Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. [1]
| Name | Description |
|---|---|
| Trojan Manuscript |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 | ||
| Enterprise | T1112 | 修改注册表 |
Bankshot writes data into the Registry key |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Bankshot can terminate a specific process by its process id.[1][2] |
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Bankshot uses the command-line interface to execute arbitrary commands.[1][2] |
| Enterprise | T1203 | 客户端执行漏洞利用 |
Bankshot leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims’ machines.[1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Bankshot uses HTTP for command and control communication.[1] |
| Enterprise | T1001 | .003 | 数据混淆: Protocol or Service Impersonation |
Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications.[3] |
| Enterprise | T1132 | .002 | 数据编码: Non-Standard Encoding |
Bankshot encodes commands from the control server using a range of characters and gzip.[1] |
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1106 | 本机API |
Bankshot creates processes using the Windows API calls: CreateProcessA() and CreateProcessAsUserA().[1] |
|
| Enterprise | T1012 | 查询注册表 |
Bankshot searches for certain Registry keys to be configured before executing the payload.[2] |
|
| Enterprise | T1070 | 移除指标 |
Bankshot deletes all artifacts associated with the malware from the infected machine.[2] |
|
| .004 | File Deletion |
Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system.[1] |
||
| .006 | Timestomp |
Bankshot modifies the time of a file as specified by the control server.[1] |
||
| Enterprise | T1082 | 系统信息发现 |
Bankshot gathers system information, network addresses, disk type, disk free space, and the operation system version.[1][2] |
|
| Enterprise | T1119 | 自动化收集 |
Bankshot recursively generates a list of files within a directory and sends them back to the control server.[1] |
|
| Enterprise | T1134 | .002 | 访问令牌操控: Create Process with Token |
Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user.[1] |
| Enterprise | T1087 | .001 | 账号发现: Local Account |
Bankshot gathers domain and account names/information through process monitoring.[1] |
| .002 | 账号发现: Domain Account |
Bankshot gathers domain and account names/information through process monitoring.[1] |
||
| Enterprise | T1105 | 输入工具传输 |
Bankshot uploads files and secondary payloads to the victim's machine.[2] |
|
| Enterprise | T1057 | 进程发现 |
Bankshot identifies processes and collects the process ids.[1] |
|
| Enterprise | T1041 | 通过C2信道渗出 | ||
| Enterprise | T1571 | 非标准端口 |
Bankshot binds and listens on port 1058 for HTTP traffic while also utilizing a FakeTLS method.[2] |
|
| ID | Name | References |
|---|---|---|
| G0032 | Lazarus Group |