S1163 SnappyTCP
SnappyTCP is a web shell used by Sea Turtle between 2021 and 2023 against multiple victims. SnappyTCP appears to be based on a public GitHub project that has since been removed from the code-sharing site. SnappyTCP includes a simple reverse TCP shell for Linux and Unix environments with basic command and control capabilities.1
| Item | Value |
|---|---|
| ID | S1163 |
| Associated Names | |
| Type | MALWARE |
| Version | 1.0 |
| Created | 20 November 2024 |
| Last Modified | 07 January 2025 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1071 | Application Layer Protocol | - |
| enterprise | T1071.001 | Web Protocols | SnappyTCP connects to the command and control server via a TCP socket using HTTP.1 |
| enterprise | T1059 | Command and Scripting Interpreter | - |
| enterprise | T1059.004 | Unix Shell | SnappyTCP creates the reverse shell using a pthread spawning a bash shell.1 |
| enterprise | T1573 | Encrypted Channel | - |
| enterprise | T1573.002 | Asymmetric Cryptography | SnappyTCP can use OpenSSL and TLS certificates to encrypt traffic.1 |
| enterprise | T1095 | Non-Application Layer Protocol | SnappyTCP spawns a reverse TCP shell following an HTTP-based negotiation.1 |
| enterprise | T1505 | Server Software Component | - |
| enterprise | T1505.003 | Web Shell | SnappyTCP is a reverse TCP shell with command and control capabilities used for persistence purposes.1 |
Groups That Use This Software
| ID | Name | References |
|---|---|---|
| G1041 | Sea Turtle | Sea Turtle used SnappyTCP following initial access in intrusions from 2021 to 2023.1 |