Skip to content

Latest commit

 

History

History
64 lines (49 loc) · 2.47 KB

archive-collected-data.md

File metadata and controls

64 lines (49 loc) · 2.47 KB
ID E1560
Objective(s) Exfiltration
Related ATT&CK Techniques Archive Collected Data (T1560)
Version 3.0
Created 27 August 2019
Last Modified 1 March 2023

Archive Collected Data

Malware may obfuscate data via encryption or encoding before exfiltration.

See ATT&CK Technique: Archive Collected Data (T1560).

Methods

Name ID Description
Encoding E1560.m01 Data is encoded.
Encoding - Custom Encoding E1560.m04 Data is encoded. A custom algorithm is used to encode the exfiltrated data.
Encoding - Standard Encoding E1560.m03 Data is encoded. A standard algorithm, such as base64 encoding, is used to encode the exfiltrated data.
Encryption E1560.m02 Data is encrypted.
Encryption - Custom Encryption E1560.m06 Data is encrypted. A custom algorithm is used to encrypt the exfiltrated data.
Encryption - Standard Encryption E1560.m05 Data is encrypted. A standard algorithm, such as Rijndael/AES, DES, RC4, is used to encrypt the exfiltrated data.

Use in Malware

Name Date Method Description
TrickBot 2016 E1560.m02 The malware uses a custom crypter leveraging Microsoft's CryptoAPI to encrypt C2 traffic. C2 update responses seem to have been digitally signed using bcrypt. [1]
Stuxnet 2010 E1560.m04 Exfiltrated payloads are XORed with a static 31-byte long byte string found inside Stuxnet and hexified in order to be passed on as an ASCII data parameter in an HTTP request to the C2 servers. [2]
Matanbuchus 2021 E1560.m03 Malware sends data as a Base64 string of JSON. [3] [4]

References

[1] https://www.bitdefender.com/blog/labs/trickbot-is-dead-long-live-trickbot/

[2] https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en

[3] https://www.0ffset.net/reverse-engineering/matanbuchus-loader-analysis/

[4] https://www.cyberark.com/resources/threat-research-blog/inside-matanbuchus-a-quirky-loader