BACKSPACE

BACKSPACE is a backdoor used by APT30 that dates back to at least 2005. [1]

ID: S0031
Associated Software: Lecna
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 31 May 2017
Last Modified: 30 March 2020

Techniques Used

Domain ID Name Use
Enterprise T1090 .001 代理: Internal Proxy

The "ZJ" variant of BACKSPACE allows "ZJ link" infections with Internet access to relay traffic from "ZJ listen" to a command server.[1]

Enterprise T1112 修改注册表

BACKSPACE is capable of deleting Registry keys, sub-keys, and values on a victim system.[1]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.[1]

.009 启动或登录自动启动执行: Shortcut Modification

BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

Adversaries can direct BACKSPACE to execute from the command line on infected hosts, or have BACKSPACE create a reverse shell.[1]

Enterprise T1104 多阶段信道

BACKSPACE attempts to avoid detection by checking a first stage command and control server to determine if it should connect to the second stage server, which performs "louder" interactions with the malware.[1]

Enterprise T1562 .004 妨碍防御: Disable or Modify System Firewall

The "ZR" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems. BACKSPACE will attempt to establish a C2 channel, then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

BACKSPACE uses HTTP as a transport to communicate with its command server.[1]

Enterprise T1132 .002 数据编码: Non-Standard Encoding

Newer variants of BACKSPACE will encode C2 communications with a custom system.[1]

Enterprise T1083 文件和目录发现

BACKSPACE allows adversaries to search for files.[1]

Enterprise T1012 查询注册表

BACKSPACE is capable of enumerating and making modifications to an infected system's Registry.[1]

Enterprise T1082 系统信息发现

During its initial execution, BACKSPACE extracts operating system information from the infected host.[1]

Enterprise T1057 进程发现

BACKSPACE may collect information about running processes.[1]

Enterprise T1041 通过C2信道渗出

Adversaries can direct BACKSPACE to upload files to the C2 Server.[1]

Groups That Use This Software

ID Name References
G0013 APT30

[1]

References