S0680 LitePower
LitePower is a downloader and second stage malware that has been used by WIRTE since at least 2021.1
| Item | Value | 
|---|---|
| ID | S0680 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.0 | 
| Created | 02 February 2022 | 
| Last Modified | 16 April 2022 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1071 | Application Layer Protocol | - | 
| enterprise | T1071.001 | Web Protocols | LitePower can use HTTP and HTTPS for C2 communications.1 | 
| enterprise | T1059 | Command and Scripting Interpreter | - | 
| enterprise | T1059.001 | PowerShell | LitePower can use a PowerShell script to execute commands.1 | 
| enterprise | T1041 | Exfiltration Over C2 Channel | LitePower can send collected data, including screenshots, over its C2 channel.1 | 
| enterprise | T1105 | Ingress Tool Transfer | LitePower has the ability to download payloads containing system commands to a compromised host.1 | 
| enterprise | T1106 | Native API | LitePower can use various API calls.1 | 
| enterprise | T1012 | Query Registry | LitePower can query the Registry for keys added to execute COM hijacking.1 | 
| enterprise | T1053 | Scheduled Task/Job | - | 
| enterprise | T1053.005 | Scheduled Task | LitePower can create a scheduled task to enable persistence mechanisms.1 | 
| enterprise | T1113 | Screen Capture | LitePower can take system screenshots and save them to %AppData%.1 | 
| enterprise | T1518 | Software Discovery | - | 
| enterprise | T1518.001 | Security Software Discovery | LitePower can identify installed AV software.1 | 
| enterprise | T1082 | System Information Discovery | LitePower has the ability to list local drives and enumerate the OS architecture.1 | 
| enterprise | T1033 | System Owner/User Discovery | LitePower can determine if the current user has admin privileges.1 | 
Groups That Use This Software
| ID | Name | References | 
|---|---|---|
| G0090 | WIRTE | 1 |