NOOPLDR is a shellcode loader with XML/C# and DLL versions that has been used by MirrorFace to load HiddenFace.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
| Enterprise | T1564 | Hide Artifacts | ||
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL | |
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
NOOPLDR can delete a file containing configuration instructions after use.[1] |
| Enterprise | T1112 | Modify Registry |
NOOPLDR can store its payload in the Registry using a random hex string in |
|
| Enterprise | T1106 | Native API |
NOOPLDR can use native APIs |
|
| Enterprise | T1027 | Obfuscated Files or Information |
NOOPLDR can use control flow flattening to help hide malicious code.[1][2] |
|
| .013 | Encrypted/Encoded File | |||
| .016 | Junk Code Insertion |
NOOPLDR can insert junk code to obfuscate malicious payloads.[1][2] |
||
| Enterprise | T1055 | Process Injection |
NOOPLDR can inject decrypted payloads into processes including wuauclt.exe., rdrleakdiag.exe, and tabcal.exe.[1] |
|
| Enterprise | T1082 | System Information Discovery |
NOOPLDR can discover the device ID and hostname from the targeted machine to use for encryption keys.[1] |
|
| ID | Name | References |
|---|---|---|
| G1054 | MirrorFace |
MirrorFace has used NOOPLDR during operations.[1] |