Skip to content

S0586 TAINTEDSCRIBE

TAINTEDSCRIBE is a fully-featured beaconing implant integrated with command modules used by Lazarus Group. It was first reported in May 2020.1

Item Value
ID S0586
Associated Names
Type MALWARE
Version 1.0
Created 05 March 2021
Last Modified 26 April 2021
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1560 Archive Collected Data TAINTEDSCRIBE has used FileReadZipSend to compress a file and send to C2.1
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder TAINTEDSCRIBE can copy itself into the current user’s Startup folder as “Narrator.exe” for persistence.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell TAINTEDSCRIBE can enable Windows CLI access and execute files.1
enterprise T1001 Data Obfuscation -
enterprise T1001.003 Protocol Impersonation TAINTEDSCRIBE has used FakeTLS for session authentication.1
enterprise T1573 Encrypted Channel -
enterprise T1573.001 Symmetric Cryptography TAINTEDSCRIBE uses a Linear Feedback Shift Register (LFSR) algorithm for network encryption.1
enterprise T1008 Fallback Channels TAINTEDSCRIBE can randomly pick one of five hard-coded IP addresses for C2 communication; if one of the IP fails, it will wait 60 seconds and then try another IP address.1
enterprise T1083 File and Directory Discovery TAINTEDSCRIBE can use DirectoryList to enumerate files in a specified directory.1
enterprise T1070 Indicator Removal -
enterprise T1070.004 File Deletion TAINTEDSCRIBE can delete files from a compromised host.1
enterprise T1070.006 Timestomp TAINTEDSCRIBE can change the timestamp of specified filenames.1
enterprise T1105 Ingress Tool Transfer TAINTEDSCRIBE can download additional modules from its C2 server.1
enterprise T1036 Masquerading -
enterprise T1036.005 Match Legitimate Name or Location The TAINTEDSCRIBE main executable has disguised itself as Microsoft’s Narrator.1
enterprise T1027 Obfuscated Files or Information -
enterprise T1027.001 Binary Padding TAINTEDSCRIBE can execute FileRecvWriteRand to append random bytes to the end of a file received from C2.1
enterprise T1057 Process Discovery TAINTEDSCRIBE can execute ProcessList for process discovery.1
enterprise T1018 Remote System Discovery The TAINTEDSCRIBE command and execution module can perform target system enumeration.1
enterprise T1082 System Information Discovery TAINTEDSCRIBE can use DriveList to retrieve drive information.1
enterprise T1124 System Time Discovery TAINTEDSCRIBE can execute GetLocalTime for time discovery.1

Groups That Use This Software

ID Name References
G0032 Lazarus Group 1

References