T1027.002 Software Packing
Adversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the executable code in memory. Virtual machine software protection translates an executable’s original code into a special format that only a special virtual machine can run. A virtual machine is then called to run this code.2
Utilities used to perform software packing are called packers. Example packers are MPRESS and UPX. A more comprehensive list of known packers is available, but adversaries may create their own packing techniques that do not leave the same artifacts as well-known packers to evade defenses.1
Item | Value |
---|---|
ID | T1027.002 |
Sub-techniques | T1027.001, T1027.002, T1027.003, T1027.004, T1027.005, T1027.006 |
Tactics | TA0005 |
CAPEC ID | CAPEC-570 |
Platforms | Linux, Windows, macOS |
Version | 1.2 |
Created | 05 February 2020 |
Last Modified | 19 April 2022 |
Procedure Examples
ID | Name | Description |
---|---|---|
S0504 | Anchor | Anchor has come with a packed payload.41 |
S0622 | AppleSeed | AppleSeed has used UPX packers for its payload DLL.18 |
G0016 | APT29 | APT29 used UPX to pack files.84 |
G0022 | APT3 | APT3 has been known to pack their tools.7879 |
G0082 | APT38 | APT38 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants.74 |
G0087 | APT39 | APT39 has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection.8081 |
S0373 | Astaroth | Astaroth uses a software packer called Pe123\RPolyCryptor.35 |
S0638 | Babuk | Versions of Babuk have been packed.141516 |
S0534 | Bazar | Bazar has a variant with a packed payload.6162 |
S0268 | Bisonal | Bisonal has used the MPRESS packer and similar tools for obfuscation.19 |
S0520 | BLINDINGCAN | BLINDINGCAN has been packed with the UPX packer.28 |
S0020 | China Chopper | China Chopper‘s client component is packed with UPX.37 |
S0611 | Clop | Clop has been packed to help avoid detection.4243 |
S0614 | CostaBricks | CostaBricks can implement a custom-built virtual machine mechanism to obfuscate its code.30 |
S0527 | CSPY Downloader | CSPY Downloader has been packed with UPX.4 |
S0625 | Cuba | Cuba has a packed payload when delivered.54 |
G0070 | Dark Caracal | Dark Caracal has used UPX to pack Bandook.82 |
S0334 | DarkComet | DarkComet has the option to compress its payload using UPX or MPRESS.31 |
S0187 | Daserf | A version of Daserf uses the MPRESS packer.52 |
S0281 | Dok | Dok is packed with an UPX executable packer.53 |
S0695 | Donut | Donut can generate packed code modules.3 |
S0694 | DRATzarus | DRATzarus‘s dropper can be packed with UPX.9 |
S0024 | Dyre | Dyre has been delivered with encrypted resources and must be unpacked for execution.66 |
S0554 | Egregor | Egregor‘s payloads are custom-packed, archived and encrypted to prevent analysis.78 |
G0066 | Elderwood | Elderwood has packed malware payloads before delivery to victims.69 |
S0367 | Emotet | Emotet has used custom packers to protect its payloads.55 |
S0512 | FatDuke | FatDuke has been regularly repacked by its operators to create large binaries and evade detection.29 |
S0182 | FinFisher | A FinFisher variant uses a custom packer.5758 |
S0628 | FYAnti | FYAnti has used ConfuserEx to pack its .NET module.27 |
G0093 | GALLIUM | GALLIUM packed some payloads using different types of packers, both known and custom.68 |
S0588 | GoldMax | GoldMax has been packed for obfuscation.64 |
S0342 | GreyEnergy | GreyEnergy is packed for obfuscation.48 |
S0132 | H1N1 | H1N1 uses a custom packing algorithm.56 |
S0601 | Hildegard | Hildegard has packed ELF files into other binaries.23 |
S0431 | HotCroissant | HotCroissant has used the open source UPX executable packer.36 |
S0398 | HyperBro | HyperBro has the ability to pack its payload.13 |
S0483 | IcedID | IcedID has packed and encrypted its loader module.63 |
S0283 | jRAT | jRAT payloads have been packed.10 |
G0094 | Kimsuky | Kimsuky has packed malware with UPX.18 |
S0356 | KONNI | KONNI has been packed for obfuscation.12 |
G0032 | Lazarus Group | Lazarus Group has used Themida to pack malicious DLLs and other files.960 |
S0513 | LiteDuke | LiteDuke has been packed with multiple layers of encryption.29 |
S0447 | Lokibot | Lokibot has used several packing methods for obfuscation.59 |
S0532 | Lucifer | Lucifer has used UPX packed binaries.38 |
S0409 | Machete | Machete has been packed with NSIS.67 |
S0530 | Melcoz | Melcoz has been packed with VMProtect and Themida.45 |
S0455 | Metamorfo | Metamorfo has used VMProtect to pack and protect files.6 |
S0198 | NETWIRE | NETWIRE has used .NET packer tools to evade detection.65 |
G0014 | Night Dragon | Night Dragon is known to use software packing in its tools.75 |
S0264 | OopsIE | OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.24 |
S0352 | OSX_OCEANLOTUS.D | OSX_OCEANLOTUS.D has a variant that is packed with UPX.5 |
G0040 | Patchwork | A Patchwork payload was packed with UPX.77 |
S0650 | QakBot | QakBot can encrypt and pack malicious payloads.32 |
S0565 | Raindrop | Raindrop used a custom packer for its Cobalt Strike payload, which was compressed using the LZMA algorithm.4647 |
G0106 | Rocke | Rocke‘s miner has created UPX-packed files in the Windows Start Menu Folder.707172 |
G0034 | Sandworm Team | Sandworm Team used UPX to pack a copy of Mimikatz.73 |
S0461 | SDBbot | SDBbot has used a packed installer file.17 |
S0053 | SeaDuke | SeaDuke has been packed with the UPX packer.44 |
S0444 | ShimRat | ShimRat‘s loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack.40 |
S0543 | Spark | Spark has been packed with Enigma Protector to obfuscate its contents.21 |
S0663 | SysUpdate | SysUpdate can use packed binaries.13 |
G0092 | TA505 | TA505 has used UPX to obscure malicious code.17 |
G0139 | TeamTNT | TeamTNT has used UPX and Ezuri packer to pack its binaries.86 |
G0089 | The White Company | The White Company has obfuscated their payloads through packing.85 |
G0027 | Threat Group-3390 | Threat Group-3390 has packed malware and tools.83 |
S0671 | Tomiris | Tomiris has been packed with UPX.26 |
S0678 | Torisma | Torisma has been packed with Iz4 compression.60 |
S0266 | TrickBot | TrickBot leverages a custom packer to obfuscate its functionality.22 |
S0094 | Trojan.Karagany | Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer.4950 |
S0022 | Uroburos | Uroburos uses a custom packer.20 |
S0476 | Valak | Valak has used packed DLL payloads.39 |
S0257 | VERMIN | VERMIN is initially packed.51 |
S0248 | yty | yty packs a plugin with UPX.11 |
S0251 | Zebrocy | Zebrocy‘s Delphi variant was packed with UPX.3334 |
S0230 | ZeroT | Some ZeroT DLL files have been packed with UPX.25 |
G0128 | ZIRCONIUM | ZIRCONIUM has used multi-stage packers for exploit code.76 |
Mitigations
ID | Mitigation | Description |
---|---|---|
M1049 | Antivirus/Antimalware | Employ heuristic-based malware detection. Ensure updated virus definitions and create custom signatures for observed malware. |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0022 | File | File Metadata |
References
-
Alexandre D’Hondt. (n.d.). Awesome Executable Packing. Retrieved March 11, 2022. ↩
-
Kafka, F. (2018, January). ESET’s Guide to Deobfuscating and Devirtualizing FinFisher. Retrieved August 12, 2019. ↩
-
Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020. ↩
-
Dumont, R.. (2019, April 9). OceanLotus: macOS malware update. Retrieved April 15, 2019. ↩
-
Zhang, X. (2020, February 4). Another Metamorfo Variant Targeting Customers of Financial Institutions in More Countries. Retrieved July 30, 2020. ↩
-
NHS Digital. (2020, November 26). Egregor Ransomware The RaaS successor to Maze. Retrieved December 29, 2020. ↩
-
Cybleinc. (2020, October 31). Egregor Ransomware – A Deep Dive Into Its Activities and Techniques. Retrieved December 29, 2020. ↩
-
ClearSky Research Team. (2020, August 13). Operation ‘Dream Job’ Widespread North Korean Espionage Campaign. Retrieved December 20, 2021. ↩↩
-
Kamluk, V. & Gostev, A. (2016, February). Adwind - A Cross-Platform RAT. Retrieved April 23, 2019. ↩
-
Schwarz, D., Sopko J. (2018, March 08). Donot Team Leverages New Modular Malware Framework in South Asia. Retrieved June 11, 2018. ↩
-
Santos, R. (2022, January 26). KONNI evolves into stealthier RAT. Retrieved April 13, 2022. ↩
-
Lunghi, D. and Lu, K. (2021, April 9). Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware. Retrieved November 12, 2021. ↩↩
-
Sogeti. (2021, March). Babuk Ransomware. Retrieved August 11, 2021. ↩
-
Mundo, A. et al. (2021, February). Technical Analysis of Babuk Ransomware. Retrieved August 11, 2021. ↩
-
Sebdraven. (2021, February 8). Babuk is distributed packed. Retrieved August 11, 2021. ↩
-
Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020. ↩↩
-
Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021. ↩↩
-
Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022. ↩
-
Symantec. (2015, January 26). The Waterbug attack group. Retrieved April 10, 2015. ↩
-
Falcone, R., et al. (2020, March 3). Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations. Retrieved December 14, 2020. ↩
-
Salinas, M., Holguin, J. (2017, June). Evolution of Trickbot. Retrieved July 31, 2018. ↩
-
Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021. ↩
-
Lee, B., Falcone, R. (2018, February 23). OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan. Retrieved July 16, 2018. ↩
-
Huss, D., et al. (2017, February 2). Oops, they did it again: APT Targets Russia and Belarus with ZeroT and PlugX. Retrieved April 5, 2018. ↩
-
Kwiatkoswki, I and Delcher, P. (2021, September 29). DarkHalo After SolarWinds: the Tomiris connection. Retrieved December 27, 2021. ↩
-
GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021. ↩
-
US-CERT. (2020, August 19). MAR-10295134-1.v1 – North Korean Remote Access Trojan: BLINDINGCAN. Retrieved August 19, 2020. ↩
-
Faou, M., Tartare, M., Dupuy, T. (2019, October). OPERATION GHOST. Retrieved September 23, 2020. ↩↩
-
The BlackBerry Research and Intelligence Team. (2020, November 12). The CostaRicto Campaign: Cyber-Espionage Outsourced. Retrieved May 24, 2021. ↩
-
Kujawa, A. (2018, March 27). You dirty RAT! Part 1: DarkComet. Retrieved November 6, 2018. ↩
-
Cyberint. (2021, May 25). Qakbot Banking Trojan. Retrieved September 27, 2021. ↩
-
Lee, B., Falcone, R. (2018, December 12). Dear Joohn: The Sofacy Group’s Global Campaign. Retrieved April 19, 2019. ↩
-
Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019. ↩
-
Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019. ↩
-
Knight, S.. (2020, April 16). VMware Carbon Black TAU Threat Analysis: The Evolution of Lazarus. Retrieved May 1, 2020. ↩
-
Lee, T., Hanzlik, D., Ahl, I. (2013, August 7). Breaking Down the China Chopper Web Shell - Part I. Retrieved March 27, 2015. ↩
-
Hsu, K. et al. (2020, June 24). Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices. Retrieved November 16, 2020. ↩
-
Reaves, J. and Platt, J. (2020, June). Valak Malware and the Connection to Gozi Loader ConfCrew. Retrieved August 31, 2020. ↩
-
Yonathan Klijnsma. (2016, May 17). Mofang: A politically motivated information stealing adversary. Retrieved May 12, 2020. ↩
-
Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020. ↩
-
Mundo, A. (2019, August 1). Clop Ransomware. Retrieved May 10, 2021. ↩
-
Cybereason Nocturnus. (2020, December 23). Cybereason vs. Clop Ransomware. Retrieved May 11, 2021. ↩
-
Grunzweig, J.. (2015, July 14). Unit 42 Technical Analysis: Seaduke. Retrieved August 3, 2016. ↩
-
GReAT. (2020, July 14). The Tetrade: Brazilian banking malware goes global. Retrieved November 9, 2020. ↩
-
Symantec Threat Hunter Team. (2021, January 18). Raindrop: New Malware Discovered in SolarWinds Investigation. Retrieved January 19, 2021. ↩
-
MSTIC, CDOC, 365 Defender Research Team. (2021, January 20). Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop . Retrieved January 22, 2021. ↩
-
Cherepanov, A. (2018, October). GREYENERGY A successor to BlackEnergy. Retrieved November 15, 2018. ↩
-
Symantec Security Response. (2014, July 7). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016. ↩
-
Secureworks. (2019, July 24). Updated Karagany Malware Targets Energy Sector. Retrieved August 12, 2020. ↩
-
Lancaster, T., Cortes, J. (2018, January 29). VERMIN: Quasar RAT and Custom Malware Used In Ukraine. Retrieved July 5, 2018. ↩
-
Chen, J. and Hsieh, M. (2017, November 7). REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography. Retrieved December 27, 2017. ↩
-
fluffybunny. (2019, July 9). OSX.Dok Analysis. Retrieved October 4, 2021. ↩
-
Roccio, T., et al. (2021, April). Technical Analysis of Cuba Ransomware. Retrieved June 18, 2021. ↩
-
Trend Micro. (2019, January 16). Exploring Emotet’s Activities . Retrieved March 25, 2019. ↩
-
Reynolds, J.. (2016, September 13). H1N1: Technical analysis reveals new capabilities. Retrieved September 26, 2016. ↩
-
Kaspersky Lab’s Global Research & Analysis Team. (2017, October 16). BlackOasis APT and new targeted attacks leveraging zero-day exploit. Retrieved February 15, 2018. ↩
-
Hoang, M. (2019, January 31). Malicious Activity Report: Elements of Lokibot Infostealer. Retrieved May 15, 2020. ↩
-
Beek, C. (2020, November 5). Operation North Star: Behind The Scenes. Retrieved December 20, 2021. ↩↩
-
Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020. ↩
-
Sadique, M. and Singh, A. (2020, September 29). Spear Phishing Campaign Delivers Buer and Bazar Malware. Retrieved November 19, 2020. ↩
-
Kimayong, P. (2020, June 18). COVID-19 and FMLA Campaigns used to install new IcedID banking malware. Retrieved July 14, 2020. ↩
-
Smith, L., Leathery, J., Read, B. (2021, March 4). New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452. Retrieved March 12, 2021. ↩
-
Lambert, T. (2020, January 29). Intro to Netwire. Retrieved January 7, 2021. ↩
-
hasherezade. (2015, November 4). A Technical Look At Dyreza. Retrieved June 15, 2020. ↩
-
ESET. (2019, July). MACHETE JUST GOT SHARPER Venezuelan government institutions under attack. Retrieved September 13, 2019. ↩
-
Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019. ↩
-
O’Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018. ↩
-
Liebenberg, D.. (2018, August 30). Rocke: The Champion of Monero Miners. Retrieved May 26, 2020. ↩
-
Xingyu, J.. (2019, January 17). Malware Used by Rocke Group Evolves to Evade Detection by Cloud Security Products. Retrieved May 26, 2020. ↩
-
Anomali Labs. (2019, March 15). Rocke Evolves Its Arsenal With a New Malware Family Written in Golang. Retrieved April 24, 2019. ↩
-
Joe Slowik. (2018, October 12). Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE. Retrieved December 18, 2020. ↩
-
FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018. ↩
-
McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018. ↩
-
Itkin, E. and Cohen, I. (2021, February 22). The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day. Retrieved March 24, 2021. ↩
-
Kaspersky Lab’s Global Research & Analysis Team. (2016, July 8). The Dropping Elephant – aggressive cyber-espionage in the Asian region. Retrieved August 3, 2016. ↩
-
Korban, C, et al. (2017, September). APT3 Adversary Emulation Plan. Retrieved January 16, 2018. ↩
-
Eng, E., Caselden, D.. (2015, June 23). Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign. Retrieved January 14, 2016. ↩
-
Hawley et al. (2019, January 29). APT39: An Iranian Cyber Espionage Group Focused on Personal Information. Retrieved February 19, 2019. ↩
-
Rusu, B. (2020, May 21). Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia. Retrieved May 22, 2020. ↩
-
Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018. ↩
-
Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021. ↩
-
Dunwoody, M. and Carr, N.. (2016, September 27). No Easy Breach DerbyCon 2016. Retrieved October 4, 2016. ↩
-
Livelli, K, et al. (2018, November 12). Operation Shaheen. Retrieved May 1, 2019. ↩
-
Fiser, D. Oliveira, A. (n.d.). Tracking the Activities of TeamTNT A Closer Look at a Cloud-Focused Malicious Actor Group. Retrieved September 22, 2021. ↩