TEARDROP is a memory-only dropper that was discovered on some victim machines during investigations related to the SolarWinds Compromise. It was likely used by APT29 since at least May 2020.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
TEARDROP files had names that resembled legitimate Window file and directory names.[1][2] |
| Enterprise | T1112 | 修改注册表 |
TEARDROP modified the Registry to create a Windows service for itself on a compromised host.[3] |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
TEARDROP ran as a Windows service from the |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
TEARDROP was decoded using a custom rolling XOR algorithm to execute a customized Cobalt Strike payload.[1][3][2] |
|
| Enterprise | T1012 | 查询注册表 |
TEARDROP checked that |
|
| Enterprise | T1027 | 混淆文件或信息 |
TEARDROP created and read from a file with a fake JPG header, and its payload was encrypted with a simple rotating XOR cipher.[1][3][2] |
|
| ID | Name | Description |
|---|---|---|
| C0024 | SolarWinds Compromise |