Skip to content

S0516 SoreFang

SoreFang is first stage downloader used by APT29 for exfiltration and to load other malware.12

Item Value
ID S0516
Associated Names
Type MALWARE
Version 1.0
Created 29 September 2020
Last Modified 06 October 2020
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1087 Account Discovery -
enterprise T1087.001 Local Account SoreFang can collect usernames from the local system via net.exe user.2
enterprise T1087.002 Domain Account SoreFang can enumerate domain accounts via net.exe user /domain.2
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols SoreFang can use HTTP in C2 communications.21
enterprise T1140 Deobfuscate/Decode Files or Information SoreFang can decode and decrypt exfiltrated data sent to C2.2
enterprise T1190 Exploit Public-Facing Application SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries.2
enterprise T1083 File and Directory Discovery SoreFang has the ability to list directories.2
enterprise T1105 Ingress Tool Transfer SoreFang can download additional payloads from C2.21
enterprise T1027 Obfuscated Files or Information SoreFang has the ability to encode and RC6 encrypt data sent to C2.2
enterprise T1069 Permission Groups Discovery -
enterprise T1069.002 Domain Groups SoreFang can enumerate domain groups by executing net.exe group /domain.2
enterprise T1057 Process Discovery SoreFang can enumerate processes on a victim machine through use of Tasklist.2
enterprise T1053 Scheduled Task/Job -
enterprise T1053.005 Scheduled Task SoreFang can gain persistence through use of scheduled tasks.2
enterprise T1082 System Information Discovery SoreFang can collect the hostname, operating system configuration, product ID, and disk space on victim machines by executing Systeminfo.2
enterprise T1016 System Network Configuration Discovery SoreFang can collect the TCP/IP, DNS, DHCP, and network adapter configuration on a compromised host via ipconfig.exe /all.2

Groups That Use This Software

ID Name References
G0016 APT29 12

References