Skip to content

Latest commit

 

History

History
81 lines (63 loc) · 4.22 KB

blackenergy.md

File metadata and controls

81 lines (63 loc) · 4.22 KB
ID X0002
Aliases None
Platforms Windows
Year 2007
Associated ATT&CK Software BlackEnergy

BlackEnergy

An HTTP-based botnet used mostly for DDoS attacks. [1]

ATT&CK Techniques

See ATT&CK: BlackEnergy - Techniques Used.

Enhanced ATT&CK Techniques

Name Use
Defense Evasion::Process Injection::Injection using Shims (E1055.m05) Bypasses UAC using a Shim Database instructing SndVol.exe to execute cmd.exe instead, allowing for elevated execution [1]
Defense Evasion::Install Insecure or Malicious Configuration (E1479) Configures the system to the TESTSIGNING boot configuration option to load its unsigned driver component [1] [1]
Defense Evasion::Indicator Blocking (F0006) Clears windows event logs and removes the watermark associated with enabling the TESTSIGNING boot configuration option by removing the relevent strings in the user32.dll.mui of the system [1]
Persistence::Modify Existing Service (F0011) Locates an inactive driver service to Hijack and set it to start automatically [1]
Defense Evasion::Process Injection (E1055) injects its dll component into svchost.exe [1]
Discovery::System Information Discovery (E1082) uses Systeminfo to gather OS version, system configuration, BIOS, the motherboard, and processor [ [1]
Collection::Keylogging (F0002) Keylogger plugin allows for collection of keystrokes [2]
Collection::Screen Capture (E1113) Screenshot plugin allows for collection of screenshots [2]
Persistence::Registry Run Keys / Startup Folder (F0012) BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder [1]
Impact::Data Destruction (E1485) BlackEnergy 2 variant contains a Destroy plugin that destroys data stored on victim hard drives by overwriting file contents [3]

MBC Behaviors

Name Use
Impact::Denial of Service (B0033) Originally built to launch distributed denial of service attacks that can target more than one IP address per hostname [1]
Execution::Remote Commands (B0011) infected bots receive commands from botmaster to load plugins associated with botmaster's goals [1]

Indicators of Compromise

SHA256 Hashes

  • e791718c0141e3829608142fb0f0d35c9af270f78ae0b72fce2edd07a9684568
  • d841d9092239fc029b10da01c19868749b0f6bd757926ff04674658468495808
  • bc062acda428f55782710f9c4f2df88c26dfbc004b94b479459f8572b1219444
  • 16d68b740b5d9aa60929e39fd616d31be2c8528d0f1e58db4cbb16976f7cd725
  • af62f29ac01e8335bf41c02c1460ebafcbaf94956b1001f7d515eecf63cea4f2
  • 47aea6a4e1da1fb8b454c038c21736bee53d59d095a4f5b866d5dd8158fead41
  • 4b2efcda5269f4b80dc417a2b01332185f2fafabd8ba7114fa0306baaab5a72d
  • b1ca89de93a1d9bf17cdbf8a3c61e7f52f275a3bcbbd285d35d6a40c45dde9bd
  • 951e5623c20d4e9ab158fe105436389dbf61327b2c87b7fb36f8ad3ff5ad9bde
  • f8b974cf978a3828aeb9b83fc48645da576e4b90dd47c2b82a46f6c14665a9e5
  • 91f72808aaed45a76ff1044a23fd6df4b7ab7ace292725522518feb9c0b8574e
  • 2aade7381aa87f55b7d7a5284d22be5472fd8cd966d216fd4445ca3a8bbb3ff3
  • 01425582aa5001342b985270a365fd92d909be011384247e81872bff586fa142

References

[1] https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf

[2] https://securelist.com/be2-custom-plugins-router-abuse-and-target-profiles/67353/

[3] https://securelist.com/be2-extraordinary-plugins-siemens-targeting-dev-fails/68838/