| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | .001 | 代理: Internal Proxy |
The "ZJ" variant of BACKSPACE allows "ZJ link" infections with Internet access to relay traffic from "ZJ listen" to a command server.[1] |
| Enterprise | T1112 | 修改注册表 |
BACKSPACE is capable of deleting Registry keys, sub-keys, and values on a victim system.[1] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.[1] |
| .009 | 启动或登录自动启动执行: Shortcut Modification |
BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.[1] |
||
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Adversaries can direct BACKSPACE to execute from the command line on infected hosts, or have BACKSPACE create a reverse shell.[1] |
| Enterprise | T1104 | 多阶段信道 |
BACKSPACE attempts to avoid detection by checking a first stage command and control server to determine if it should connect to the second stage server, which performs "louder" interactions with the malware.[1] |
|
| Enterprise | T1562 | .004 | 妨碍防御: Disable or Modify System Firewall |
The "ZR" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems. BACKSPACE will attempt to establish a C2 channel, then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed.[1] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
BACKSPACE uses HTTP as a transport to communicate with its command server.[1] |
| Enterprise | T1132 | .002 | 数据编码: Non-Standard Encoding |
Newer variants of BACKSPACE will encode C2 communications with a custom system.[1] |
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1012 | 查询注册表 |
BACKSPACE is capable of enumerating and making modifications to an infected system's Registry.[1] |
|
| Enterprise | T1082 | 系统信息发现 |
During its initial execution, BACKSPACE extracts operating system information from the infected host.[1] |
|
| Enterprise | T1057 | 进程发现 |
BACKSPACE may collect information about running processes.[1] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Adversaries can direct BACKSPACE to upload files to the C2 Server.[1] |
|