ATT&CK Techniques used by Netwire (Linux-specific in bold)
ATT&CK ID | Tactic | Description | Notes |
---|---|---|---|
ATT&CK ID: XDG Autostart Entries | Tactic: N/A | Description : Netwire may persist using XDG Autostart Entries on Linux systems. | Notes : The name may be configured by a user at the time of binary compilation. |
ATT&CK ID: Data Compressed (T1002) | Tactic: Exfiltration | Description : Netwire can automatically archive captured screenshots with compression. | Notes : |
ATT&CK ID: Application Window Discovery (T1010) | Tactic: Discovery | Description : Netwire can discover and close windows on controlled systems. | Notes : |
ATT&CK ID: System Network Configuration Discovery (T1016) | Tactic: Discovery | Description : Netwire contacts external domains to discover its public IP address. | Notes : Netwire binaries are coded to use the domain |
ATT&CK ID: Data Encrypted (T1022) | Tactic: Exfiltration | Description : Netwire stores captured keystrokes in encrypted log files. | Notes : |
ATT&CK ID: Standard Cryptographic Protocol (T1032) | Tactic: Command and Control | Description : Netwire uses AES encryption for data transferred. | Notes : |
ATT&CK ID: System Owner/User Discovery (T1033) | Tactic: Discovery | Description : Netwire can discover logged on users. | Notes : |
ATT&CK ID: Masquerading (T1036) | Tactic: Defense Evasion | Description : Netwire RATs have masqueraded as other software. In addition, its network traffic masquerades as its user agent. | Notes : Netwire has impersonated TeamViewer, macOS Finder, and other software. It commonly uses the user agent |
ATT&CK ID: Software Packing (T1045) | Tactic: Defense Evasion | Description : Some campaigns using Netwire have used .NET packer tools for AV evasion. | Notes : |
ATT&CK ID: Scheduled Task (T1053) | Tactic: Execution, Persistence, Privilege Escalation | Description : Some campaigns using Netwire have used Scheduled Tasks for persistence. | Notes : Scheduled Task functionality is not built into Netwire; it is usually implemented by another mechanism deploying Netwire. |
ATT&CK ID: Process Injection (T1055) | Tactic: Defense Evasion, Privilege Escalation | Description : Some campaigns using Netwire have used process injection to shield execution from scrutiny. | Notes : The code has been injected into system processes like |
ATT&CK ID: Input Capture (T1056) | Tactic: Collection, Credential Access | Description : Netwire can perform keylogging. | Notes : |
ATT&CK ID: Process Discovery (T1057) | Tactic: Discovery | Description : Netwire can discover and kill processes on controlled systems. | Notes : This is performed without external commands. |
ATT&CK ID: Command-Line Interface (T1059) | Tactic: Execution | Description : Netwire can issue commands using | Notes : |
ATT&CK ID: Registry Run Keys / Startup Folder (T1060) | Tactic: Persistence | Description : Netwire creates a Registry start-up entry to establish persistence. | Notes : The name may be configured by a user at the time of binary compilation. |
ATT&CK ID: Local Job Scheduling (T1168) | Tactic: Persistence, Execution | Description : Netwire contains the ability to persist via | Notes : |
ATT&CK ID: Credentials in Files (T1081) | Tactic: Credential Access | Description : Netwire can retrieve passwords from messaging and mail client applications. | Notes : Supported applications are Windows Live Messenger, Pidgin, Mozilla Thunderbird, and Microsoft Outlook. |
ATT&CK ID: System Information Discovery (T1082) | Tactic: Discovery | Description : Netwire can discover and collect victim system information | Notes : |
ATT&CK ID: Connection Proxy (T1090) | Tactic: Command And Control, Defense Evasion | Description : Netwire can proxy network traffic for a system. | Notes : |
ATT&CK ID: Process Hollowing (T1093) | Tactic: Defense Evasion | Description : Some campaigns using Netwire have used process hollowing to shield execution from scrutiny. | Notes : |
ATT&CK ID: Remote File Copy (T1105) | Tactic: Command And Control, Lateral Movement | Description : Netwire contains the ability to transfer files to remote systems. | Notes : |
ATT&CK ID: Modify Registry (T1112) | Tactic: Defense Evasion | Description : Netwire stores its configuration within the Windows Registry. | Notes : The configuration information is usually stored under |
ATT&CK ID: Screen Capture (T1113) | Tactic: Collection | Description : NETWIRE can capture the victim’s screen. | Notes : |
ATT&CK ID: Code Signing (T1116) | Tactic: Defense Evasion | Description : The Netwire client has been signed by fake and invalid digital certificates. | Notes : |
ATT&CK ID: Launch Agent (T1159) | Tactic: Defense Evasion | Description : Netwire contains macOS startup options for Launch Agents. | Notes : The name may be configured by a user at the time of binary compilation. |
ATT&CK ID: Login Item (T1162) | Tactic: Persistence | Description : Netwire contains macOS startup options for Login Items. | Notes : The name may be configured by a user at the time of binary compilation.
|
ATT&CK ID: Credentials from Web Browsers (T1503) | Tactic: Credential Access | Description : Netwire can retrieve passwords from numerous web browsers. | Notes : Supported browsers are Mozilla Firefox, Internet Explorer, Opera, Chromium, and SeaMonkey. |