Skip to content

S0342 GreyEnergy

GreyEnergy is a backdoor written in C and compiled in Visual Studio. GreyEnergy shares similarities with the BlackEnergy malware and is thought to be the successor of it.1

Item Value
ID S0342
Associated Names
Type MALWARE
Version 1.1
Created 30 January 2019
Last Modified 30 March 2020
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols GreyEnergy uses HTTP and HTTPS for C2 communications.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell GreyEnergy uses cmd.exe to execute itself in-memory.1
enterprise T1543 Create or Modify System Process -
enterprise T1543.003 Windows Service GreyEnergy chooses a service, drops a DLL file, and writes it to that serviceDLL Registry key.1
enterprise T1573 Encrypted Channel -
enterprise T1573.001 Symmetric Cryptography GreyEnergy encrypts communications using AES256.1
enterprise T1573.002 Asymmetric Cryptography GreyEnergy encrypts communications using RSA-2048.1
enterprise T1070 Indicator Removal -
enterprise T1070.004 File Deletion GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API.1
enterprise T1105 Ingress Tool Transfer GreyEnergy can download additional modules and payloads.1
enterprise T1056 Input Capture -
enterprise T1056.001 Keylogging GreyEnergy has a module to harvest pressed keystrokes.1
enterprise T1112 Modify Registry GreyEnergy modifies conditions in the Registry and adds keys.1
enterprise T1027 Obfuscated Files or Information GreyEnergy encrypts its configuration files with AES-256 and also encrypts its strings.1
enterprise T1027.002 Software Packing GreyEnergy is packed for obfuscation.1
enterprise T1003 OS Credential Dumping -
enterprise T1003.001 LSASS Memory GreyEnergy has a module for Mimikatz to collect Windows credentials from the victim’s machine.1
enterprise T1055 Process Injection -
enterprise T1055.002 Portable Executable Injection GreyEnergy has a module to inject a PE binary into a remote process.1
enterprise T1090 Proxy -
enterprise T1090.003 Multi-hop Proxy GreyEnergy has used Tor relays for Command and Control servers.1
enterprise T1553 Subvert Trust Controls -
enterprise T1553.002 Code Signing GreyEnergy digitally signs the malware with a code-signing certificate.1
enterprise T1218 System Binary Proxy Execution -
enterprise T1218.011 Rundll32 GreyEnergy uses PsExec locally in order to execute rundll32.exe at the highest privileges (NTAUTHORITY\SYSTEM).1
enterprise T1007 System Service Discovery GreyEnergy enumerates all Windows services.1

Groups That Use This Software

ID Name References
G0034 Sandworm Team 2

References