FlawedAmmyy is a remote access tool (RAT) that was first seen in early 2016. The code for FlawedAmmyy was based on leaked source code for a version of Ammyy Admin, a remote access software.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
FlawedAmmyy leverages WMI to enumerate anti-virus on the victim.[1] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
FlawedAmmyy has collected information and files from a compromised machine.[2] |
|
| Enterprise | T1115 | 剪贴板数据 |
FlawedAmmyy can collect clipboard data.[2] |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
FlawedAmmyy has used SEAL encryption during the initial C2 handshake.[1] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
FlawedAmmyy has established persistence via the |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
FlawedAmmyy has used PowerShell to execute commands.[2] |
| .003 | 命令与脚本解释器: Windows Command Shell |
FlawedAmmyy has used |
||
| Enterprise | T1120 | 外围设备发现 |
FlawedAmmyy will attempt to detect if a usable smart card is current inserted into a card reader.[1] |
|
| Enterprise | T1113 | 屏幕捕获 |
FlawedAmmyy can capture screenshots.[2] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
FlawedAmmyy has used HTTP for C2.[1] |
| Enterprise | T1001 | 数据混淆 |
FlawedAmmyy may obfuscate portions of the initial C2 handshake.[1] |
|
| Enterprise | T1069 | .001 | 权限组发现: Local Groups |
FlawedAmmyy enumerates the privilege level of the victim during the initial infection.[1][2] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
FlawedAmmyy can execute batch scripts to delete files.[2] |
| Enterprise | T1218 | .007 | 系统二进制代理执行: Msiexec |
FlawedAmmyy has been installed via |
| .011 | 系统二进制代理执行: Rundll32 |
FlawedAmmyy has used |
||
| Enterprise | T1082 | 系统信息发现 |
FlawedAmmyy can collect the victim's operating system and computer name during the initial infection.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
FlawedAmmyy enumerates the current user during the initial infection.[1][2] |
|
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
FlawedAmmyy will attempt to detect anti-virus products during the initial infection.[1] |
| Enterprise | T1105 | 输入工具传输 |
FlawedAmmyy can transfer files from C2.[2] |
|
| Enterprise | T1056 | 输入捕获 |
FlawedAmmyy can collect mouse events.[2] |
|
| .001 | Keylogging |
FlawedAmmyy can collect keyboard events.[2] |
||
| Enterprise | T1041 | 通过C2信道渗出 |
FlawedAmmyy has sent data collected from a compromised host to its C2 servers.[2] |
|