ShadowNet

Description

(Citizen Lab) ShadowNet malware leverages Windows Management Instrumentation (WMI), a system tool meant for administrators. Its intended usage as a tool for collecting system information and automation makes it an ideal mechanism for gathering and exfiltrating data. The use of legitimate Windows features can make it more difficult for administrators to identify activity as malicious.

ShadowNet typically uses multi-layered C2 infrastructure that first connects to blog websites and then retrieves C2 information from encoded strings left on the blog. By using blog sites as intermediaries the attackers can maintain control of compromised machines even if a C2 is blocked by a network firewall or otherwise goes down. If a C2 needs to be updated the attackers can simply point the intermediaries to new servers.

Names

Name
ShadowNet

Category

Malware

Type

  • Backdoor
  • Info stealer
  • Exfiltration

Information

Other Information

Uuid

93ab0ca2-e9e1-422e-b35e-04fe80d4974d

Last Card Change

2020-04-20