ID | X0033 |
Type | Dropper |
Aliases | None |
Platforms | Windows |
Year | 2016 |
Associated ATT&CK Software | None |
UP007 is a dropper used in an espionage campaign targeting Hong Kong democracy activists. [1]
Name | Use |
---|---|
Collection::Keylogging (F0002) | The malware logs keystrokes to a file. [1] |
Defense Evasion::Process Injection::Dynamic-link Library Injection (E1055.001) | The malware loads multiple DLLs into memory. [1] |
Command and Control::Ingress Tool Transfer (E1105) | The malware downloads files from the C2. [1] |
Defense Evasion::Obfuscated Files or Information::Encoding-Standard Algorithm (E1027.m02) | UP007 encodes data using XOR. [2] |
Discovery::Application Window Discovery::Window Text (E1010.m01) | UP007 gets graphical window text. [2] |
Discovery::File and Directory Discovery (E1083) | UP007 enumerates files on Windows. [2] |
Discovery::System Information Discovery (E1082) | UP007 queries environment variables. [2] |
Execution::Command and Scripting Interpreter (E1059) | UP007 accepts command line arguments. [2] |
SHA256 Hashes
- 5b875ecf0b7f67a4429aeaa841eddf8e6b58771e16dbdb43ad6918aa7a5b582d
- ddc05b9f39f579f64742980980ca9820b83a243889bbc5baa37f5c2c1c4beb30
- 41d05788d844b59f8eb79aeb2060dd5b7bdcad01e8d720f4b8b80d552e41cfe2
- 2ac69633da711f244377483d99fac53089ec6614a61d8a1492a0e7228cbb8ffd
- 5838582ea26312cc60b43da555189b439d3688597a705e3a52dc4d935517f69d
- 5b34b3365eb6a6c700b391172849a2668d66a167669018ae3b9555bc2d1e54ab
- ec05e37230e6534fa148b8e022f797ad0afe80f699fbd222a46672118663cf00
- b748b61ff6c3ea0c64f2359c44e022c629378aab6d7377e64c6ad0dcc5f78746 IP Addresses
- 59.188.12[.]123
[1] https://citizenlab.ca/2016/04/between-hong-kong-and-burma/
[2] capa v4.0, analyzed at MITRE on 10/12/2022