Helminth is a backdoor that has at least two variants - one written in VBScript and PowerShell that is delivered via a macros in Excel spreadsheets, and one that is a standalone Windows executable.
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
IP:Port | Timestamp |
---|
Domain | Timestamp |
---|
URL | Timestamp |
---|
2020 by SecureWorks from Secureworks
2019-08-22 by Cyware from Cyware
2019-04-16 by Robert Falcone from
2017-04-27 by Michael Gorelik from Morphisec
2016-10-04 by Josh Grunzweig from Palo Alto Networks Unit 42
2016-05-26 by Robert Falcone from Palo Alto Networks Unit 42
2016-05-22 by Sudeep Singh from FireEye
Tool: Helminth
Names: Helminth
Description: Helminth is a backdoor that has at least two variants - one written in VBScript and PowerShell that is delivered via a macros in Excel spreadsheets, and one that is a standalone Windows executable.
Category: Malware
Type: Backdoor
Information: https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html
Information: https://unit42.paloaltonetworks.com/dns-tunneling-in-the-wild-overview-of-oilrigs-dns-tunneling/
Mitre-attack: https://attack.mitre.org/software/S0170/
Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.helminth
Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:Helminth
Last-card-change: 2020-05-13
Source: https://apt.etda.or.th/cgi-bin/listtools.cgi
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
T1059.001 COMMAND AND SCRIPTING INTERPRETER : POWERSHELL one version of helminth uses a powershell script. T1059.003 COMMAND AND SCRIPTING INTERPRETER : WINDOWS COMMAND SHELL helminth can provide a remote shell. one version of helminth uses batch scripting. T1059.005 COMMAND AND SCRIPTING INTERPRETER : VISUAL BASIC one version of helminth consists of vbscript scripts. | T1547.001 BOOT OR LOGON AUTOSTART EXECUTION : REGISTRY RUN KEYS / STARTUP FOLDER helminth establishes persistence by creating a shortcut in the start menu folder. T1547.009 BOOT OR LOGON AUTOSTART EXECUTION : SHORTCUT MODIFICATION helminth establishes persistence by creating a shortcut. | T1547.001 BOOT OR LOGON AUTOSTART EXECUTION : REGISTRY RUN KEYS / STARTUP FOLDER helminth establishes persistence by creating a shortcut in the start menu folder. T1547.009 BOOT OR LOGON AUTOSTART EXECUTION : SHORTCUT MODIFICATION helminth establishes persistence by creating a shortcut. | T1553.002 SUBVERT TRUST CONTROLS : CODE SIGNING helminth samples have been signed with legitimate, compromised code signing certificates owned by software company ai squared. | T1056.001 INPUT CAPTURE : KEYLOGGING the executable version of helminth has a module to log keystrokes. | T1069.001 PERMISSION GROUPS DISCOVERY : LOCAL GROUPS helminth has checked the local administrators group. T1069.002 PERMISSION GROUPS DISCOVERY : DOMAIN GROUPS helminth has checked for the domain admin group and exchange trusted subsystem groups using the commands net group exchange trusted subsystem /domain and net group domain admins /domain. | T1119 AUTOMATED COLLECTION a helminth vbscript receives a batch script to execute a set of commands in a command prompt. T1074.001 DATA STAGED : LOCAL DATA STAGING helminth creates folders to store output from batch scripts prior to sending the information to its c2 server. T1056.001 INPUT CAPTURE : KEYLOGGING the executable version of helminth has a module to log keystrokes. | T1132.001 DATA ENCODING : STANDARD ENCODING for c2 over http, helminth encodes data with base64 and sends it via the "cookie" field of http requests. for c2 over dns, helminth converts ascii characters into their hexadecimal values and sends the data in cleartext. T1573.001 ENCRYPTED CHANNEL : SYMMETRIC CRYPTOGRAPHY helminth encrypts data sent to its c2 server over http with rc4. | T1030 DATA TRANSFER SIZE LIMITS helminth splits data into chunks up to 23 bytes and sends the data in dns queries to its c2 server. |