enterprise |
T1005 |
Data from Local System |
yty collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server. |
enterprise |
T1083 |
File and Directory Discovery |
yty gathers information on victim’s drives and has a plugin for document listing. |
enterprise |
T1056 |
Input Capture |
- |
enterprise |
T1056.001 |
Keylogging |
yty uses a keylogger plugin to gather keystrokes. |
enterprise |
T1027 |
Obfuscated Files or Information |
- |
enterprise |
T1027.001 |
Binary Padding |
yty contains junk code in its binary, likely to confuse malware analysts. |
enterprise |
T1027.002 |
Software Packing |
yty packs a plugin with UPX. |
enterprise |
T1057 |
Process Discovery |
yty gets an output of running processes using the tasklist command. |
enterprise |
T1018 |
Remote System Discovery |
yty uses the net view command for discovery. |
enterprise |
T1053 |
Scheduled Task/Job |
- |
enterprise |
T1053.005 |
Scheduled Task |
yty establishes persistence by creating a scheduled task with the command SchTasks /Create /SC DAILY /TN BigData /TR “ + path_file + “/ST 09:30“ . |
enterprise |
T1113 |
Screen Capture |
yty collects screenshots of the victim machine. |
enterprise |
T1082 |
System Information Discovery |
yty gathers the computer name, the serial number of the main disk volume, CPU information, Microsoft Windows version, and runs the command systeminfo . |
enterprise |
T1016 |
System Network Configuration Discovery |
yty runs ipconfig /all and collects the domain name. |
enterprise |
T1033 |
System Owner/User Discovery |
yty collects the victim’s username. |
enterprise |
T1497 |
Virtualization/Sandbox Evasion |
- |
enterprise |
T1497.001 |
System Checks |
yty has some basic anti-sandbox detection that tries to detect Virtual PC, Sandboxie, and VMware. |
enterprise |
T1102 |
Web Service |
- |
enterprise |
T1102.002 |
Bidirectional Communication |
yty communicates to the C2 server by retrieving a Google Doc. |