A Chinese open-source backdoor.
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
IP:Port | Timestamp |
---|
Domain | Timestamp |
---|
URL | Timestamp |
---|
Tool: PCShare
Names: PCShare
Description: A Chinese open-source backdoor.
Category: Tools
Type: Backdoor
Information: https://github.com/LiveMirror/pcshare
Information: https://www.bitdefender.com/files/News/CaseStudies/study/379/Bitdefender-Whitepaper-Chinese-APT.pdf
Mitre-attack: https://attack.mitre.org/software/S1050/
Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.pcshare
Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:PcShare
Last-card-change: 2022-12-30
Source: https://apt.etda.or.th/cgi-bin/listtools.cgi
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
T1059.003 COMMAND AND SCRIPTING INTERPRETER : WINDOWS COMMAND SHELL pcshare can execute cmd commands on a compromised host. | T1546.015 EVENT TRIGGERED EXECUTION : COMPONENT OBJECT MODEL HIJACKING pcshare has created the hkcu\\software\\classes\\clsid\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\inprocserver32 registry key for persistence. | T1546.015 EVENT TRIGGERED EXECUTION : COMPONENT OBJECT MODEL HIJACKING pcshare has created the hkcu\\software\\classes\\clsid\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\inprocserver32 registry key for persistence. T1055 PROCESS INJECTION the pcshare payload has been injected into the logagent.exe and rdpclip.exe processes. | T1140 DEOBFUSCATE/DECODE FILES OR INFORMATION pcshare has decrypted its strings by applying a xor operation and a decompression using a custom implemented lzm algorithm. T1070.004 INDICATOR REMOVAL : FILE DELETION pcshare has deleted its files and components from a compromised host. T1036.001 MASQUERADING : INVALID CODE SIGNATURE pcshare has used an invalid certificate in attempt to appear legitimate. T1036.005 MASQUERADING : MATCH LEGITIMATE NAME OR LOCATION pcshare has been named wuauclt.exe to appear as the legitimate windows update autoupdate client. T1027 OBFUSCATED FILES OR INFORMATION pcshare has been encrypted with xor using different 32-long base16 strings and compressed with lzw algorithm. T1055 PROCESS INJECTION the pcshare payload has been injected into the logagent.exe and rdpclip.exe processes. | T1016 SYSTEM NETWORK CONFIGURATION DISCOVERY pcshare can obtain the proxy settings of a compromised machine using internetqueryoptiona and its ip address by running nslookup myip.opendns.comresolver1.opendns.com\r\n. | T1041 EXFILTRATION OVER C2 CHANNEL pcshare can upload files and information from a compromised host to its c2 servers. |