]

Enterprise T1090 .001 Proxy: Internal Proxy

HiddenFace can act as an internal HTTP proxy within the targeted environment.[2]

Enterprise T1053 .005 Scheduled Task/Job: Scheduled Task

HiddenFace has used scheduled tasks for execution and persistence.[4][2]

Enterprise T1518 .001 Software Discovery: Security Software Discovery

HiddenFace can identify processes identified with security applications and tooling.[4][2]

Enterprise T1082 System Information Discovery

HiddenFace can enumerate the hostname and username of the compromised system.[4][2][1]

Enterprise T1033 System Owner/User Discovery

HiddenFace can collect the username associated with the compromised host.[4]

Enterprise T1127 .001 Trusted Developer Utilities Proxy Execution: MSBuild

HiddenFace can execute a malicious XML file using MSBuild.[1]

Enterprise T1497 .003 Virtualization/Sandbox Evasion: Time Based Checks

HiddenFace can sleep randomly between 30 and 60 seconds to avoid behavioral analysis.[4]

Groups That Use This Software

ID Name References
G1054 MirrorFace

[4][1][2][5][6]

Campaigns

References