ID | X0006 |
Aliases | Bobax |
Platforms | Windows |
Year | 2014 |
Associated ATT&CK Software | None |
Gamut is a spamming botnet.
Name | Use |
---|---|
Command and Control::Application Layer Protocol::Web Protocols (T1071.001) | The malware uses HTTP for command and control. [1] |
Defense Evasion::File and Directory Permissions Modification (T1222) | Gamut sets file attributes. [3] |
Execution::Shared Modules (T1129) | Gamut links functions at runtime on Windows. [3] |
Name | Use |
---|---|
Defense Evasion::Modify Registry (E1112) | The malware adds a registry key. [1] |
Defense Evasion::Obfuscated Files or Information::Encoding-Standard Algorithm (E1027.m02) | Gamut encodes data using XOR. [3] |
Discovery::Application Window Discovery::Window Text (E1010.m01) | Gamut gets a graphical window text. [3] |
Command and Control::Ingress Tool Transfer (E1105) | The malware receives files from C2. [1] |
Discovery::File and Directory Discovery (E1083) | Gamut gets common file paths. [3] |
Discovery::System Information Discovery (E1082) | Gamut queries environment variables. [3] |
Execution::Command and Scripting Interpreter (E1059) | Gamut accepts command line arguments. [3] |
SHA256 Hashes
- a56162bc623841102301df8e5c918f27fe8c2a58ae049d81c838fcf256654932
- 1a9c4807500d25e83c456185a6b4571108e0f00c45667b520725ca8ae6f34fa4
[1] https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/gamut-spambot-analysis/
[2] https://any.run/report/a56162bc623841102301df8e5c918f27fe8c2a58ae049d81c838fcf256654932/1a6f6db3-83d5-442e-8f0d-42cfab2e0d34
[3] capa v4.0, analyzed at MITRE on 10/12/2022