S0134 Downdelph
Downdelph is a first-stage downloader written in Delphi that has been used by APT28 in rare instances between 2013 and 2015. 1
Item | Value |
---|---|
ID | S0134 |
Associated Names | |
Type | MALWARE |
Version | 1.2 |
Created | 31 May 2017 |
Last Modified | 30 March 2020 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1548 | Abuse Elevation Control Mechanism | - |
enterprise | T1548.002 | Bypass User Account Control | Downdelph bypasses UAC to escalate privileges by using a custom “RedirectEXE” shim database.1 |
enterprise | T1001 | Data Obfuscation | - |
enterprise | T1001.001 | Junk Data | Downdelph inserts pseudo-random characters between each original character during encoding of C2 network requests, making it difficult to write signatures on them.1 |
enterprise | T1573 | Encrypted Channel | - |
enterprise | T1573.001 | Symmetric Cryptography | Downdelph uses RC4 to encrypt C2 responses.1 |
enterprise | T1574 | Hijack Execution Flow | - |
enterprise | T1574.001 | DLL Search Order Hijacking | Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.1 |
enterprise | T1105 | Ingress Tool Transfer | After downloading its main config file, Downdelph downloads multiple payloads from C2 servers.1 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0007 | APT28 | 12 |