S0515 WellMail
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.12
| Item | Value | 
|---|---|
| ID | S0515 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.0 | 
| Created | 29 September 2020 | 
| Last Modified | 09 October 2020 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1560 | Archive Collected Data | WellMail can archive files on the compromised host.1 | 
| enterprise | T1005 | Data from Local System | WellMail can exfiltrate files from the victim machine.1 | 
| enterprise | T1140 | Deobfuscate/Decode Files or Information | WellMail can decompress scripts received from C2.1 | 
| enterprise | T1573 | Encrypted Channel | - | 
| enterprise | T1573.002 | Asymmetric Cryptography | WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS.12 | 
| enterprise | T1105 | Ingress Tool Transfer | WellMail can receive data and executable scripts from C2.1 | 
| enterprise | T1095 | Non-Application Layer Protocol | WellMail can use TCP for C2 communications.1 | 
| enterprise | T1571 | Non-Standard Port | WellMail has been observed using TCP port 25, without using SMTP, to leverage an open port for secure command and control communications.12 | 
| enterprise | T1016 | System Network Configuration Discovery | WellMail can identify the IP address of the victim system.1 | 
| enterprise | T1033 | System Owner/User Discovery | WellMail can identify the current username on the victim system.1 | 
Groups That Use This Software
| ID | Name | References | 
|---|---|---|
| G0016 | APT29 | 123 | 
References
- 
CISA. (2020, July 16). MAR-10296782-3.v1 – WELLMAIL. Retrieved September 29, 2020. ↩↩↩↩↩↩↩↩↩↩↩
 - 
National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020. ↩↩↩↩
 - 
NCSC, CISA, FBI, NSA. (2021, May 7). Further TTPs associated with SVR cyber actors. Retrieved July 29, 2021. ↩