TinyTurla

TinyTurla is a backdoor that has been used by Turla against targets in the US, Germany, and Afghanistan since at least 2020.[1]

ID: S0668
Type: MALWARE
Platforms: Windows
Contributors: Kyaw Pyiyt Htet, @KyawPyiytHtet; Massimiliano Romano, BT Security
Version: 1.1
Created: 02 December 2021
Last Modified: 26 March 2023

Techniques Used

Domain ID Name Use
Enterprise T1005 从本地系统获取数据

TinyTurla can upload files from a compromised host.[1]

Enterprise T1036 .004 伪装: Masquerade Task or Service

TinyTurla has mimicked an existing Windows service by being installed as Windows Time Service.[1]

.005 伪装: Match Legitimate Name or Location

TinyTurla has been deployed as w64time.dll to appear legitimate.[1]

Enterprise T1112 修改注册表

TinyTurla can set its configuration parameters in the Registry.[1]

Enterprise T1573 .002 加密通道: Asymmetric Cryptography

TinyTurla has the ability to encrypt C2 traffic with SSL/TLS.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

TinyTurla has been installed using a .bat file.[1]

Enterprise T1008 回退信道

TinyTurla can go through a list of C2 server IPs and will try to register with each until one responds.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

TinyTurla can use HTTPS in C2 communications.[1]

Enterprise T1106 本机API

TinyTurla has used WinHTTP, CreateProcess, and other APIs for C2 communications and other functions.[1]

Enterprise T1012 查询注册表

TinyTurla can query the Registry for its configuration information.[1]

Enterprise T1027 .011 混淆文件或信息: Fileless Storage

TinyTurla can save its configuration parameters in the Registry.[1]

Enterprise T1569 .002 系统服务: Service Execution

TinyTurla can install itself as a service on compromised machines.[1]

Enterprise T1105 输入工具传输

TinyTurla has the ability to act as a second-stage dropper used to infect the system with additional malware.[1]

Enterprise T1029 预定传输

TinyTurla contacts its C2 based on a scheduled timing set in its configuration.[1]

Groups That Use This Software

ID Name References
G0010 Turla

[1]

References