HTTPBrowser

HTTPBrowser is malware that has been used by several threat groups. [1] [2] It is believed to be of Chinese origin. [3]

ID: S0070
Associated Software: Token Control, HttpDump
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 31 May 2017
Last Modified: 20 March 2020

Associated Software Descriptions

Name Description
HttpDump

[3]

Techniques Used

Domain ID Name Use
Enterprise T1036 .005 伪装: Match Legitimate Name or Location

HTTPBrowser's installer contains a malicious file named navlu.dll to decrypt and run the RAT. navlu.dll is also the name of a legitimate Symantec DLL.[4]

Enterprise T1574 .001 劫持执行流: DLL Search Order Hijacking

HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll.[4]

.002 劫持执行流: DLL Side-Loading

HTTPBrowser has used DLL side-loading.[2]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

HTTPBrowser has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn "%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe" to establish persistence.[4][1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

HTTPBrowser is capable of spawning a reverse shell on a victim.[2]

Enterprise T1071 .001 应用层协议: Web Protocols

HTTPBrowser has used HTTP and HTTPS for command and control.[2][1]

.004 应用层协议: DNS

HTTPBrowser has used DNS for command and control.[2][1]

Enterprise T1083 文件和目录发现

HTTPBrowser is capable of listing files, folders, and drives on a victim.[2][4]

Enterprise T1027 混淆文件或信息

HTTPBrowser's code may be obfuscated through structured exception handling and return-oriented programming.[2]

Enterprise T1070 .004 移除指标: File Deletion

HTTPBrowser deletes its original installer file once installation is complete.[4]

Enterprise T1105 输入工具传输

HTTPBrowser is capable of writing a file to the compromised system from the C2 server.[2]

Enterprise T1056 .001 输入捕获: Keylogging

HTTPBrowser is capable of capturing keystrokes on victims.[2]

Groups That Use This Software

References