S1013 ZxxZ
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.1
Item | Value |
---|---|
ID | S1013 |
Type | MALWARE |
Version | 1.0 |
Created | 02 June 2022 |
Last Modified | 02 June 2022 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1005 | Data from Local System | ZxxZ can collect data from a compromised host.1 |
enterprise | T1140 | Deobfuscate/Decode Files or Information | ZxxZ has used a XOR key to decrypt strings.1 |
enterprise | T1105 | Ingress Tool Transfer | ZxxZ can download and execute additional files.1 |
enterprise | T1036 | Masquerading | - |
enterprise | T1036.004 | Masquerade Task or Service | ZxxZ has been disguised as a Windows security update service.1 |
enterprise | T1106 | Native API | ZxxZ has used API functions such as Process32First , Process32Next , and ShellExecuteA .1 |
enterprise | T1027 | Obfuscated Files or Information | ZxxZ has been encoded to avoid detection from static analysis tools.1 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.1 |
enterprise | T1057 | Process Discovery | ZxxZ has created a snapshot of running processes using CreateToolhelp32Snapshot .1 |
enterprise | T1012 | Query Registry | ZxxZ can search the registry of a compromised host.1 |
enterprise | T1053 | Scheduled Task/Job | - |
enterprise | T1053.005 | Scheduled Task | ZxxZ has used scheduled tasks for persistence and execution.1 |
enterprise | T1518 | Software Discovery | - |
enterprise | T1518.001 | Security Software Discovery | ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.1 |
enterprise | T1082 | System Information Discovery | ZxxZ has collected the host name and operating system product name from a compromised machine.1 |
enterprise | T1033 | System Owner/User Discovery | ZxxZ can collect the username from a compromised host.1 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.002 | Malicious File | ZxxZ has relied on victims to open a malicious attachment delivered via email.1 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G1002 | BITTER | 1 |