MechaFlounder is a python-based remote access tool (RAT) that has been used by APT39. The payload uses a combination of actor developed code and code snippets freely available online in development communities.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
MechaFlounder has been downloaded as a file named lsass.exe, which matches the legitimate Windows file.[1] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
MechaFlounder has the ability to run commands on a compromised host.[1] |
| .006 | 命令与脚本解释器: Python |
MechaFlounder uses a python-based payload.[1] |
||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
MechaFlounder has the ability to use HTTP in communication with C2.[1] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
MechaFlounder has the ability to use base16 encoded strings in C2.[1] |
| Enterprise | T1033 | 系统所有者/用户发现 |
MechaFlounder has the ability to identify the username and hostname on a compromised host.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
MechaFlounder has the ability to upload and download files to and from a compromised host.[1] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
MechaFlounder has the ability to send the compromised user's account name and hostname within a URL to C2.[1] |
|