enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
Cardinal RAT is downloaded using HTTP over port 443. |
enterprise |
T1560 |
Archive Collected Data |
- |
enterprise |
T1560.002 |
Archive via Library |
Cardinal RAT applies compression to C2 traffic using the ZLIB library. |
enterprise |
T1547 |
Boot or Logon Autostart Execution |
- |
enterprise |
T1547.001 |
Registry Run Keys / Startup Folder |
Cardinal RAT establishes Persistence by setting the HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load Registry key to point to its executable. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.003 |
Windows Command Shell |
Cardinal RAT can execute commands. |
enterprise |
T1140 |
Deobfuscate/Decode Files or Information |
Cardinal RAT decodes many of its artifacts and is decrypted (AES-128) after being downloaded. |
enterprise |
T1573 |
Encrypted Channel |
- |
enterprise |
T1573.001 |
Symmetric Cryptography |
Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic. |
enterprise |
T1008 |
Fallback Channels |
Cardinal RAT can communicate over multiple C2 host and port combinations. |
enterprise |
T1083 |
File and Directory Discovery |
Cardinal RAT checks its current working directory upon execution and also contains watchdog functionality that ensures its executable is located in the correct path (else it will rewrite the payload). |
enterprise |
T1070 |
Indicator Removal |
- |
enterprise |
T1070.004 |
File Deletion |
Cardinal RAT can uninstall itself, including deleting its executable. |
enterprise |
T1105 |
Ingress Tool Transfer |
Cardinal RAT can download and execute additional payloads. |
enterprise |
T1056 |
Input Capture |
- |
enterprise |
T1056.001 |
Keylogging |
Cardinal RAT can log keystrokes. |
enterprise |
T1112 |
Modify Registry |
Cardinal RAT sets HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load to point to its executable. |
enterprise |
T1027 |
Obfuscated Files or Information |
Cardinal RAT encodes many of its artifacts and is encrypted (AES-128) when downloaded. |
enterprise |
T1027.004 |
Compile After Delivery |
Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code. |
enterprise |
T1057 |
Process Discovery |
Cardinal RAT contains watchdog functionality that ensures its process is always running, else spawns a new instance. |
enterprise |
T1055 |
Process Injection |
Cardinal RAT injects into a newly spawned process created from a native Windows executable. |
enterprise |
T1090 |
Proxy |
Cardinal RAT can act as a reverse proxy. |
enterprise |
T1012 |
Query Registry |
Cardinal RAT contains watchdog functionality that periodically ensures HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load is set to point to its executable. |
enterprise |
T1113 |
Screen Capture |
Cardinal RAT can capture screenshots. |
enterprise |
T1082 |
System Information Discovery |
Cardinal RAT can collect the hostname, Microsoft Windows version, and processor architecture from a victim machine. |
enterprise |
T1033 |
System Owner/User Discovery |
Cardinal RAT can collect the username from a victim machine. |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.002 |
Malicious File |
Cardinal RAT lures victims into executing malicious macros embedded within Microsoft Excel documents. |