| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1622 | Debugger Evasion |
ANELLDR can call |
|
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
ANELLDR can decrypt encrypted payload data using AES-256-CBC and subsequently execute the payload in memory.[1] |
|
| Enterprise | T1083 | File and Directory Discovery |
ANELLDR can enumerate files in the current directory to search for encrypted payload files.[1] |
|
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL |
ANELLDR can use DLL sideloading from a legitimate application to initiate execution. [1] |
| Enterprise | T1106 | Native API |
ANELLDR can use the |
|
| Enterprise | T1027 | Obfuscated Files or Information |
ANELLDR code implements anti-analysis techniques including control flow flattening and Mixed Boolean Arithmetic (MBA).[1] |
|
| .013 | Encrypted/Encoded File |
ANELLDR can update its encryption key to AES-256-CBC and re-encrypt its payload, overwriting the original payload file with the newly encrypted data.[1] |
||
| .016 | Junk Code Insertion | |||
| ID | Name | References |
|---|---|---|
| G1054 | MirrorFace |
| ID | Name | Description |
|---|---|---|
| C0060 | Operation AkaiRyū |
ANELLDR was used in Operation AkaiRyū as part of UPPERCUT infection chains.[1][2] |