STARWHALE is Windows Script File (WSF) backdoor that has been used by MuddyWater, possibly since at least November 2021; there is also a STARWHALE variant written in Golang with similar capabilities. Security researchers have also noted the use of STARWHALE by UNC3313, which may be associated with MuddyWater.[1][2]
| Name | Description |
|---|---|
| CANOPY |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 | ||
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
STARWHALE has the ability to create the following Windows service to establish persistence on an infected host: |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
STARWHALE can establish persistence by installing itself in the startup folder, whereas the GO variant has created a |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
STARWHALE has the ability to execute commands via |
| .005 | 命令与脚本解释器: Visual Basic |
STARWHALE can use the VBScript function |
||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
STARWHALE has the ability to contact actor-controlled C2 servers via HTTP.[1][2] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
STARWHALE has stored collected data in a file called |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
STARWHALE has the ability to hex-encode collected data from an infected host.[2] |
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File | |
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
STARWHALE has relied on victims opening a malicious Excel file for execution.[2] |
| Enterprise | T1082 | 系统信息发现 |
STARWHALE can gather the computer name of an infected host.[1][2] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
STARWHALE can gather the username from an infected host.[1][2] |
|
| Enterprise | T1016 | 系统网络配置发现 |
STARWHALE has the ability to collect the IP address of an infected host.[2] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
STARWHALE can exfiltrate collected data to its C2 servers.[2] |
|
| ID | Name | References |
|---|---|---|
| G0069 | MuddyWater |