S0513 LiteDuke
LiteDuke is a third stage backdoor that was used by APT29, primarily in 2014-2015. LiteDuke used the same dropper as PolyglotDuke, and was found on machines also compromised by MiniDuke.1
| Item | Value | 
|---|---|
| ID | S0513 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.0 | 
| Created | 24 September 2020 | 
| Last Modified | 04 October 2021 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1071 | Application Layer Protocol | - | 
| enterprise | T1071.001 | Web Protocols | LiteDuke can use HTTP GET requests in C2 communications.1 | 
| enterprise | T1547 | Boot or Logon Autostart Execution | - | 
| enterprise | T1547.001 | Registry Run Keys / Startup Folder | LiteDuke can create persistence by adding a shortcut in the CurrentVersion\RunRegistry key.1 | 
| enterprise | T1140 | Deobfuscate/Decode Files or Information | LiteDuke has the ability to decrypt and decode multiple layers of obfuscation.1 | 
| enterprise | T1070 | Indicator Removal | - | 
| enterprise | T1070.004 | File Deletion | LiteDuke can securely delete files by first writing random data to the file.1 | 
| enterprise | T1105 | Ingress Tool Transfer | LiteDuke has the ability to download files.1 | 
| enterprise | T1027 | Obfuscated Files or Information | - | 
| enterprise | T1027.002 | Software Packing | LiteDuke has been packed with multiple layers of encryption.1 | 
| enterprise | T1027.003 | Steganography | LiteDuke has used image files to hide its loader component.1 | 
| enterprise | T1012 | Query Registry | LiteDuke can query the Registry to check for the presence of HKCU\Software\KasperskyLab.1 | 
| enterprise | T1518 | Software Discovery | - | 
| enterprise | T1518.001 | Security Software Discovery | LiteDuke has the ability to check for the presence of Kaspersky security software.1 | 
| enterprise | T1082 | System Information Discovery | LiteDuke can enumerate the CPUID and BIOS version on a compromised system.1 | 
| enterprise | T1016 | System Network Configuration Discovery | LiteDuke has the ability to discover the proxy configuration of Firefox and/or Opera.1 | 
| enterprise | T1033 | System Owner/User Discovery | LiteDuke can enumerate the account name on a targeted system.1 | 
| enterprise | T1497 | Virtualization/Sandbox Evasion | - | 
| enterprise | T1497.003 | Time Based Evasion | LiteDuke can wait 30 seconds before executing additional code if security software is detected.1 | 
Groups That Use This Software
| ID | Name | References | 
|---|---|---|
| G0016 | APT29 | 12 |