Skip to content

Latest commit

 

History

History
71 lines (54 loc) · 3.36 KB

remote-access.md

File metadata and controls

71 lines (54 loc) · 3.36 KB
ID B0022
Objective(s) Impact, Persistence
Related ATT&CK Techniques None
Impact Type Breach
Version 2.0
Created 1 August 2019
Last Modified 13 September 2023

Remote Access

Malware may provide an attacker with potentially full access to a system via a remote network connection, which may also provide persistence.

A RAT (Remote Access Trojan) is an example of malware that provides a degree of remote access. If the malware provides an "execute" command, the attacker may choose to delete files or corrupt data, power-off the machine, or upload and execute other applications. The malware may also provide specific commands to the attacker (e.g., Delete File). Explicit commands provided by the malware can be captured with Methods associated with the Execution::Remote Commands (B0011) behavior; examples include Execution:Remote Commands:Execute and Execution:Remote Commands:Delete File.

Note that the Ingress Tool Transfer (T1105) technique defined under the Command and Control tactic is no longer specific to "legitimate desktop support and remote access software” as it was under a previous version of ATT&CK. However, Ingress Tool Transfer relates only to files copied; this MBC behavior is broader, allowing for remote access behaviors beyond file transfers (i.e., Impact:Remote Access and Command and Control: Ingress Tool Transfer are not equivalent).

Methods

Name ID Description
Reverse Shell B0022.001 Malware may create a reverse shell. For example, malware can invoke cmd.exe and create three pipes (stdin, stdout, stderr) to forward data between cmd.exe and an adversary.

Use in Malware

Name Date Method Description
Poison Ivy 2005 -- After the Poison Ivy server is running on the target machine, the attacker can use a Windows GUI client to control the target computer. [2]
Dark Comet 2008 -- Dark Comet allows an attacker to control the system via a GUI. [3]
Hupigon 2013 -- The malware acts as a backdoor. [4]

Detection

Tool: capa Mapping APIs
create reverse shell on Linux Remote Access::Reverse Shell (B0022.001)
create reverse shell Remote Access::Reverse Shell (B0022.001) kernel32.PeekNamedPipe, kernel32.CreateProcess, kernel32.ReadFile, kernel32.WriteFile

References

[1] https://en.wikipedia.org/wiki/Remote_access_trojan

[2] https://www.cyber.nj.gov/threat-center/threat-profiles/trojan-variants/poison-ivy

[3] https://en.wikipedia.org/wiki/DarkComet

[4] https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/HUPIGON