| enterprise |
T1071 |
Application Layer Protocol |
- |
| enterprise |
T1071.001 |
Web Protocols |
OilBooster can send HTTP GET, POST, PUT, and DELETE requests to the Microsoft Graph API over port 443 for C2 communication. |
| enterprise |
T1059 |
Command and Scripting Interpreter |
- |
| enterprise |
T1059.003 |
Windows Command Shell |
OilBooster has the ability to execute shell commands and exfiltrate the results. |
| enterprise |
T1074 |
Data Staged |
- |
| enterprise |
T1074.001 |
Local Data Staging |
OilBooster can stage files in the tempFiles directory for exfiltration. |
| enterprise |
T1140 |
Deobfuscate/Decode Files or Information |
OilBooster can Base64-decode and XOR-decrypt C2 commands taken from JSON files. |
| enterprise |
T1573 |
Encrypted Channel |
- |
| enterprise |
T1573.002 |
Asymmetric Cryptography |
OilBooster can use the OpenSSL library to encrypt C2 communications. |
| enterprise |
T1041 |
Exfiltration Over C2 Channel |
OilBooster can use an actor-controlled OneDrive account for C2 communication and exfiltration. |
| enterprise |
T1567 |
Exfiltration Over Web Service |
- |
| enterprise |
T1567.002 |
Exfiltration to Cloud Storage |
OilBooster can exfiltrate files to an actor-controlled OneDrive account via the Microsoft Graph API. |
| enterprise |
T1008 |
Fallback Channels |
OilBooster can use a backup channel to request a new refresh token from its C2 server after 10 consecutive unsuccessful connections to the primary OneDrive C2 server. |
| enterprise |
T1564 |
Hide Artifacts |
- |
| enterprise |
T1564.003 |
Hidden Window |
OilBooster can hide its console window upon execution through the ShowWindow API. |
| enterprise |
T1105 |
Ingress Tool Transfer |
OilBooster can download and execute files from an actor-controlled OneDrive account. |
| enterprise |
T1559 |
Inter-Process Communication |
OilBooster can read the results of command line execution via an unnamed pipe connected to the process. |
| enterprise |
T1106 |
Native API |
OilBooster has used the ShowWindow and CreateProcessW APIs. |
| enterprise |
T1082 |
System Information Discovery |
OilBooster can identify the compromised system’s hostname which is used to create a unique identifier. |
| enterprise |
T1033 |
System Owner/User Discovery |
OilBooster can identify the compromised system’s username which is then used as part of a unique identifier. |
| enterprise |
T1102 |
Web Service |
- |
| enterprise |
T1102.002 |
Bidirectional Communication |
OilBooster uses the Microsoft Graph API to connect to an actor-controlled OneDrive account to download and execute files and shell commands, and to create directories to share exfiltrated data. |