S0333 UBoatRAT
UBoatRAT is a remote access tool that was identified in May 2017.1
Item | Value |
---|---|
ID | S0333 |
Associated Names | |
Type | MALWARE |
Version | 1.1 |
Created | 29 January 2019 |
Last Modified | 30 March 2020 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | UBoatRAT has used HTTP for C2 communications.1 |
enterprise | T1197 | BITS Jobs | UBoatRAT takes advantage of the /SetNotifyCmdLine option in BITSAdmin to ensure it stays running on a system to maintain persistence.1 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.003 | Windows Command Shell | UBoatRAT can start a command shell.1 |
enterprise | T1105 | Ingress Tool Transfer | UBoatRAT can upload and download files to the victim’s machine.1 |
enterprise | T1027 | Obfuscated Files or Information | UBoatRAT encrypts instructions in the payload using a simple XOR cipher.1 |
enterprise | T1057 | Process Discovery | UBoatRAT can list running processes on the system.1 |
enterprise | T1497 | Virtualization/Sandbox Evasion | - |
enterprise | T1497.001 | System Checks | UBoatRAT checks for virtualization software such as VMWare, VirtualBox, or QEmu on the compromised machine.1 |
enterprise | T1102 | Web Service | - |
enterprise | T1102.002 | Bidirectional Communication | UBoatRAT has used GitHub and a public blog service in Hong Kong for C2 communications.1 |