OPENHUNTING.IO
  • Home
  • Threat Library
  • Threat Report
  • Threat Hunting Tools
  • Whois
  • Github
Openhunting Threat Library

    Scote

    Scote
    (Type: Backdoor)

    (Palo Alto) Scote provides backdoor access for an attacker and we have observed it collecting command and control (C2) information from Pastebin links as well as Google+ profiles. The bit.ly links obscured the C2 URLs so victims could not evaluate the legitimacy of the final site prior to clicking it. We are calling their recent activity the “TopHat” campaign.

    [News Analysis] Trends:

    Total Trend: 1

    Trend Per Year
    1
    2018


    Trend Per Month
    1
    Jan 2018



    [News Analysis] News Mention Another Threat Name:

    0 - Scote


    [TTP Analysis] Technique Performance:



    [TTP Analysis] Mitre Attack Matrix:

    TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
    Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact


    [Infrastructure Analysis] Based on Related IOC:

    IP:Port Timestamp
    Domain Timestamp
    URL Timestamp


    [Target Analysis] Region/Sector:



    References:

    News Basic Information Indicator of Compromise Mitre Attack

    News Article (Credit @Malpedia)

    The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services

    2018-01-26 by Josh Grunzweig from Palo Alto Networks Unit 42

    Basic Information (Credit @etda.or.th)

    Tool: Scote

    Names: Scote

    Description: (Palo Alto) Scote provides backdoor access for an attacker and we have observed it collecting command and control (C2) information from Pastebin links as well as Google+ profiles. The bit.ly links obscured the C2 URLs so victims could not evaluate the legitimacy of the final site prior to clicking it. We are calling their recent activity the “TopHat” campaign.

    Category: Malware

    Type: Backdoor

    Information: https://unit42.paloaltonetworks.com/unit42-the-tophat-campaign-attacks-within-the-middle-east-region-using-popular-third-party-services/

    Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.scote

    Last-card-change: 2020-04-23

    Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

    TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
    Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact

    Copyright © 2023. Openhunting.io - Threat Library