enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
Stealth Falcon malware communicates with its C2 server via HTTPS. |
enterprise |
T1059 |
Command and Scripting Interpreter |
Stealth Falcon malware uses WMI to script data collection and command execution on the victim. |
enterprise |
T1059.001 |
PowerShell |
Stealth Falcon malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server. |
enterprise |
T1555 |
Credentials from Password Stores |
Stealth Falcon malware gathers passwords from multiple sources, including Windows Credential Vault and Outlook. |
enterprise |
T1555.003 |
Credentials from Web Browsers |
Stealth Falcon malware gathers passwords from multiple sources, including Internet Explorer, Firefox, and Chrome. |
enterprise |
T1555.004 |
Windows Credential Manager |
Stealth Falcon malware gathers passwords from the Windows Credential Vault. |
enterprise |
T1005 |
Data from Local System |
Stealth Falcon malware gathers data from the local victim system. |
enterprise |
T1573 |
Encrypted Channel |
- |
enterprise |
T1573.001 |
Symmetric Cryptography |
Stealth Falcon malware encrypts C2 traffic using RC4 with a hard-coded key. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
After data is collected by Stealth Falcon malware, it is exfiltrated over the existing C2 channel. |
enterprise |
T1057 |
Process Discovery |
Stealth Falcon malware gathers a list of running processes. |
enterprise |
T1012 |
Query Registry |
Stealth Falcon malware attempts to determine the installed version of .NET by querying the Registry. |
enterprise |
T1053 |
Scheduled Task/Job |
- |
enterprise |
T1053.005 |
Scheduled Task |
Stealth Falcon malware creates a scheduled task entitled “IE Web Cache” to execute a malicious file hourly. |
enterprise |
T1082 |
System Information Discovery |
Stealth Falcon malware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory. |
enterprise |
T1016 |
System Network Configuration Discovery |
Stealth Falcon malware gathers the Address Resolution Protocol (ARP) table from the victim. |
enterprise |
T1033 |
System Owner/User Discovery |
Stealth Falcon malware gathers the registered user and primary owner name via WMI. |
enterprise |
T1047 |
Windows Management Instrumentation |
Stealth Falcon malware gathers system information via Windows Management Instrumentation (WMI). |