S1223 THINCRUST
THINCRUST is a Python-based backdoor tool that has been used by UNC3886 since at least 2023.1
| Item | Value |
|---|---|
| ID | S1223 |
| Associated Names | |
| Type | MALWARE |
| Version | 1.0 |
| Created | 16 June 2025 |
| Last Modified | 16 June 2025 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1071 | Application Layer Protocol | - |
| enterprise | T1071.001 | Web Protocols | THINCRUST can use HTTP POST requests in C2 communications.1 |
| enterprise | T1059 | Command and Scripting Interpreter | - |
| enterprise | T1059.006 | Python | THINCRUST can use Python scripts for command execution.1 |
| enterprise | T1140 | Deobfuscate/Decode Files or Information | THINCRUST can deobfuscate RSA encrypted C2 commands received through the DEVICEID cookie.1 |
| enterprise | T1573 | Encrypted Channel | - |
| enterprise | T1573.001 | Symmetric Cryptography | THINCRUST can process RSA encryted C2 commands.1 |
| enterprise | T1562 | Impair Defenses | - |
| enterprise | T1562.004 | Disable or Modify System Firewall | THINCRUST can use the Django python module “django.views.decorators.csrf” along with the decorator “csrf_exempt” within victim firewalls to disable cross-site request forgery protections.1 |
Groups That Use This Software
| ID | Name | References |
|---|---|---|
| G1048 | UNC3886 | 1 |