| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
SombRAT has collected data and files from a compromised host.[1][3] |
|
| Enterprise | T1090 | 代理 |
SombRAT has the ability to use an embedded SOCKS proxy in C2 communications.[3] |
|
| Enterprise | T1036 | 伪装 |
SombRAT can use a legitimate process name to hide itself.[3] |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| .002 | 加密通道: Asymmetric Cryptography | |||
| Enterprise | T1568 | .002 | 动态解析: Domain Generation Algorithms |
SombRAT can use a custom DGA to generate a subdomain for C2.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
SombRAT can run |
|
| Enterprise | T1071 | .004 | 应用层协议: DNS | |
| Enterprise | T1560 | .003 | 归档收集数据: Archive via Custom Method |
SombRAT has encrypted collected data with AES-256 using a hardcoded key.[1] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
SombRAT can store harvested data in a custom database under the %TEMP% directory.[1] |
| Enterprise | T1083 | 文件和目录发现 |
SombRAT can execute |
|
| Enterprise | T1106 | 本机API |
SombRAT has the ability to respawn itself using |
|
| Enterprise | T1027 | 混淆文件或信息 |
SombRAT can encrypt strings with XOR-based routines and use a custom AES storage format for plugins, configuration, C2 domains, and harvested data.[1][2][3] |
|
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
SombRAT has the ability to run |
| Enterprise | T1082 | 系统信息发现 |
SombRAT can execute |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
SombRAT can execute |
|
| Enterprise | T1124 | 系统时间发现 |
SombRAT can execute |
|
| Enterprise | T1007 | 系统服务发现 | ||
| Enterprise | T1105 | 输入工具传输 |
SombRAT has the ability to download and execute additional payloads.[1][2][3] |
|
| Enterprise | T1057 | 进程发现 |
SombRAT can use the |
|
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection |
SombRAT can execute |
| Enterprise | T1041 | 通过C2信道渗出 |
SombRAT has uploaded collected data and files from a compromised host to its C2 server.[1] |
|
| Enterprise | T1564 | .010 | 隐藏伪装: Process Argument Spoofing |
SombRAT has the ability to modify its process memory to hide process command-line arguments.[2] |
| Enterprise | T1095 | 非应用层协议 |
SombRAT has the ability to use TCP sockets to send data and ICMP to ping the C2 server.[1][2] |
|
| ID | Name | Description |
|---|---|---|
| C0004 | CostaRicto |
During CostaRicto, threat actors used SombRAT in conjuction with CostaBricks and PowerSploit.[1] |