S0637 NativeZone
NativeZone is the name given collectively to disposable custom Cobalt Strike loaders used by APT29 since at least 2021.12
Item | Value |
---|---|
ID | S0637 |
Associated Names | |
Type | MALWARE |
Version | 1.0 |
Created | 04 August 2021 |
Last Modified | 16 October 2021 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1140 | Deobfuscate/Decode Files or Information | NativeZone can decrypt and decode embedded Cobalt Strike beacon stage shellcode.1 |
enterprise | T1480 | Execution Guardrails | NativeZone can check for the presence of KM.EkeyAlmaz1C.dll and will halt execution unless it is in the same directory as the rest of the malware’s components.12 |
enterprise | T1036 | Masquerading | NativeZone has, upon execution, displayed a message box that appears to be related to a Ukrainian electronic document management system.2 |
enterprise | T1218 | System Binary Proxy Execution | - |
enterprise | T1218.011 | Rundll32 | NativeZone has used rundll32 to execute a malicious DLL.2 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.002 | Malicious File | NativeZone can display an RTF document to the user to enable execution of Cobalt Strike stage shellcode.1 |
enterprise | T1497 | Virtualization/Sandbox Evasion | - |
enterprise | T1497.001 | System Checks | NativeZone has checked if Vmware or VirtualBox VM is running on a compromised host.1 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0016 | APT29 | 2 |