GrimAgent

GrimAgent is a backdoor that has been used before the deployment of Ryuk ransomware since at least 2020; it is likely used by FIN6 and Wizard Spider.[1]

ID: S0632
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 16 July 2021
Last Modified: 19 September 2024

Techniques Used

Domain ID Name Use
Enterprise T1005 从本地系统获取数据

GrimAgent can collect data and files from a compromised host.[1]

Enterprise T1573 .001 加密通道: Symmetric Cryptography

GrimAgent can use an AES key to encrypt C2 communications.[1]

.002 加密通道: Asymmetric Cryptography

GrimAgent can use a hardcoded server public RSA key to encrypt the first request to C2.[1]

Enterprise T1140 反混淆/解码文件或信息

GrimAgent can use a decryption algorithm for strings based on Rotate on Right (RoR) and Rotate on Left (RoL) functionality.[1]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

GrimAgent can set persistence with a Registry run key.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

GrimAgent can use the Windows Command Shell to execute commands, including its own removal.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

GrimAgent has the ability to use HTTP for C2 communications.[1]

Enterprise T1480 .002 执行保护: Mutual Exclusion

GrimAgent uses the last 64 bytes of the binary to compute a mutex name. If the generated name is invalid, it will default to the generic mymutex.[1]

Enterprise T1001 .001 数据混淆: Junk Data

GrimAgent can pad C2 messages with random generated values.[1]

Enterprise T1132 .001 数据编码: Standard Encoding

GrimAgent can base64 encode C2 replies.[1]

Enterprise T1083 文件和目录发现

GrimAgent has the ability to enumerate files and directories on a compromised host.[1]

Enterprise T1106 本机API

GrimAgent can use Native API including GetProcAddress and ShellExecuteW.[1]

Enterprise T1027 混淆文件或信息

GrimAgent has used Rotate on Right (RoR) and Rotate on Left (RoL) functionality to encrypt strings.[1]

.001 Binary Padding

GrimAgent has the ability to add bytes to change the file hash.[1]

Enterprise T1070 .004 移除指标: File Deletion

GrimAgent can delete old binaries on a compromised host.[1]

.009 移除指标: Clear Persistence

GrimAgent can delete previously created tasks on a compromised host.[1]

Enterprise T1614 系统位置发现

GrimAgent can identify the country code on a compromised host.[1]

.001 System Language Discovery

GrimAgent has used Accept-Language to identify hosts in the United Kingdom, United States, France, and Spain.[1]

Enterprise T1082 系统信息发现

GrimAgent can collect the OS, and build version on a compromised host.[1]

Enterprise T1033 系统所有者/用户发现

GrimAgent can identify the user id on a target machine.[1]

Enterprise T1016 系统网络配置发现

GrimAgent can enumerate the IP and domain of a target system.[1]

Enterprise T1497 .003 虚拟化/沙盒规避: Time Based Evasion

GrimAgent can sleep for 195 - 205 seconds after payload execution and before deleting its task.[1]

Enterprise T1105 输入工具传输

GrimAgent has the ability to download and execute additional payloads.[1]

Enterprise T1041 通过C2信道渗出

GrimAgent has sent data related to a compromise host over its C2 channel.[1]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

GrimAgent has the ability to set persistence using the Task Scheduler.[1]

Groups That Use This Software

ID Name References
G0037 FIN6

[1]

G0102 Wizard Spider

[1]

References