FALLCHILL is a RAT that has been used by Lazarus Group since at least 2016 to target the aerospace, telecommunications, and finance industries. It is usually dropped by other Lazarus Group malware or delivered when a victim unknowingly visits a compromised website. [1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service | |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| Enterprise | T1001 | .003 | 数据混淆: Protocol or Service Impersonation |
FALLCHILL uses fake Transport Layer Security (TLS) to communicate with its C2 server.[1] |
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
FALLCHILL can delete malware and associated artifacts from the victim.[1] |
| .006 | 移除指标: Timestomp | |||
| Enterprise | T1082 | 系统信息发现 |
FALLCHILL can collect operating system (OS) version information, processor information, system name, and information about installed disks from the victim.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
FALLCHILL collects MAC address and local IP address information from the victim.[1] |
|
| ID | Name | References |
|---|---|---|
| G0032 | Lazarus Group |