BackConfig

BackConfig
(Type: Backdoor)

(Palo Alto) The BackConfig custom trojan has a flexible plug-in architecture for components offering various features, including the ability to gather system and keylog information and to upload and execute additional payloads.

[News Analysis] Trends:

Total Trend: 2

Trend Per Year
1
2020
1
2022


Trend Per Month
1
Jun 2020
1
Jul 2022



[News Analysis] News Mention Another Threat Name:

2 - BackConfig1 - QUILTED TIGER1 - VICEROY TIGER


[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
0/45
initial access
0/19
execution
5/36
persistence
2/113
privilege escalation
1/96
defense evasion
6/184
credential access
0/63
discovery
2/44
lateral movement
0/22
collection
0/37
command and control
2/39
exfiltration
0/18
impact
0/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.003
Command And Scripting Interpreter : Windows Command Shell
T1059.005
Command And Scripting Interpreter : Visual Basic
T1106
Native Api
T1053.005
Scheduled Task/job : Scheduled Task
T1204.001
User Execution : Malicious Link
T1137.001
Office Application Startup : Office Template Macros
T1053.005
Scheduled Task/job : Scheduled Task
T1053.005
Scheduled Task/job : Scheduled Task
T1140
Deobfuscate/decode Files Or Information
T1564.001
Hide Artifacts : Hidden Files And Directories
T1070.004
Indicator Removal : File Deletion
T1036.005
Masquerading : Match Legitimate Name Or Location
T1027.010
Obfuscated Files Or Information : Command Obfuscation
T1553.002
Subvert Trust Controls : Code Signing
T1083
File And Directory Discovery
T1082
System Information Discovery
T1071.001
Application Layer Protocol : Web Protocols
T1105
Ingress Tool Transfer


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

News Article (Credit @Malpedia)

Thirsty Gemini

2022-07-18 by Unit 42 from Palo Alto Networks Unit 42

Threat Assessment: Hangover Threat Group

2020-06-03 by Doel Santos from Palo Alto Networks Unit 42

Basic Information (Credit @etda.or.th)

Tool: BackConfig

Names: BackConfig

Description: (Palo Alto) The BackConfig custom trojan has a flexible plug-in architecture for components offering various features, including the ability to gather system and keylog information and to upload and execute additional payloads.

Category: Malware

Type: Backdoor

Information: https://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/

Information: https://ti.360.net/blog/articles/donot-group-is-targeting-pakistani-businessman-working-in-china-en/

Mitre-attack: https://attack.mitre.org/software/S0475/

Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.backconfig

Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:backconfig

Last-card-change: 2022-12-30

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.003
COMMAND AND SCRIPTING INTERPRETER : WINDOWS COMMAND SHELL
backconfig can download and run batch files to execute commands on a compromised host.
T1059.005
COMMAND AND SCRIPTING INTERPRETER : VISUAL BASIC
backconfig has used vbs to install its downloader component and malicious documents with vba macro code.
T1106
NATIVE API
backconfig can leverage api functions such as shellexecutea and httpopenrequesta in the process of downloading and executing files.
T1053.005
SCHEDULED TASK/JOB : SCHEDULED TASK
backconfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host.
T1204.001
USER EXECUTION : MALICIOUS LINK
backconfig has compromised victims via links to urls hosting malicious content.
T1137.001
OFFICE APPLICATION STARTUP : OFFICE TEMPLATE MACROS
backconfig has the ability to use hidden columns in excel spreadsheets to store executable files or commands for vba macros.
T1053.005
SCHEDULED TASK/JOB : SCHEDULED TASK
backconfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host.
T1053.005
SCHEDULED TASK/JOB : SCHEDULED TASK
backconfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host.
T1140
DEOBFUSCATE/DECODE FILES OR INFORMATION
backconfig has used a custom routine to decrypt strings.
T1564.001
HIDE ARTIFACTS : HIDDEN FILES AND DIRECTORIES
backconfig has the ability to set folders or files to be hidden from the windows explorer default view.
T1070.004
INDICATOR REMOVAL : FILE DELETION
backconfig has the ability to remove files and folders related to previous infections.
T1036.005
MASQUERADING : MATCH LEGITIMATE NAME OR LOCATION
backconfig has hidden malicious payloads in %userprofile%\adobe\driver\dwg\ and mimicked the legitimate dhcp service binary.
T1027.010
OBFUSCATED FILES OR INFORMATION : COMMAND OBFUSCATION
backconfig has used compressed and decimal encoded vbs scripts.
T1553.002
SUBVERT TRUST CONTROLS : CODE SIGNING
backconfig has been signed with self signed digital certificates mimicking a legitimate software company.
T1083
FILE AND DIRECTORY DISCOVERY
backconfig has the ability to identify folders and files related to previous infections.
T1082
SYSTEM INFORMATION DISCOVERY
backconfig has the ability to gather the victim's computer name.
T1071.001
APPLICATION LAYER PROTOCOL : WEB PROTOCOLS
backconfig has the ability to use https for c2 communiations.
T1105
INGRESS TOOL TRANSFER
backconfig can download and execute additional payloads on a compromised host.