Skip to content

S0391 HAWKBALL

HAWKBALL is a backdoor that was observed in targeting of the government sector in Central Asia.1

Item Value
ID S0391
Associated Names
Type MALWARE
Version 1.1
Created 20 June 2019
Last Modified 30 March 2020
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols HAWKBALL has used HTTP to communicate with a single hard-coded C2 server.1
enterprise T1560 Archive Collected Data -
enterprise T1560.003 Archive via Custom Method HAWKBALL has encrypted data with XOR before sending it over the C2 channel.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell HAWKBALL has created a cmd.exe reverse shell, executed commands, and uploaded output via the command line.1
enterprise T1041 Exfiltration Over C2 Channel HAWKBALL has sent system information and files over the C2 channel.1
enterprise T1203 Exploitation for Client Execution HAWKBALL has exploited Microsoft Office vulnerabilities CVE-2017-11882 and CVE-2018-0802 to deliver the payload.1
enterprise T1070 Indicator Removal -
enterprise T1070.004 File Deletion HAWKBALL has the ability to delete files.1
enterprise T1559 Inter-Process Communication -
enterprise T1559.002 Dynamic Data Exchange HAWKBALL has used an OLE object that uses Equation Editor to drop the embedded shellcode.1
enterprise T1106 Native API HAWKBALL has leveraged several Windows API calls to create processes, gather disk information, and detect debugger activity.1
enterprise T1027 Obfuscated Files or Information HAWKBALL has encrypted the payload with an XOR-based algorithm.1
enterprise T1082 System Information Discovery HAWKBALL can collect the OS version, architecture information, and computer name.1
enterprise T1033 System Owner/User Discovery HAWKBALL can collect the user name of the system.1

References