| Name | Description |
|---|---|
| ANEL |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Some versions of UPPERCUT have used the hard-coded string "this is the encrypt key" for Blowfish encryption when communicating with a C2. Later versions have hard-coded keys uniquely for each C2 address.[1] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
UPPERCUT uses cmd.exe to execute commands on the victim’s machine.[1] |
| Enterprise | T1113 | 屏幕捕获 |
UPPERCUT can capture desktop screenshots in the PNG format and send them to the C2 server.[1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
UPPERCUT has used HTTP for C2, including sending error codes in Cookie headers.[1] |
| Enterprise | T1083 | 文件和目录发现 |
UPPERCUT has the capability to gather the victim's current directory.[1] |
|
| Enterprise | T1082 | 系统信息发现 |
UPPERCUT has the capability to gather the system’s hostname and OS version.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
UPPERCUT has the capability to collect the current logged on user’s username from a machine.[1] |
|
| Enterprise | T1124 | 系统时间发现 |
UPPERCUT has the capability to obtain the time zone information and current timestamp of the victim’s machine.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
UPPERCUT has the capability to gather the victim's proxy information.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
UPPERCUT can download and upload files to and from the victim’s machine.[1] |
|