ROAMINGHOUSE is a dropper malware used by MirrorFace to extract and execute embedded payloads including UPPERCUT components.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
ROAMINGHOUSE can decode and drop a malicious ZIP file prior to execution.[1] |
|
| Enterprise | T1480 | Execution Guardrails |
ROAMINGHOUSE can change its execution method to create a batch file in the startup folder that executes a legitimate executable if a McAfee product is detected.[1] |
|
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL |
ROAMINGHOUSE can use a legitimate EXE to sideload a malicious DLL named JSFC.dll.[1] ROAMINGHOUSE has also used ScnCfg32.exe to sideload vsodscpl.dll to enable UPPERCUT execution.[2] |
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
ROAMINGHOUSE can embed a ZIP file containing UPPERCUT components into three base64 encoded parts.[2] |
| Enterprise | T1137 | .001 | Office Application Startup: Office Template Macros |
ROAMINGHOUSE has been loaded as a Word Template file when victims opened a decoy document placed in |
| Enterprise | T1566 | .002 | Phishing: Spearphishing Link |
ROAMINGHOUSE has been distributed through phishing emails containing malicious OneDrive links.[1] |
| Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
ROAMINGHOUSE can identify McAfee applications on compromised hosts and change its execution method if one is detected.[1] |
| Enterprise | T1204 | .001 | User Execution: Malicious Link |
ROAMINGHOUSE has been executed through luring victims into clicking links to download malicious ZIP files.[1] |
| .002 | User Execution: Malicious File |
During Operation AkaiRyū, MirrorFace used malicious files to drop ROAMINGHOUSE.[2] |
||
| Enterprise | T1497 | .002 | Virtualization/Sandbox Evasion: User Activity Based Checks |
ROAMINGHOUSE can check for specific mouse movements and user activity before initiating malicious activity.[2] |
| Enterprise | T1047 | Windows Management Instrumentation |
ROAMINGHOUSE can use WMI to launch a legitimate executable later used to enable DLL sideloading.[1][2] |
|
| ID | Name | References |
|---|---|---|
| G1054 | MirrorFace |
| ID | Name | Description |
|---|---|---|
| C0060 | Operation AkaiRyū |
During Operation AkaiRyū, MirrorFace used ROAMINGHOUSE.[2] |