| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1136 | .001 | 创建账户: Local Account | |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Carbanak encrypts the message body of HTTP traffic with RC2 (in CBC mode). Carbanak also uses XOR with random keys for its communications.[1][2] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Carbanak stores a configuration files in the startup directory to automatically execute commands in order to persist across reboots.[2] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| Enterprise | T1113 | 屏幕捕获 |
Carbanak performs desktop video recording and captures screenshots of the desktop and sends it to the C2 server.[2] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
The Carbanak malware communicates to its command server using HTTP with an encrypted payload.[1] |
| Enterprise | T1003 | 操作系统凭证转储 | ||
| Enterprise | T1030 | 数据传输大小限制 |
Carbanak exfiltrates data in compressed chunks if a message is larger than 4096 bytes .[2] |
|
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
Carbanak encodes the message body of HTTP traffic with Base64.[1][2] |
| Enterprise | T1012 | 查询注册表 |
Carbanak checks the Registry key |
|
| Enterprise | T1027 | 混淆文件或信息 |
Carbanak encrypts strings to make analysis more difficult.[2] |
|
| Enterprise | T1114 | .001 | 电子邮件收集: Local Email Collection |
Carbanak searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server.[2] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion | |
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
Carbanak logs key strokes for configured processes and sends them back to the C2 server.[1][2] |
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1055 | .002 | 进程注入: Portable Executable Injection |
Carbanak downloads an executable and injects it directly into a new process.[2] |
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
Carbanak enables concurrent Remote Desktop Protocol (RDP) sessions.[2] |
| Enterprise | T1219 | 远程访问软件 | ||