enterprise |
T1074 |
Data Staged |
- |
enterprise |
T1074.001 |
Local Data Staging |
BackdoorDiplomacy has copied files of interest to the main drive’s recycle bin. |
enterprise |
T1190 |
Exploit Public-Facing Application |
BackdoorDiplomacy has exploited CVE-2020-5902, an F5 BIP-IP vulnerability, to drop a Linux backdoor. BackdoorDiplomacy has also exploited mis-configured Plesk servers. |
enterprise |
T1574 |
Hijack Execution Flow |
- |
enterprise |
T1574.001 |
DLL Search Order Hijacking |
BackdoorDiplomacy has executed DLL search order hijacking. |
enterprise |
T1105 |
Ingress Tool Transfer |
BackdoorDiplomacy has downloaded additional files and tools onto a compromised host. |
enterprise |
T1036 |
Masquerading |
- |
enterprise |
T1036.004 |
Masquerade Task or Service |
BackdoorDiplomacy has disguised their backdoor droppers with naming conventions designed to blend into normal operations. |
enterprise |
T1036.005 |
Match Legitimate Name or Location |
BackdoorDiplomacy has dropped implants in folders named for legitimate software. |
enterprise |
T1046 |
Network Service Discovery |
BackdoorDiplomacy has used SMBTouch, a vulnerability scanner, to determine whether a target is vulnerable to EternalBlue malware. |
enterprise |
T1095 |
Non-Application Layer Protocol |
BackdoorDiplomacy has used EarthWorm for network tunneling with a SOCKS5 server and port transfer functionalities. |
enterprise |
T1027 |
Obfuscated Files or Information |
BackdoorDiplomacy has obfuscated tools and malware it uses with VMProtect. |
enterprise |
T1588 |
Obtain Capabilities |
- |
enterprise |
T1588.001 |
Malware |
BackdoorDiplomacy has obtained and used leaked malware, including DoublePulsar, EternalBlue, EternalRocks, and EternalSynergy, in its operations. |
enterprise |
T1588.002 |
Tool |
BackdoorDiplomacy has obtained a variety of open-source reconnaissance and red team tools for discovery and lateral movement. |
enterprise |
T1120 |
Peripheral Device Discovery |
BackdoorDiplomacy has used an executable to detect removable media, such as USB flash drives. |
enterprise |
T1055 |
Process Injection |
- |
enterprise |
T1055.001 |
Dynamic-link Library Injection |
BackdoorDiplomacy has dropped legitimate software onto a compromised host and used it to execute malicious DLLs. |
enterprise |
T1505 |
Server Software Component |
- |
enterprise |
T1505.003 |
Web Shell |
BackdoorDiplomacy has used web shells to establish an initial foothold and for lateral movement within a victim’s system. |
enterprise |
T1049 |
System Network Connections Discovery |
BackdoorDiplomacy has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports. |