Skip to content

S0396 EvilBunny

EvilBunny is a C++ malware sample observed since 2011 that was designed to be a execution platform for Lua scripts.1

Item Value
ID S0396
Associated Names
Type MALWARE
Version 1.2
Created 28 June 2019
Last Modified 02 April 2021
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols EvilBunny has executed C2 commands directly via HTTP.1
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder EvilBunny has created Registry keys for persistence in [HKLM
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell EvilBunny has an integrated scripting engine to download and execute Lua scripts.1
enterprise T1203 Exploitation for Client Execution EvilBunny has exploited CVE-2011-4369, a vulnerability in the PRC component in Adobe Reader.1
enterprise T1070 Indicator Removal on Host -
enterprise T1070.004 File Deletion EvilBunny has deleted the initial dropper after running through the environment checks.1
enterprise T1105 Ingress Tool Transfer EvilBunny has downloaded additional Lua scripts from the C2.1
enterprise T1106 Native API EvilBunny has used various API calls as part of its checks to see if the malware is running in a sandbox.1
enterprise T1057 Process Discovery EvilBunny has used EnumProcesses() to identify how many process are running in the environment.1
enterprise T1053 Scheduled Task/Job -
enterprise T1053.005 Scheduled Task EvilBunny has executed commands via scheduled tasks.1
enterprise T1518 Software Discovery -
enterprise T1518.001 Security Software Discovery EvilBunny has been observed querying installed antivirus software.1
enterprise T1124 System Time Discovery EvilBunny has used the API calls NtQuerySystemTime, GetSystemTimeAsFileTime, and GetTickCount to gather time metrics as part of its checks to see if the malware is running in a sandbox.1
enterprise T1497 Virtualization/Sandbox Evasion -
enterprise T1497.001 System Checks EvilBunny‘s dropper has checked the number of processes and the length and strings of its own file name to identify if the malware is in a sandbox environment.1
enterprise T1497.003 Time Based Evasion EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox.1
enterprise T1047 Windows Management Instrumentation EvilBunny has used WMI to gather information about the system.1

References

Back to top