S0060 Sys10
Sys10 is a backdoor that was used throughout 2013 by Naikon. 1
Item | Value |
---|---|
ID | S0060 |
Associated Names | |
Type | MALWARE |
Version | 1.1 |
Created | 31 May 2017 |
Last Modified | 18 March 2020 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | Sys10 uses HTTP for C2.1 |
enterprise | T1573 | Encrypted Channel | - |
enterprise | T1573.001 | Symmetric Cryptography | Sys10 uses an XOR 0x1 loop to encrypt its C2 domain.1 |
enterprise | T1069 | Permission Groups Discovery | - |
enterprise | T1069.001 | Local Groups | Sys10 collects the group name of the logged-in user and sends it to the C2.1 |
enterprise | T1082 | System Information Discovery | Sys10 collects the computer name, OS versioning information, and OS install date and sends the information to the C2.1 |
enterprise | T1016 | System Network Configuration Discovery | Sys10 collects the local IP address of the victim and sends it to the C2.1 |
enterprise | T1033 | System Owner/User Discovery | Sys10 collects the account name of the logged-in user and sends it to the C2.1 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0019 | Naikon | 1 |