MoustachedBouncer

MoustachedBouncer is a cyberespionage group that has been active since at least 2014 targeting foreign embassies in Belarus.[1]

ID: G1019
Version: 1.0
Created: 25 September 2023
Last Modified: 16 April 2025

Techniques Used

Domain ID Name Use
Enterprise T1090 代理

MoustachedBouncer has used a reverse proxy tool similar to the GitHub repository revsocks.[1]

Enterprise T1659 内容注入

MoustachedBouncer has injected content into DNS, HTTP, and SMB replies to redirect specifically-targeted victims to a fake Windows Update page to download malware.[1]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

MoustachedBouncer has used plugins to execute PowerShell scripts.[1]

.007 命令与脚本解释器: JavaScript

MoustachedBouncer has used JavaScript to deliver malware hosted on HTML pages.[1]

Enterprise T1113 屏幕捕获

MoustachedBouncer has used plugins to take screenshots on targeted systems.[1]

Enterprise T1074 .002 数据分段: Remote Data Staging

MoustachedBouncer has used plugins to save captured screenshots to .\AActdata\ on an SMB share.[1]

Enterprise T1068 权限提升漏洞利用

MoustachedBouncer has exploited CVE-2021-1732 to execute malware components with elevated rights.[1]

Enterprise T1027 .002 混淆文件或信息: Software Packing

MoustachedBouncer has used malware plugins packed with Themida.[1]

Mobile T1655 .001 Masquerading: Match Legitimate Name or Location

MoustachedBouncer has used legitimate looking filenames for malicious executables including MicrosoftUpdate845255.exe.[1]

Software

References