S0537 HyperStack
HyperStack is a RPC-based backdoor used by Turla since at least 2018. HyperStack has similarities to other backdoors used by Turla including Carbon.1
Item | Value |
---|---|
ID | S0537 |
Associated Names | |
Type | MALWARE |
Version | 1.0 |
Created | 02 December 2020 |
Last Modified | 04 December 2020 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1087 | Account Discovery | - |
enterprise | T1087.001 | Local Account | HyperStack can enumerate all account names on a remote share.1 |
enterprise | T1573 | Encrypted Channel | - |
enterprise | T1573.001 | Symmetric Cryptography | HyperStack has used RSA encryption for C2 communications.1 |
enterprise | T1559 | Inter-Process Communication | HyperStack can connect to the IPC$ share on remote machines.1 |
enterprise | T1112 | Modify Registry | HyperStack can add the name of its communication pipe to HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\NullSessionPipes .1 |
enterprise | T1106 | Native API | HyperStack can use Windows API’s ConnectNamedPipe and WNetAddConnection2 to detect incoming connections and connect to remote shares.1 |
enterprise | T1078 | Valid Accounts | - |
enterprise | T1078.001 | Default Accounts | HyperStack can use default credentials to connect to IPC$ shares on remote machines.1 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0010 | Turla | 1 |