| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
One variant of Zebrocy uses WMI queries to gather information.[3] |
|
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files.[7] |
| Enterprise | T1573 | .002 | 加密通道: Asymmetric Cryptography |
Zebrocy uses SSL and AES ECB for encrypting C2 communications.[8][7][4] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Zebrocy decodes its secondary payload and writes it to the victim’s machine. Zebrocy also uses AES and XOR to decrypt strings and payloads.[2][8] |
|
| Enterprise | T1037 | .001 | 启动或登录初始化脚本: Logon Script (Windows) |
Zebrocy performs persistence with a logon script via adding to the Registry key |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Zebrocy creates an entry in a Registry Run key for the malware to execute on startup.[8][7][6] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Zebrocy uses cmd.exe to execute commands on the system.[7][4] |
| Enterprise | T1120 | 外围设备发现 |
Zebrocy enumerates information about connected storage devices.[2] |
|
| Enterprise | T1113 | 屏幕捕获 |
A variant of Zebrocy captures screenshots of the victim’s machine in JPEG and BMP format.[2][8][3][7][6][4] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .003 | 应用层协议: Mail Protocols | |||
| Enterprise | T1560 | 归档收集数据 |
Zebrocy has used a method similar to RC4 as well as AES for encryption and hexadecimal for encoding data before exfiltration. [9][8][4] |
|
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Zebrocy stores all collected information in a single file before exfiltration.[8] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.[6] |
| Enterprise | T1083 | 文件和目录发现 |
Zebrocy searches for files that are 60mb and less and contain the following extensions: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .exe, .zip, and .rar. Zebrocy also runs the |
|
| Enterprise | T1012 | 查询注册表 |
Zebrocy executes the |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing | |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Zebrocy has a command to delete files and directories.[8][7][4] |
| Enterprise | T1082 | 系统信息发现 |
Zebrocy collects the OS version, computer name and serial number for the storage volume C:. Zebrocy also runs the |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1124 | 系统时间发现 |
Zebrocy gathers the current time zone and date information from the system.[8][4] |
|
| Enterprise | T1049 | 系统网络连接发现 |
Zebrocy uses |
|
| Enterprise | T1016 | 系统网络配置发现 | ||
| Enterprise | T1135 | 网络共享发现 |
Zebrocy identifies network drives when they are added to victim systems.[9] |
|
| Enterprise | T1119 | 自动化收集 |
Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.[8][7] |
|
| Enterprise | T1105 | 输入工具传输 |
Zebrocy obtains additional code to execute on the victim's machine, including the downloading of a secondary payload.[1][2][7][6] |
|
| Enterprise | T1056 | .004 | 输入捕获: Credential API Hooking |
Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method.[9] |
| Enterprise | T1057 | 进程发现 |
Zebrocy uses the |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests.[6][4] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Zebrocy has a command to create a scheduled task for persistence.[4] |