enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.004 |
Unix Shell |
Penquin can execute remote commands using bash scripts. |
enterprise |
T1573 |
Encrypted Channel |
- |
enterprise |
T1573.002 |
Asymmetric Cryptography |
Penquin can encrypt communications using the BlowFish algorithm and a symmetric key exchanged with Diffie Hellman. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
Penquin can execute the command code do_upload to send files to C2. |
enterprise |
T1083 |
File and Directory Discovery |
Penquin can use the command code do_vslist to send file names, size, and status to C2. |
enterprise |
T1222 |
File and Directory Permissions Modification |
- |
enterprise |
T1222.002 |
Linux and Mac File and Directory Permissions Modification |
Penquin can add the executable flag to a downloaded file. |
enterprise |
T1070 |
Indicator Removal |
- |
enterprise |
T1070.004 |
File Deletion |
Penquin can delete downloaded executables after running them. |
enterprise |
T1105 |
Ingress Tool Transfer |
Penquin can execute the command code do_download to retrieve remote files from C2. |
enterprise |
T1036 |
Masquerading |
- |
enterprise |
T1036.005 |
Match Legitimate Name or Location |
Penquin has mimicked the Cron binary to hide itself on compromised systems. |
enterprise |
T1040 |
Network Sniffing |
Penquin can sniff network traffic to look for packets matching specific conditions. |
enterprise |
T1095 |
Non-Application Layer Protocol |
The Penquin C2 mechanism is based on TCP and UDP packets. |
enterprise |
T1027 |
Obfuscated Files or Information |
Penquin has encrypted strings in the binary for obfuscation. |
enterprise |
T1027.005 |
Indicator Removal from Tools |
Penquin can remove strings from binaries. |
enterprise |
T1053 |
Scheduled Task/Job |
- |
enterprise |
T1053.003 |
Cron |
Penquin can use Cron to create periodic and pre-scheduled background jobs. |
enterprise |
T1082 |
System Information Discovery |
Penquin can report the file system type and disk space of a compromised host to C2. |
enterprise |
T1016 |
System Network Configuration Discovery |
Penquin can report the IP of the compromised host to attacker controlled infrastructure. |
enterprise |
T1205 |
Traffic Signaling |
Penquin will connect to C2 only after sniffing a “magic packet” value in TCP or UDP packets matching specific conditions. |
enterprise |
T1205.002 |
Socket Filters |
Penquin installs a TCP and UDP filter on the eth0 interface. |