IPsec Helper

IPsec Helper is a post-exploitation remote access tool linked to Agrius operations. This malware shares significant programming and functional overlaps with Apostle ransomware, also linked to Agrius. IPsec Helper provides basic remote access tool functionality such as uploading files from victim systems, running commands, and deploying additional payloads.[1]

ID: S1132
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 22 May 2024
Last Modified: 29 August 2024

Techniques Used

Domain ID Name Use
Enterprise T1005 从本地系统获取数据

IPsec Helper can identify specific files and folders for follow-on exfiltration.[1]

Enterprise T1112 修改注册表

IPsec Helper can make arbitrary changes to registry keys based on provided input.[1]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

IPsec Helper can run arbitrary PowerShell commands passed to it.[1]

.003 命令与脚本解释器: Windows Command Shell

IPsec Helper can run arbitrary commands passed to it through cmd.exe.[1]

.005 命令与脚本解释器: Visual Basic

IPsec Helper can run arbitrary Visual Basic scripts and commands passed to it.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

IPsec Helper connects to command and control servers via HTTP POST requests based on parameters hard-coded into the malware.[1]

Enterprise T1570 横向工具传输

IPsec Helper can download additional payloads from command and control nodes and execute them.[1]

Enterprise T1027 .013 混淆文件或信息: Encrypted/Encoded File

IPsec Helper contains an embedded XML configuration file with an encrypted list of command and control servers. These are written to an external configuration file during execution.[1]

Enterprise T1070 移除指标

IPsec Helper can delete various registry keys related to its execution and use.[1]

.004 File Deletion

IPsec Helper can delete itself when given the appropriate command.[1]

.009 Clear Persistence

IPsec Helper can delete various service traces related to persistent execution when commanded.[1]

Enterprise T1569 .002 系统服务: Service Execution

IPsec Helper is run as a Windows service in victim environments.[1]

Enterprise T1497 .003 虚拟化/沙盒规避: Time Based Evasion

IPsec Helper will sleep for a random number of seconds, iterating 200 times over sleeps between one to three seconds, before continuing execution flow.[1]

Enterprise T1057 进程发现

IPsec Helper can identify the process it is currently running under and its number, and pass this back to a command and control node.[1]

Enterprise T1041 通过C2信道渗出

IPsec Helper exfiltrates specific files through its command and control framework.[1]

Groups That Use This Software

ID Name References
G1030 Agrius

Agrius uses IPsec Helper as a post-exploitation remote access tool framework.[1]

References