| Name | Description |
|---|---|
| ProjectSauron |
ProjectSauron is used to refer both to the threat group also known as G0041 as well as the malware platform also known as S0125. [2] |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1025 | 从可移动介质获取数据 |
Remsec has a package that collects documents from any inserted USB sticks.[3] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
The Remsec loader implements itself with the name Security Support Provider, a legitimate Windows function. Various Remsec .exe files mimic legitimate file names used by Microsoft, Symantec, Kaspersky, Hewlett-Packard, and VMWare. Remsec also disguised malicious modules using similar filenames as custom network encryption software on victims.[4][5] |
| Enterprise | T1556 | .002 | 修改身份验证过程: Password Filter DLL |
Remsec harvests plain-text credentials as a password filter registered on domain controllers.[5] |
| Enterprise | T1059 | .011 | 命令与脚本解释器: Lua | |
| Enterprise | T1562 | .004 | 妨碍防御: Disable or Modify System Firewall |
Remsec can add or remove applications or ports on the Windows firewall or disable it entirely.[3] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .003 | 应用层协议: Mail Protocols | |||
| .004 | 应用层协议: DNS | |||
| Enterprise | T1003 | .002 | 操作系统凭证转储: Security Account Manager | |
| Enterprise | T1083 | 文件和目录发现 |
Remsec is capable of listing contents of folders on the victim. Remsec also searches for custom network encryption software on victims.[7][5][3] |
|
| Enterprise | T1048 | .003 | 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol |
Remsec can exfiltrate data via a DNS tunnel or email, separately from its C2 channel.[5] |
| Enterprise | T1068 | 权限提升漏洞利用 |
Remsec has a plugin to drop and execute vulnerable Outpost Sandbox or avast! Virtualization drivers in order to gain kernel mode privileges.[3] |
|
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File |
Some data in Remsec is encrypted using RC5 in CBC mode, AES-CBC with a hardcoded key, RC4, or Salsa20. Some data is also base64-encoded.[7][3] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Remsec is capable of deleting files on the victim. It also securely removes itself after collecting and exfiltrating data.[7][5][3] |
| Enterprise | T1082 | 系统信息发现 |
Remsec can obtain the OS version information, computer name, processor architecture, machine role, and OS edition.[3] |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1049 | 系统网络连接发现 |
Remsec can obtain a list of active connections and open ports.[3] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Remsec can obtain information about network configuration, including the routing table, ARP cache, and DNS cache.[3] |
|
| Enterprise | T1046 | 网络服务发现 |
Remsec has a plugin that can perform ARP scanning as well as port scanning.[3] |
|
| Enterprise | T1652 | 设备驱动程序探测 |
Remsec has a plugin to detect active drivers of some security products.[3] |
|
| Enterprise | T1087 | .001 | 账号发现: Local Account | |
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
Remsec has a plugin detect security products via active drivers.[3] |
| Enterprise | T1105 | 输入工具传输 |
Remsec contains a network loader to receive executable modules from remote attackers and run them on the local victim. It can also upload and download files over HTTP and HTTPS.[7][3] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection | |
| Enterprise | T1018 | 远程系统发现 | ||
| Enterprise | T1052 | .001 | 通过物理介质渗出: Exfiltration over USB |
Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.[5] |
| Enterprise | T1095 | 非应用层协议 | ||
| Enterprise | T1053 | 预定任务/作业 |
Remsec schedules the execution one of its modules by creating a new scheduler task.[3] |
|