Skip to content

S0663 SysUpdate

SysUpdate is a backdoor written in C++ that has been used by Threat Group-3390 since at least 2020.1

Item Value
ID S0663
Associated Names HyperSSL, Soldier, FOCUSFJORD
Version 1.1
Created 29 November 2021
Last Modified 20 March 2023
Navigation Layer View In ATT&CK® Navigator

Associated Software Descriptions

Name Description
HyperSSL 1
Soldier 1

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.004 DNS SysUpdate has used DNS TXT requests as for its C2 communication.2
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder SysUpdate can use a Registry Run key to establish persistence.1
enterprise T1543 Create or Modify System Process -
enterprise T1543.002 Systemd Service SysUpdate can copy a script to the user owned /usr/lib/systemd/system/ directory with a symlink mapped to a root owned directory, /etc/ystem/system, in the unit configuration file’s ExecStart directive to establish persistence and elevate privileges.2
enterprise T1543.003 Windows Service SysUpdate can create a service to establish persistence.1
enterprise T1132 Data Encoding -
enterprise T1132.001 Standard Encoding SysUpdate has used Base64 to encode its C2 traffic.2
enterprise T1005 Data from Local System SysUpdate can collect information and files from a compromised host.2
enterprise T1140 Deobfuscate/Decode Files or Information SysUpdate can deobfuscate packed binaries in memory.1
enterprise T1573 Encrypted Channel -
enterprise T1573.001 Symmetric Cryptography SysUpdate has used DES to encrypt all C2 communications.2
enterprise T1041 Exfiltration Over C2 Channel SysUpdate has exfiltrated data over its C2 channel.2
enterprise T1083 File and Directory Discovery SysUpdate can search files on a compromised host.12
enterprise T1564 Hide Artifacts -
enterprise T1564.001 Hidden Files and Directories SysUpdate has the ability to set file attributes to hidden.1
enterprise T1574 Hijack Execution Flow -
enterprise T1574.002 DLL Side-Loading SysUpdate can load DLLs through vulnerable legitimate executables.1
enterprise T1070 Indicator Removal -
enterprise T1070.004 File Deletion SysUpdate can delete its configuration file from the targeted system.1
enterprise T1105 Ingress Tool Transfer SysUpdate has the ability to download files to a compromised host.12
enterprise T1036 Masquerading -
enterprise T1036.004 Masquerade Task or Service SysUpdate has named their unit configuration file similarly to other unit files residing in the same directory, /usr/lib/systemd/system/, to appear benign.2
enterprise T1112 Modify Registry SysUpdate can write its configuration file to Software\Classes\scConfig in either HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER.1
enterprise T1106 Native API SysUpdate can call the GetNetworkParams API as part of its C2 establishment process.2
enterprise T1027 Obfuscated Files or Information SysUpdate can encrypt and encode its configuration file.1
enterprise T1027.002 Software Packing SysUpdate has been packed with VMProtect.12
enterprise T1027.011 Fileless Storage SysUpdate can store its encoded configuration file within Software\Classes\scConfig in either HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER.1
enterprise T1057 Process Discovery SysUpdate can collect information about running processes.2
enterprise T1113 Screen Capture SysUpdate has the ability to capture screenshots.1
enterprise T1553 Subvert Trust Controls -
enterprise T1553.002 Code Signing SysUpdate has been signed with stolen digital certificates.2
enterprise T1082 System Information Discovery SysUpdate can collect a system’s architecture, operating system version, hostname, and drive information.12
enterprise T1016 System Network Configuration Discovery SysUpdate can collected the IP address and domain name of a compromised host.2
enterprise T1016.001 Internet Connection Discovery SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process.2
enterprise T1033 System Owner/User Discovery SysUpdate can collect the username from a compromised host.2
enterprise T1007 System Service Discovery SysUpdate can collect a list of services on a victim machine.2
enterprise T1569 System Services -
enterprise T1569.002 Service Execution SysUpdate can manage services and processes.1
enterprise T1047 Windows Management Instrumentation SysUpdate can use WMI for execution on a compromised host.1

Groups That Use This Software

ID Name References
G0027 Threat Group-3390 1