S0574 BendyBear
BendyBear is an x64 shellcode for a stage-zero implant designed to download malware from a C2 server. First discovered in August 2020, BendyBear shares a variety of features with Waterbear, malware previously attributed to the Chinese cyber espionage group BlackTech.1
Item | Value |
---|---|
ID | S0574 |
Associated Names | |
Type | MALWARE |
Version | 1.0 |
Created | 16 February 2021 |
Last Modified | 21 April 2021 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1001 | Data Obfuscation | - |
enterprise | T1001.001 | Junk Data | BendyBear has used byte randomization to obscure its behavior.1 |
enterprise | T1140 | Deobfuscate/Decode Files or Information | BendyBear has decrypted function blocks using a XOR key during runtime to evade detection.1 |
enterprise | T1573 | Encrypted Channel | - |
enterprise | T1573.001 | Symmetric Cryptography | BendyBear communicates to a C2 server over port 443 using modified RC4 and XOR-encrypted chunks.1 |
enterprise | T1105 | Ingress Tool Transfer | BendyBear is designed to download an implant from a C2 server.1 |
enterprise | T1106 | Native API | BendyBear can load and execute modules and Windows Application Programming (API) calls using standard shellcode API hashing.1 |
enterprise | T1571 | Non-Standard Port | BendyBear has used a custom RC4 and XOR encrypted protocol over port 443 for C2.1 |
enterprise | T1027 | Obfuscated Files or Information | BendyBear has encrypted payloads using RC4 and XOR.1 |
enterprise | T1012 | Query Registry | BendyBear can query the host’s Registry key at HKEY_CURRENT_USER\Console\QuickEdit to retrieve data.1 |
enterprise | T1124 | System Time Discovery | BendyBear has the ability to determine local time on a compromised host.1 |
enterprise | T1497 | Virtualization/Sandbox Evasion | - |
enterprise | T1497.003 | Time Based Evasion | BendyBear can check for analysis environments and signs of debugging using the Windows API kernel32!GetTickCountKernel32 call.1 |