QUIETEXIT

Description

(Mandiant) QUIETEXIT works as if the traditional client-server roles in an SSH connection were reversed. Once the client, running on a compromised system, establishes a TCP connection to a server, it performs the SSH server role. The QUIETEXIT component running on the threat actor’s infrastructure initiates the SSH connection and sends a password. Once the backdoor establishes a connection, the threat actor can use any of the options available to an SSH client, including proxying traffic via SOCKS. QUIETEXIT has no persistence mechanism; however, we have observed UNC3524 install a run command (rc) as well as hijack legitimate application-specific startup scripts to enable the backdoor to execute on system startup.

Names

Name
QUIETEXIT

Category

Malware

Type

  • Backdoor
  • Tunneling

Information

Mitre Attack

Malpedia

Other Information

Uuid

f7540533-ada8-45ac-915d-1c550090338a

Last Card Change

2023-11-30