S1021 DnsSystem
DnsSystem is a .NET based DNS backdoor, which is a customized version of the open source tool DIG.net, that has been used by HEXANE since at least June 2022.1
| Item | Value | 
|---|---|
| ID | S1021 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.0 | 
| Created | 24 June 2022 | 
| Last Modified | 01 September 2022 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1071 | Application Layer Protocol | - | 
| enterprise | T1071.004 | DNS | DnsSystem can direct queries to custom DNS servers and return C2 commands using TXT records.1 | 
| enterprise | T1547 | Boot or Logon Autostart Execution | - | 
| enterprise | T1547.001 | Registry Run Keys / Startup Folder | DnsSystem can write itself to the Startup folder to gain persistence.1 | 
| enterprise | T1059 | Command and Scripting Interpreter | - | 
| enterprise | T1059.003 | Windows Command Shell | DnsSystem can use cmd.exefor execution.1 | 
| enterprise | T1132 | Data Encoding | - | 
| enterprise | T1132.001 | Standard Encoding | DnsSystem can Base64 encode data sent to C2.1 | 
| enterprise | T1005 | Data from Local System | DnsSystem can upload files from infected machines after receiving a command with uploadddin the string.1 | 
| enterprise | T1041 | Exfiltration Over C2 Channel | DnsSystem can exfiltrate collected data to its C2 server.1 | 
| enterprise | T1105 | Ingress Tool Transfer | DnsSystem can download files to compromised systems after receiving a command with the string downloaddd.1 | 
| enterprise | T1033 | System Owner/User Discovery | DnsSystem can use the Windows user name to create a unique identification for infected users and systems.1 | 
| enterprise | T1204 | User Execution | - | 
| enterprise | T1204.002 | Malicious File | DnsSystem has lured victims into opening macro-enabled Word documents for execution.1 | 
Groups That Use This Software
| ID | Name | References | 
|---|---|---|
| G1001 | HEXANE | 1 |