Skip to content

S1223 THINCRUST

THINCRUST is a Python-based backdoor tool that has been used by UNC3886 since at least 2023.1

Item Value
ID S1223
Associated Names
Type MALWARE
Version 1.0
Created 16 June 2025
Last Modified 16 June 2025
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols THINCRUST can use HTTP POST requests in C2 communications.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.006 Python THINCRUST can use Python scripts for command execution.1
enterprise T1140 Deobfuscate/Decode Files or Information THINCRUST can deobfuscate RSA encrypted C2 commands received through the DEVICEID cookie.1
enterprise T1573 Encrypted Channel -
enterprise T1573.001 Symmetric Cryptography THINCRUST can process RSA encryted C2 commands.1
enterprise T1562 Impair Defenses -
enterprise T1562.004 Disable or Modify System Firewall THINCRUST can use the Django python module “django.views.decorators.csrf” along with the decorator “csrf_exempt” within victim firewalls to disable cross-site request forgery protections.1

Groups That Use This Software

ID Name References
G1048 UNC3886 1

References