S0633 Sliver
Sliver is an open source, cross-platform, red team command and control framework written in Golang.1
Item | Value |
---|---|
ID | S0633 |
Associated Names | |
Type | TOOL |
Version | 1.0 |
Created | 30 July 2021 |
Last Modified | 15 October 2021 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1134 | Access Token Manipulation | Sliver has the ability to manipulate user tokens on targeted Windows systems.12 |
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | Sliver has the ability to support C2 communications over HTTP/S.412 |
enterprise | T1071.004 | DNS | Sliver can support C2 communications over DNS.417 |
enterprise | T1132 | Data Encoding | - |
enterprise | T1132.001 | Standard Encoding | Sliver can use standard encoding techniques like gzip and hex to ASCII to encode the C2 communication payload.6 |
enterprise | T1001 | Data Obfuscation | - |
enterprise | T1001.002 | Steganography | Sliver can encode binary data into a .PNG file for C2 communication.6 |
enterprise | T1573 | Encrypted Channel | - |
enterprise | T1573.001 | Symmetric Cryptography | Sliver can use AES-GCM-256 to encrypt a session key for C2 message exchange.9 |
enterprise | T1573.002 | Asymmetric Cryptography | Sliver can use mutual TLS and RSA cryptography to exchange a session key.419 |
enterprise | T1041 | Exfiltration Over C2 Channel | Sliver can exfiltrate files from the victim using the download command.10 |
enterprise | T1083 | File and Directory Discovery | Sliver can enumerate files on a target system.11 |
enterprise | T1105 | Ingress Tool Transfer | Sliver can upload files from the C2 server to the victim machine using the upload command.5 |
enterprise | T1027 | Obfuscated Files or Information | Sliver can encrypt strings at compile time.12 |
enterprise | T1055 | Process Injection | Sliver can inject code into local and remote processes.12 |
enterprise | T1113 | Screen Capture | Sliver can take screenshots of the victim’s active display.3 |
enterprise | T1016 | System Network Configuration Discovery | Sliver has the ability to gather network configuration information.8 |
enterprise | T1049 | System Network Connections Discovery | Sliver can collect network connection information.12 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0016 | APT29 | 413 |
References
-
Kervella, R. (2019, August 4). Cross-platform General Purpose Implant Framework Written in Golang. Retrieved July 30, 2021. ↩↩↩↩↩↩↩
-
BishopFox. (n.d.). Sliver. Retrieved September 15, 2021. ↩↩↩↩
-
BishopFox. (n.d.). Sliver Screenshot. Retrieved September 16, 2021. ↩
-
NCSC, CISA, FBI, NSA. (2021, May 7). Further TTPs associated with SVR cyber actors. Retrieved July 29, 2021. ↩↩↩↩
-
BishopFox. (n.d.). Sliver Upload. Retrieved September 16, 2021. ↩
-
BishopFox. (n.d.). Sliver HTTP(S) C2. Retrieved September 16, 2021. ↩↩
-
BishopFox. (n.d.). Sliver DNS C2 . Retrieved September 15, 2021. ↩
-
BishopFox. (n.d.). Sliver Ifconfig. Retrieved September 16, 2021. ↩
-
BishopFox. (n.d.). Sliver Transport Encryption. Retrieved September 16, 2021. ↩↩
-
BishopFox. (n.d.). Sliver Download. Retrieved September 16, 2021. ↩
-
BishopFox. (2021, August 18). Sliver Filesystem. Retrieved September 22, 2021. ↩
-
BishopFox. (n.d.). Sliver Netstat. Retrieved September 16, 2021. ↩
-
Secureworks CTU. (n.d.). IRON HEMLOCK. Retrieved February 22, 2022. ↩