| enterprise |
T1071 |
Application Layer Protocol |
- |
| enterprise |
T1071.001 |
Web Protocols |
Ninja can use HTTP for C2 communications. |
| enterprise |
T1543 |
Create or Modify System Process |
- |
| enterprise |
T1543.003 |
Windows Service |
Ninja can create the services httpsvc and w3esvc for persistence . |
| enterprise |
T1132 |
Data Encoding |
- |
| enterprise |
T1132.002 |
Non-Standard Encoding |
Ninja can encode C2 communications with a base64 algorithm using a custom alphabet. |
| enterprise |
T1001 |
Data Obfuscation |
Ninja has the ability to modify headers and URL paths to hide malicious traffic in HTTP requests. |
| enterprise |
T1001.003 |
Protocol or Service Impersonation |
Ninja has the ability to mimic legitimate services with customized HTTP URL paths and headers to hide malicious traffic. |
| enterprise |
T1140 |
Deobfuscate/Decode Files or Information |
The Ninja loader component can decrypt and decompress the payload. |
| enterprise |
T1573 |
Encrypted Channel |
- |
| enterprise |
T1573.001 |
Symmetric Cryptography |
Ninja can XOR and AES encrypt C2 messages. |
| enterprise |
T1480 |
Execution Guardrails |
- |
| enterprise |
T1480.001 |
Environmental Keying |
Ninja can store its final payload in the Registry under $HKLM\SOFTWARE\Classes\Interface\ encrypted with a dynamically generated key based on the drive’s serial number. |
| enterprise |
T1083 |
File and Directory Discovery |
Ninja has the ability to enumerate directory content. |
| enterprise |
T1574 |
Hijack Execution Flow |
- |
| enterprise |
T1574.001 |
DLL |
Ninja loaders can be side-loaded with legitimate and signed executables including the VLC.exe media player. |
| enterprise |
T1070 |
Indicator Removal |
- |
| enterprise |
T1070.006 |
Timestomp |
Ninja can change or create the last access or write times. |
| enterprise |
T1559 |
Inter-Process Communication |
Ninja can use pipes to redirect the standard input and the standard output. |
| enterprise |
T1680 |
Local Storage Discovery |
Ninja can obtain information on physical drives from targeted hosts. |
| enterprise |
T1036 |
Masquerading |
- |
| enterprise |
T1036.005 |
Match Legitimate Resource Name or Location |
Ninja has used legitimate looking filenames for its loader including update.dll and x64.dll. |
| enterprise |
T1106 |
Native API |
The Ninja loader can call Windows APIs for discovery, process injection, and payload decryption. |
| enterprise |
T1095 |
Non-Application Layer Protocol |
Ninja can forward TCP packets between the C2 and a remote host. |
| enterprise |
T1027 |
Obfuscated Files or Information |
- |
| enterprise |
T1027.013 |
Encrypted/Encoded File |
The Ninja payload is XOR encrypted and compressed. Ninja has also XORed its configuration data with a constant value of 0xAA. |
| enterprise |
T1027.015 |
Compression |
Ninja has compressed its data with the LZSS algorithm. |
| enterprise |
T1566 |
Phishing |
- |
| enterprise |
T1566.003 |
Spearphishing via Service |
Ninja has been distributed to victims via the messaging app Telegram. |
| enterprise |
T1057 |
Process Discovery |
Ninja can enumerate processes on a targeted host. |
| enterprise |
T1055 |
Process Injection |
Ninja has the ability to inject an agent module into a new process and arbitrary shellcode into running processes. |
| enterprise |
T1090 |
Proxy |
- |
| enterprise |
T1090.001 |
Internal Proxy |
Ninja can proxy C2 communications including to and from internal agents without internet connectivity. |
| enterprise |
T1090.003 |
Multi-hop Proxy |
Ninja has the ability to use a proxy chain with up to 255 hops when using TCP. |
| enterprise |
T1029 |
Scheduled Transfer |
Ninja can configure its agent to work only in specific time frames. |
| enterprise |
T1218 |
System Binary Proxy Execution |
- |
| enterprise |
T1218.011 |
Rundll32 |
Ninja loader components can be executed through rundll32.exe. |
| enterprise |
T1082 |
System Information Discovery |
Ninja can obtain the computer name and information on the OS from targeted hosts. |
| enterprise |
T1016 |
System Network Configuration Discovery |
Ninja can enumerate the IP address on compromised systems. |
| enterprise |
T1204 |
User Execution |
- |
| enterprise |
T1204.002 |
Malicious File |
Ninja has gained execution through victims opening malicious executable files embedded in zip archives. |