S1140 Spica
Spica is a custom backdoor written in Rust that has been used by Star Blizzard since at least 2023.1
| Item | Value |
|---|---|
| ID | S1140 |
| Associated Names | |
| Type | MALWARE |
| Version | 1.0 |
| Created | 18 June 2024 |
| Last Modified | 18 June 2024 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1560 | Archive Collected Data | Spica can archive collected documents for exfiltration.1 |
| enterprise | T1059 | Command and Scripting Interpreter | - |
| enterprise | T1059.001 | PowerShell | Spica can use an obfuscated PowerShell command to create a scheduled task for persistence.1 |
| enterprise | T1140 | Deobfuscate/Decode Files or Information | Upon execution Spica can decode an embedded .pdf and write it to the desktop as a decoy document.1 |
| enterprise | T1083 | File and Directory Discovery | Spica can list filesystem contents on targeted systems.1 |
| enterprise | T1105 | Ingress Tool Transfer | Spica can upload and download files to and from compromised hosts.1 |
| enterprise | T1036 | Masquerading | - |
| enterprise | T1036.004 | Masquerade Task or Service | Spica has created a scheduled task named CalendarChecker for persistence on compromised hosts.1 |
| enterprise | T1095 | Non-Application Layer Protocol | Spica can use JSON over WebSockets for C2 communications.1 |
| enterprise | T1053 | Scheduled Task/Job | - |
| enterprise | T1053.005 | Scheduled Task | Spica has created a scheduled task named CalendarChecker to establish persistence.1 |
| enterprise | T1539 | Steal Web Session Cookie | Spica has the ability to steal cookies from Chrome, Firefox, Opera, and Edge browsers.1 |
Groups That Use This Software
| ID | Name | References |
|---|---|---|
| G1033 | Star Blizzard | 1 |