enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
BLUELIGHT can use HTTP/S for C2 using the Microsoft Graph API. |
enterprise |
T1560 |
Archive Collected Data |
BLUELIGHT can zip files before exfiltration. |
enterprise |
T1560.003 |
Archive via Custom Method |
BLUELIGHT has encoded data into a binary blob using XOR. |
enterprise |
T1555 |
Credentials from Password Stores |
- |
enterprise |
T1555.003 |
Credentials from Web Browsers |
BLUELIGHT can collect passwords stored in web browers, including Internet Explorer, Edge, Chrome, and Naver Whale. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
BLUELIGHT has exfiltrated data over its C2 channel. |
enterprise |
T1083 |
File and Directory Discovery |
BLUELIGHT can enumerate files and collect associated metadata. |
enterprise |
T1070 |
Indicator Removal |
- |
enterprise |
T1070.004 |
File Deletion |
BLUELIGHT can uninstall itself. |
enterprise |
T1105 |
Ingress Tool Transfer |
BLUELIGHT can download additional files onto the host. |
enterprise |
T1027 |
Obfuscated Files or Information |
BLUELIGHT has a XOR-encoded payload. |
enterprise |
T1057 |
Process Discovery |
BLUELIGHT can collect process filenames and SID authority level. |
enterprise |
T1113 |
Screen Capture |
BLUELIGHT has captured a screenshot of the display every 30 seconds for the first 5 minutes after initiating a C2 loop, and then once every five minutes thereafter. |
enterprise |
T1518 |
Software Discovery |
- |
enterprise |
T1518.001 |
Security Software Discovery |
BLUELIGHT can collect a list of anti-virus products installed on a machine. |
enterprise |
T1539 |
Steal Web Session Cookie |
BLUELIGHT can harvest cookies from Internet Explorer, Edge, Chrome, and Naver Whale browsers. |
enterprise |
T1082 |
System Information Discovery |
BLUELIGHT has collected the computer name and OS version from victim machines. |
enterprise |
T1016 |
System Network Configuration Discovery |
BLUELIGHT can collect IP information from the victim’s machine. |
enterprise |
T1033 |
System Owner/User Discovery |
BLUELIGHT can collect the username on a compromised host. |
enterprise |
T1124 |
System Time Discovery |
BLUELIGHT can collect the local time on a compromised host. |
enterprise |
T1497 |
Virtualization/Sandbox Evasion |
- |
enterprise |
T1497.001 |
System Checks |
BLUELIGHT can check to see if the infected machine has VM tools running. |
enterprise |
T1102 |
Web Service |
- |
enterprise |
T1102.002 |
Bidirectional Communication |
BLUELIGHT can use different cloud providers for its C2. |