| enterprise |
T1087 |
Account Discovery |
- |
| enterprise |
T1087.002 |
Domain Account |
ToddyCat has run net user %USER% /dom for account discovery. |
|
|
|
|
| enterprise |
T1560 |
Archive Collected Data |
- |
| enterprise |
T1560.001 |
Archive via Utility |
ToddyCat has leveraged xcopy, 7zip, and RAR to stage and compress collected documents prior to exfiltration. |
| enterprise |
T1059 |
Command and Scripting Interpreter |
- |
| enterprise |
T1059.001 |
PowerShell |
ToddyCat has used Powershell scripts to perform post exploit collection. |
| enterprise |
T1059.003 |
Windows Command Shell |
ToddyCat has used .bat scripts and cmd for execution on compromised hosts. |
| enterprise |
T1005 |
Data from Local System |
ToddyCat has run scripts to collect documents from targeted hosts. |
| enterprise |
T1074 |
Data Staged |
- |
| enterprise |
T1074.002 |
Remote Data Staging |
ToddyCat manually transferred collected files to an exfiltration host using xcopy. |
| enterprise |
T1567 |
Exfiltration Over Web Service |
- |
| enterprise |
T1567.002 |
Exfiltration to Cloud Storage |
ToddyCat has used a DropBox uploader to exfiltrate stolen files. |
| enterprise |
T1190 |
Exploit Public-Facing Application |
ToddyCat has exploited the ProxyLogon vulnerability (CVE-2021-26855) to compromise Exchange Servers at multiple organizations. |
| enterprise |
T1083 |
File and Directory Discovery |
ToddyCat has run scripts to enumerate recently modified documents having either a .pdf, .doc, .docx, .xls or .xlsx extension. |
| enterprise |
T1564 |
Hide Artifacts |
- |
| enterprise |
T1564.003 |
Hidden Window |
ToddyCat has hidden malicious scripts using powershell.exe -windowstyle hidden. |
| enterprise |
T1562 |
Impair Defenses |
- |
| enterprise |
T1562.004 |
Disable or Modify System Firewall |
Prior to executing a backdoor ToddyCat has run cmd /c start /b netsh advfirewall firewall add rule name="SGAccessInboundRule" dir=in protocol=udp action=allow localport=49683 to allow the targeted system to receive UDP packets on port 49683. |
| enterprise |
T1680 |
Local Storage Discovery |
ToddyCat has collected information on bootable drives including model, vendor, and serial numbers. |
| enterprise |
T1036 |
Masquerading |
- |
| enterprise |
T1036.005 |
Match Legitimate Resource Name or Location |
ToddyCat has used the name debug.exe for malware components. |
| enterprise |
T1106 |
Native API |
ToddyCat has used WinExec to execute commands received from C2 on compromised hosts. |
| enterprise |
T1095 |
Non-Application Layer Protocol |
ToddyCat has used a passive backdoor that receives commands with UDP packets. |
| enterprise |
T1069 |
Permission Groups Discovery |
- |
| enterprise |
T1069.002 |
Domain Groups |
ToddyCat has executed net group "domain admins" /dom for discovery on compromised machines. |
| enterprise |
T1566 |
Phishing |
- |
| enterprise |
T1566.003 |
Spearphishing via Service |
ToddyCat has sent loaders configured to run Ninja as zip archives via Telegram. |
| enterprise |
T1057 |
Process Discovery |
ToddyCat has run cmd /c start /b tasklist to enumerate processes. |
| enterprise |
T1021 |
Remote Services |
- |
| enterprise |
T1021.002 |
SMB/Windows Admin Shares |
ToddyCat has used locally mounted network shares for lateral movement through targated environments. |
| enterprise |
T1018 |
Remote System Discovery |
ToddyCat has used ping %REMOTE_HOST% for post exploit discovery. |
| enterprise |
T1053 |
Scheduled Task/Job |
- |
| enterprise |
T1053.005 |
Scheduled Task |
ToddyCat has used scheduled tasks to execute discovery commands and scripts for collection. |
| enterprise |
T1518 |
Software Discovery |
- |
| enterprise |
T1518.001 |
Security Software Discovery |
ToddyCat can determine is Kaspersky software is running on an endpoint by running cmd /c wmic process where name="avp.exe". |
| enterprise |
T1049 |
System Network Connections Discovery |
ToddyCat has used netstat -anop tcp to discover TCP connections to compromised hosts. |
| enterprise |
T1078 |
Valid Accounts |
- |
| enterprise |
T1078.002 |
Domain Accounts |
ToddyCat has used compromised domain admin credentials to mount local network shares. |
| enterprise |
T1047 |
Windows Management Instrumentation |
ToddyCat has used WMI to execute scripts for post exploit document collection. |