SocksBot
Description
(Accenture) The SOCKSBOT implant has the following capabilities: • Enumerate processes (process list) • Take screenshots • Download, upload, write, and execute files • Create and inject into new processes • Communicate to C2 via sockets.
This implant will communicate with the designated C2 server by first creating a buffer and will, on first execution, communicate to the C2 server that it has successfully infected a target by using a .php URI that is pseudo-randomly generated. SOCKSBOT uses the ObtainUserAgentString API to determine the default user-agent of the machine.
Names
Name |
---|
SocksBot |
BIRDDOG |
Nadrac |
Category
Malware
Type
- Reconnaissance
- Backdoor
- Info stealer
- Exfiltration
- Downloader
- Loader
Information
- https://www.accenture.com/_acnmedia/pdf-83/accenture-goldfin-security-alert.pdf
- https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html
- https://documents.trendmicro.com/assets/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf
Mitre Attack
Malpedia
Alienvault Otx
Other Information
Uuid
43ced180-196d-4510-95cf-a4f7d9f05d2a
Last Card Change
2020-05-14