(FireEye) This backdoor, known as LOWBALL, uses the legitimate Dropbox cloud-storage service to act as the CnC server. It uses the Dropbox API with a hardcoded bearer access token and has the ability to download, upload, and execute files. The communication occurs via HTTPS over port 443.
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
IP:Port | Timestamp |
---|
Domain | Timestamp |
---|
URL | Timestamp |
---|
2019-08-12 by Kindred Security from Kindred Security
2015-12-01 by FireEye Threat Intelligence from FireEye
Tool: LOWBALL
Names: LOWBALL
Description: (FireEye) This backdoor, known as LOWBALL, uses the legitimate Dropbox cloud-storage service to act as the CnC server. It uses the Dropbox API with a hardcoded bearer access token and has the ability to download, upload, and execute files. The communication occurs via HTTPS over port 443.
Category: Malware
Type: Backdoor, Exfiltration
Information: https://www.fireeye.com/blog/threat-research/2015/11/china-based-threat.html
Mitre-attack: https://attack.mitre.org/software/S0042/
Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.lowball
Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:lowball
Last-card-change: 2020-04-23
Source: https://apt.etda.or.th/cgi-bin/listtools.cgi
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
T1071.001 APPLICATION LAYER PROTOCOL : WEB PROTOCOLS lowball command and control occurs via https over port 443. T1105 INGRESS TOOL TRANSFER lowball uses the dropbox api to request two files, one of which is the same file as the one dropped by the malicious email attachment. this is most likely meant to be a mechanism to update the compromised host with a new version of the lowball malware. T1102.002 WEB SERVICE : BIDIRECTIONAL COMMUNICATION lowball uses the dropbox cloud storage service for command and control. |