Skip to content

S0254 PLAINTEE

PLAINTEE is a malware sample that has been used by Rancor in targeted attacks in Singapore and Cambodia. 1

Item Value
ID S0254
Associated Names
Type MALWARE
Version 1.1
Created 17 October 2018
Last Modified 30 March 2020
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1548 Abuse Elevation Control Mechanism -
enterprise T1548.002 Bypass User Account Control An older variant of PLAINTEE performs UAC bypass.1
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder PLAINTEE gains persistence by adding the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell PLAINTEE uses cmd.exe to execute commands on the victim’s machine.1
enterprise T1573 Encrypted Channel -
enterprise T1573.001 Symmetric Cryptography PLAINTEE encodes C2 beacons using XOR.1
enterprise T1105 Ingress Tool Transfer PLAINTEE has downloaded and executed additional plugins.1
enterprise T1112 Modify Registry PLAINTEE uses reg add to add a Registry Run key for persistence.1
enterprise T1057 Process Discovery PLAINTEE performs the tasklist command to list running processes.1
enterprise T1082 System Information Discovery PLAINTEE collects general system enumeration data about the infected machine and checks the OS version.1
enterprise T1016 System Network Configuration Discovery PLAINTEE uses the ipconfig /all command to gather the victim’s IP address.1

Groups That Use This Software

ID Name References
G0075 Rancor 1

References

Back to top