BRONZE BUTLER is a cyber espionage group with likely Chinese origins that has been active since at least 2008. The group primarily targets Japanese organizations, particularly those in government, biotechnology, electronics manufacturing, and industrial chemistry.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
BRONZE BUTLER has exfiltrated files stolen from local systems.[2] |
|
| Enterprise | T1039 | 从网络共享驱动器获取数据 |
BRONZE BUTLER has exfiltrated files stolen from file shares.[2] |
|
| Enterprise | T1036 | 伪装 |
BRONZE BUTLER has masked executables with document file icons including Word and Adobe PDF.[3] |
|
| .002 | Right-to-Left Override |
BRONZE BUTLER has used Right-to-Left Override to deceive victims into executing several strains of malware.[3] |
||
| .005 | Match Legitimate Name or Location |
BRONZE BUTLER has given malware the same name as an existing file on the file share server to cause users to unwittingly launch and install the malware on additional systems.[2] |
||
| Enterprise | T1550 | .003 | 使用备用认证材料: Pass the Ticket |
BRONZE BUTLER has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access.[2] |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
BRONZE BUTLER has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. BRONZE BUTLER has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.[2] |
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
BRONZE BUTLER has used legitimate applications to side-load malicious DLLs.[3] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
BRONZE BUTLER downloads encoded payloads and decodes them on the victim.[2] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
BRONZE BUTLER has used a batch script that adds a Registry Run key to establish malware persistence.[2] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
BRONZE BUTLER has used PowerShell for execution.[2] |
| .003 | 命令与脚本解释器: Windows Command Shell |
BRONZE BUTLER has used batch scripts and the command-line interface for execution.[2] |
||
| .005 | 命令与脚本解释器: Visual Basic |
BRONZE BUTLER has used VBS and VBE scripts for execution.[2][3] |
||
| .006 | 命令与脚本解释器: Python |
BRONZE BUTLER has made use of Python-based remote access tools.[3] |
||
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
BRONZE BUTLER has incorporated code into several tools that attempts to terminate anti-virus processes.[3] |
| Enterprise | T1203 | 客户端执行漏洞利用 |
BRONZE BUTLER has exploited Microsoft Office vulnerabilities CVE-2014-4114, CVE-2018-0802, and CVE-2018-0798 for execution.[4][3] |
|
| Enterprise | T1113 | 屏幕捕获 |
BRONZE BUTLER has used a tool to capture screenshots.[2][3] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
BRONZE BUTLER malware has used HTTP for C2.[2] |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
BRONZE BUTLER has compressed data into password-protected RAR archives prior to exfiltration.[2][3] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
BRONZE BUTLER has used various tools (such as Mimikatz and WCE) to perform credential dumping.[2] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
Several BRONZE BUTLER tools encode data with base64 when posting it to a C2 server.[2] |
| Enterprise | T1083 | 文件和目录发现 |
BRONZE BUTLER has collected a list of files from the victim and uploaded it to its C2 server, and then created a new list of specific files to steal.[2] |
|
| Enterprise | T1080 | 污染共享内容 |
BRONZE BUTLER has placed malware on file shares and given it the same name as legitimate documents on the share.[2] |
|
| Enterprise | T1189 | 浏览器攻击 |
BRONZE BUTLER compromised three Japanese websites using a Flash exploit to perform watering hole attacks.[4] |
|
| Enterprise | T1027 | .001 | 混淆文件或信息: Binary Padding |
BRONZE BUTLER downloader code has included "0" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection.[2][3] |
| .003 | 混淆文件或信息: Steganography |
BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads.[3] |
||
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control |
BRONZE BUTLER has used a Windows 10 specific tool and xxmm to bypass UAC for privilege escalation.[2][3] |
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
BRONZE BUTLER has attempted to get users to launch malicious Microsoft Word attachments delivered via spearphishing emails.[4][3] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
The BRONZE BUTLER uploader or malware the uploader uses |
| Enterprise | T1124 | 系统时间发现 |
BRONZE BUTLER has used |
|
| Enterprise | T1007 | 系统服务发现 |
BRONZE BUTLER has used TROJ_GETVERSION to discover system services.[3] |
|
| Enterprise | T1102 | .001 | 网络服务: Dead Drop Resolver |
BRONZE BUTLER's MSGET downloader uses a dead drop resolver to access malicious payloads.[2] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
BRONZE BUTLER has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor.[4] |
| Enterprise | T1087 | .002 | 账号发现: Domain Account |
BRONZE BUTLER has used |
| Enterprise | T1518 | 软件发现 |
BRONZE BUTLER has used tools to enumerate software installed on an infected host.[3] |
|
| Enterprise | T1105 | 输入工具传输 |
BRONZE BUTLER has used various tools to download files, including DGet (a similar tool to wget).[2] |
|
| Enterprise | T1018 | 远程系统发现 |
BRONZE BUTLER typically use |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims.[4][3] |
| Enterprise | T1053 | .002 | 预定任务/作业: At |
BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement.[2] |
| .005 | 预定任务/作业: Scheduled Task |
BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement.[2] |
||