Skip to content

S0017 BISCUIT

BISCUIT is a backdoor that has been used by APT1 since as early as 2007. 1

Item Value
ID S0017
Associated Names
Type MALWARE
Version 1.2
Created 31 May 2017
Last Modified 30 March 2020
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell BISCUIT has a command to launch a command shell on the system.2
enterprise T1573 Encrypted Channel -
enterprise T1573.002 Asymmetric Cryptography BISCUIT uses SSL for encrypting C2 communications.2
enterprise T1008 Fallback Channels BISCUIT malware contains a secondary fallback command and control server that is contacted after the primary command and control server.12
enterprise T1105 Ingress Tool Transfer BISCUIT has a command to download a file from the C2 server.2
enterprise T1056 Input Capture -
enterprise T1056.001 Keylogging BISCUIT can capture keystrokes.2
enterprise T1057 Process Discovery BISCUIT has a command to enumerate running processes and identify their owners.2
enterprise T1113 Screen Capture BISCUIT has a command to periodically take screenshots of the system.2
enterprise T1082 System Information Discovery BISCUIT has a command to collect the processor type, operation system, computer name, uptime, and whether the system is a laptop or PC.2
enterprise T1033 System Owner/User Discovery BISCUIT has a command to gather the username from the system.2

Groups That Use This Software

ID Name References
G0006 APT1 1

References