Skip to content

S0568 EVILNUM

EVILNUM is fully capable backdoor that was first identified in 2018. EVILNUM is used by the APT group Evilnum which has the same name.12

Item Value
ID S0568
Associated Names
Type MALWARE
Version 1.0
Created 28 January 2021
Last Modified 19 January 2022
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder EVILNUM can achieve persistence through the Registry Run key.12
enterprise T1041 Exfiltration Over C2 Channel EVILNUM can upload files over the C2 channel from the infected host.2
enterprise T1070 Indicator Removal EVILNUM has a function called “DeleteLeftovers” to remove certain artifacts of the attack.2
enterprise T1070.006 Timestomp EVILNUM has changed the creation date of files.2
enterprise T1105 Ingress Tool Transfer EVILNUM can download and upload files to the victim’s computer.12
enterprise T1112 Modify Registry EVILNUM can make modifications to the Regsitry for persistence.2
enterprise T1518 Software Discovery -
enterprise T1518.001 Security Software Discovery EVILNUM can search for anti-virus products on the system.2
enterprise T1539 Steal Web Session Cookie EVILNUM can harvest cookies and upload them to the C2 server.2
enterprise T1218 System Binary Proxy Execution -
enterprise T1218.010 Regsvr32 EVILNUM can run a remote scriptlet that drops a file and executes it via regsvr32.exe.1
enterprise T1218.011 Rundll32 EVILNUM can execute commands and scripts through rundll32.2
enterprise T1082 System Information Discovery EVILNUM can obtain the computer name from the victim’s system.2
enterprise T1033 System Owner/User Discovery EVILNUM can obtain the username from the victim’s machine.2
enterprise T1102 Web Service -
enterprise T1102.003 One-Way Communication EVILNUM has used a one-way communication method via GitLab and Digital Point to perform C2.2
enterprise T1047 Windows Management Instrumentation EVILNUM has used the Windows Management Instrumentation (WMI) tool to enumerate infected machines.2

Groups That Use This Software

ID Name References
G0120 Evilnum 2

References