ID | C0027 |
Objective(s) | Cryptography |
Related ATT&CK Techniques | None |
Version | 2.0 |
Created | 13 October 2020 |
Last Modified | 21 November 2022 |
Malware may encrypt data.
Name | ID | Description |
---|---|---|
AES | C0027.001 | Malware encrypts with the AES algorithm. |
Block Cipher | C0027.014 | Malware encrypts with a block cipher. |
Blowfish | C0027.002 | Malware encrypts with the Blowfish algorithm. |
Camellia | C0027.003 | Malware encrypts with the Camellia algorithm. |
3DES | C0027.004 | Malware encrypts with the 3DES algorithm. |
HC-128 | C0027.006 | Malware encrypts with the HC-128 algorithm. |
HC-256 | C0027.007 | Malware encrypts with the HC-256 algorithm. |
RC4 | C0027.009 | Malware encrypts with the RC4 algorithm. |
RC6 | C0027.010 | Malware encrypts with the RC6 algorithm. |
RSA | C0027.011 | Malware encrypts with the RSA algorithm. |
Skipjack | C0027.013 | Malware encrypts with the Skipjack block cipher algorithm. |
Sosemanuk | C0027.008 | Malware encrypts with the Sosemanuk stream cipher. |
Stream Cipher | C0027.012 | Malware encrypts with a stream cipher. |
Twofish | C0027.005 | Malware encrypts with the Twofish algorithm. |
Name | Date | Method | Description |
---|---|---|---|
TrickBot | 2016 | -- | Uses an AES CBC (256 bits) encryption algorithm for its loader and configuration files [1] |
Emotet | 2018 | -- | Emotet uses RSA to encrypt network traffic to its C2 [2] |
GravityRAT | 2018 | -- | GravityRat v3 supports file AES file encryption [3] |
Poison-Ivy | 2005 | -- | Poison Ivy's custom network protocol over TCP is encrypted using Camellia cipher with a 256-bit key [4] |
CHOPSTICK | 2015 | -- | CHOPSTICK encrypts the configuration block using RC4 encryption [5] |
Encrypt Data
SHA256: c86cbf5e78c9f05ecfc11e4f2c147781cef77842a457e19ba690477eb564c22basm push ebx mov ebx, [esp+4+arg_4] push esi lea eax, [ebx+20h] push eax ; unsigned int call ??2@YAPAXI@Z ; operator new(uint) mov ecx, [esp+0Ch+arg_C] mov edx, eax add esp, 4 mov esi, [ecx] mov [edx], esi mov esi, [ecx+4] mov [edx+4], esi mov ecx, [ecx+8] mov [edx+8], ecx mov edx, [esp+8+arg_8] test ebx, ebx mov [eax+0Ch], edx jle short loc_B mov esi, [esp+8+arg_0] push edi mov edi, 0FFFFFFFDh lea edx, [eax+3] sub edi, eaxloc_A: mov cl, [edx-3] xor cl, [edx+2] xor cl, [edx-1] xor cl, [edx] mov [edx+0Dh], cl xor [esi], cl inc edx inc esi lea ecx, [edi+edx] cmp ecx, ebx jl short loc_A pop edi
loc_B: push eax ; void * call ??3@YAXPAX@Z ; operator delete(void *) add esp, 4 mov eax, 1 pop esi pop ebx retn
[1] https://www.securityartwork.es/wp-content/uploads/2017/07/Trickbot-report-S2-Grupo.pdf
[2] https://documents.trendmicro.com/assets/white_papers/ExploringEmotetsActivities_Final.pdf
[3] https://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html
[4] https://www.cyber.nj.gov/threat-center/threat-profiles/trojan-variants/poison-ivy
[5] https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf