| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Epic encrypts commands from the C2 server using a hardcoded key.[1] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1560 | 归档收集数据 |
Epic encrypts collected data using a public key framework before sending it over the C2 channel.[1] Some variants encrypt the collected data with AES and encode it with base64 before transmitting it to the C2 server.[2] |
|
| .002 | Archive via Library |
Epic compresses the collected data with bzip2 before sending it to the C2 server.[2] |
||
| Enterprise | T1083 | 文件和目录发现 |
Epic recursively searches for all .doc files on the system and collects a directory listing of the Desktop, %TEMP%, and %WINDOWS%\Temp directories.[1][2] |
|
| Enterprise | T1069 | .001 | 权限组发现: Local Groups | |
| Enterprise | T1012 | 查询注册表 |
Epic uses the |
|
| Enterprise | T1027 | 混淆文件或信息 |
Epic heavily obfuscates its code to make analysis more difficult.[1] |
|
| Enterprise | T1070 | .004 | 移除指标: File Deletion | |
| Enterprise | T1082 | 系统信息发现 |
Epic collects the OS version, hardware information, computer name, available system memory status, disk space information, and system and user language settings.[2] |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1124 | 系统时间发现 |
Epic uses the |
|
| Enterprise | T1007 | 系统服务发现 |
Epic uses the |
|
| Enterprise | T1049 | 系统网络连接发现 |
Epic uses the |
|
| Enterprise | T1016 | 系统网络配置发现 |
Epic uses the |
|
| Enterprise | T1087 | .001 | 账号发现: Local Account |
Epic gathers a list of all user accounts, privilege classes, and time of last logon.[2] |
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
Epic searches for anti-malware services running on the victim’s machine and terminates itself if it finds them.[1] |
| Enterprise | T1057 | 进程发现 |
Epic uses the |
|
| Enterprise | T1055 | .011 | 进程注入: Extra Window Memory Injection |
Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process.[3] |
| Enterprise | T1018 | 远程系统发现 | ||
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
Turla has used valid digital certificates from Sysprint AG to sign its Epic dropper.[1] |