Derusbi

Derusbi is malware used by multiple Chinese APT groups.[1][2] Both Windows and Linux variants have been observed.[3]

ID: S0021
Associated Software: PHOTO
Type: MALWARE
Platforms: Windows, Linux
Version: 1.2
Created: 31 May 2017
Last Modified: 20 March 2023

Associated Software Descriptions

Name Description
PHOTO

[4]

Techniques Used

Domain ID Name Use
Enterprise T1573 .001 加密通道: Symmetric Cryptography

Derusbi obfuscates C2 traffic with variable 4-byte XOR keys.[3]

Enterprise T1059 .004 命令与脚本解释器: Unix Shell

Derusbi is capable of creating a remote Bash shell and executing commands.[3][4]

Enterprise T1008 回退信道

Derusbi uses a backup communication method with an HTTP beacon.[3]

Enterprise T1113 屏幕捕获

Derusbi is capable of performing screen captures.[4]

Enterprise T1083 文件和目录发现

Derusbi is capable of obtaining directory, file, and drive listings.[3][4]

Enterprise T1012 查询注册表

Derusbi is capable of enumerating Registry keys and values.[4]

Enterprise T1070 .004 移除指标: File Deletion

Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes.[3][4]

.006 移除指标: Timestomp

The Derusbi malware supports timestomping.[1][3]

Enterprise T1218 .010 系统二进制代理执行: Regsvr32

Derusbi variants have been seen that use Registry persistence to proxy execution through regsvr32.exe.[5]

Enterprise T1082 系统信息发现

Derusbi gathers the name of the local host, version of GNU Compiler Collection (GCC), and the system information about the CPU, machine, and operating system.[3]

Enterprise T1033 系统所有者/用户发现

A Linux version of Derusbi checks if the victim user ID is anything other than zero (normally used for root), and the malware will not execute if it does not have root privileges. Derusbi also gathers the username of the victim.[3]

Enterprise T1125 视频捕获

Derusbi is capable of capturing video.[4]

Enterprise T1056 .001 输入捕获: Keylogging

Derusbi is capable of logging keystrokes.[4]

Enterprise T1057 进程发现

Derusbi collects current and parent process IDs.[3][4]

Enterprise T1055 .001 进程注入: Dynamic-link Library Injection

Derusbi injects itself into the secure shell (SSH) process.[6]

Enterprise T1095 非应用层协议

Derusbi binds to a raw socket on a random source port between 31800 and 31900 for C2.[3]

Enterprise T1571 非标准端口

Derusbi has used unencrypted HTTP on port 443 for C2.[3]

Enterprise T1123 音频捕获

Derusbi is capable of performing audio captures.[4]

Groups That Use This Software

References