Tropic Trooper is an unaffiliated threat group that has led targeted campaigns against targets in Taiwan, the Philippines, and Hong Kong. Tropic Trooper focuses on targeting government, healthcare, transportation, and high-tech industries and has been active since 2011.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Tropic Trooper has hidden payloads in Flash directories and fake installer files.[3] |
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Tropic Trooper has installed a service pointing to a malicious DLL dropped to disk.[5] |
| Enterprise | T1573 | 加密通道 |
Tropic Trooper has encrypted traffic with the C2 to prevent network detection.[3] |
|
| .002 | Asymmetric Cryptography |
Tropic Trooper has used SSL to connect to C2 servers.[1][3] |
||
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
Tropic Trooper has been known to side-load DLLs using a valid version of a Windows Address Book and Windows Defender executable with one of their tools.[6][7] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Tropic Trooper used shellcode with an XOR algorithm to decrypt a payload. Tropic Trooper also decrypted image files which contained a payload.[2][3] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Tropic Trooper has created shortcuts in the Startup folder to establish persistence.[7][3] |
| .004 | 启动或登录自动启动执行: Winlogon Helper DLL |
Tropic Trooper has created the Registry key |
||
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Tropic Trooper has used Windows command scripts.[3] |
| Enterprise | T1203 | 客户端执行漏洞利用 |
Tropic Trooper has executed commands through Microsoft security vulnerabilities, including CVE-2017-11882, CVE-2018-0802, and CVE-2012-0158.[1][2] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Tropic Trooper has used HTTP in communication with the C2.[7][3] |
| .004 | 应用层协议: DNS |
Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol.[3] |
||
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
Tropic Trooper has used base64 encoding to hide command strings delivered from the C2.[3] |
| Enterprise | T1083 | 文件和目录发现 |
Tropic Trooper has monitored files' modified time.[3] |
|
| Enterprise | T1078 | .003 | 有效账户: Local Accounts |
Tropic Trooper has used known administrator account credentials to execute the backdoor directly.[3] |
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
Tropic Trooper has started a web service in the target host and wait for the adversary to connect, acting as a web shell.[3] |
| Enterprise | T1106 | 本机API |
Tropic Trooper has used multiple Windows APIs including HttpInitialize, HttpCreateHttpHandle, and HttpAddUrl.[3] |
|
| Enterprise | T1221 | 模板注入 |
Tropic Trooper delivered malicious documents with the XLSX extension, typically used by OpenXML documents, but the file itself was actually an OLE (XLS) document.[2] |
|
| Enterprise | T1027 | .003 | 混淆文件或信息: Steganography |
Tropic Trooper has used JPG files with encrypted payloads to mask their backdoor routines and evade detection.[3] |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
Tropic Trooper has encrypted configuration files.[1][3] |
||
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
Tropic Trooper has lured victims into executing malware via malicious e-mail attachments.[7] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Tropic Trooper has deleted dropper files on an infected system using command scripts.[3] |
| Enterprise | T1082 | 系统信息发现 |
Tropic Trooper has detected a target system’s OS version and system volume information.[8][3] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Tropic Trooper used |
|
| Enterprise | T1049 | 系统网络连接发现 |
Tropic Trooper has tested if the localhost network is available and other connection capability on an infected system using command scripts.[3] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Tropic Trooper has used scripts to collect the host's network topology.[3] |
|
| Enterprise | T1135 | 网络共享发现 |
Tropic Trooper used |
|
| Enterprise | T1046 | 网络服务发现 |
Tropic Trooper used |
|
| Enterprise | T1119 | 自动化收集 |
Tropic Trooper has collected information automatically using the adversary's USBferry attack.[3] |
|
| Enterprise | T1020 | 自动化渗出 |
Tropic Trooper has used a copy function to automatically exfiltrate sensitive data from air-gapped systems using USB storage.[3] |
|
| Enterprise | T1518 | 软件发现 |
Tropic Trooper's backdoor could list the infected system's installed software.[3] |
|
| .001 | Security Software Discovery |
Tropic Trooper can search for anti-virus software running on the system.[2] |
||
| Enterprise | T1105 | 输入工具传输 |
Tropic Trooper has used a delivered trojan to download additional files.[3] |
|
| Enterprise | T1057 | 进程发现 |
Tropic Trooper is capable of enumerating the running processes on the system using |
|
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection |
Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe.[1][3] |
| Enterprise | T1091 | 通过可移动媒体复制 |
Tropic Trooper has attempted to transfer USBferry from an infected USB device by copying an Autorun function to the target machine.[3] |
|
| Enterprise | T1052 | .001 | 通过物理介质渗出: Exfiltration over USB |
Tropic Trooper has exfiltrated data using USB storage devices.[3] |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.[2][8][9][7][3] |
| Enterprise | T1564 | .001 | 隐藏伪装: Hidden Files and Directories |
Tropic Trooper has created a hidden directory under |