GoldMax is a second-stage C2 backdoor written in Go with Windows and Linux variants that are nearly identical in functionality. GoldMax was discovered in early 2021 during the investigation into the SolarWinds Compromise, and has likely been used by APT29 since at least mid-2019. GoldMax uses multiple defense evasion techniques, including avoiding virtualization execution and masking malicious traffic.[1][2][3]
| Name | Description |
|---|---|
| SUNSHUTTLE |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
GoldMax has impersonated systems management software to avoid detection.[1] |
| .005 | 伪装: Match Legitimate Name or Location |
GoldMax has used filenames that matched the system name, and appeared as a scheduled task impersonating systems management software within the corresponding ProgramData subfolder.[1][3] |
||
| Enterprise | T1573 | .002 | 加密通道: Asymmetric Cryptography |
GoldMax has RSA-encrypted its communication with the C2 server.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
GoldMax has decoded and decrypted the configuration file when executed.[1][2] |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
GoldMax can spawn a command shell, and execute native commands.[1][2] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
GoldMax has used HTTPS and HTTP GET requests with custom HTTP cookies for C2.[1][2] |
| Enterprise | T1001 | .001 | 数据混淆: Junk Data |
GoldMax has used decoy traffic to surround its malicious network traffic to avoid detection.[1] |
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing | |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
GoldMax has written AES-encrypted and Base64-encoded configuration files to disk.[1][2] |
||
| Enterprise | T1124 | 系统时间发现 |
GoldMax can check the current date-time value of the compromised system, comparing it to the hardcoded execution trigger and can send the current timestamp to the C2 server.[1][2] |
|
| Enterprise | T1016 | 系统网络配置发现 |
GoldMax retrieved a list of the system's network interface after execution.[1] |
|
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
GoldMax will check if it is being run in a virtualized environment by comparing the collected MAC address to |
| .003 | 虚拟化/沙盒规避: Time Based Evasion |
GoldMax has set an execution trigger date and time, stored as an ASCII Unix/Epoch time value.[1] |
||
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1041 | 通过C2信道渗出 |
GoldMax can exfiltrate files over the existing C2 channel.[1][2] |
|
| Enterprise | T1564 | .011 | 隐藏伪装: Ignore Process Interrupts |
The GoldMax Linux variant has been executed with the |
| Enterprise | T1053 | .003 | 预定任务/作业: Cron |
The GoldMax Linux variant has used a crontab entry with a |
| .005 | 预定任务/作业: Scheduled Task |
GoldMax has used scheduled tasks to maintain persistence.[1] |
||
| ID | Name | Description |
|---|---|---|
| C0024 | SolarWinds Compromise |