| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
The DustySky dropper uses Windows Management Instrumentation to extract information about the operating system and whether an anti-virus is active.[1] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
DustySky achieves persistence by creating a Registry entry in |
| Enterprise | T1008 | 回退信道 |
DustySky has two hard-coded domains for C2 servers; if the first does not respond, it will try the second.[1] |
|
| Enterprise | T1120 | 外围设备发现 | ||
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
DustySky can compress files via RAR while staging data to be exfiltrated.[3] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
DustySky created folders in temp directories to host collected files before exfiltration.[3] |
| Enterprise | T1083 | 文件和目录发现 |
DustySky scans the victim for files that contain certain keywords and document types including PDF, DOC, DOCX, XLS, and XLSX, from a list that is obtained from the C2 as a text file. It can also identify logical drives for the infected machine.[1][3] |
|
| Enterprise | T1570 | 横向工具传输 |
DustySky searches for network drives and removable media and duplicates itself onto them.[1] |
|
| Enterprise | T1027 | 混淆文件或信息 |
The DustySky dropper uses a function to obfuscate the name of functions and other parts of the malware.[1] |
|
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
DustySky can delete files it creates from the infected system.[3] |
| Enterprise | T1082 | 系统信息发现 |
DustySky extracts basic information about the operating system.[1] |
|
| Enterprise | T1518 | 软件发现 |
DustySky lists all installed software for the infected machine.[3] |
|
| .001 | Security Software Discovery | |||
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1057 | 进程发现 |
DustySky collects information about running processes from victims.[1][3] |
|
| Enterprise | T1041 | 通过C2信道渗出 | ||
| Enterprise | T1091 | 通过可移动媒体复制 |
DustySky searches for removable media and duplicates itself onto it.[1] |
|