Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Hi-Zor creates a Registry Run key to establish persistence.[2] |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
Hi-Zor encrypts C2 traffic with a double XOR using two distinct single-byte keys.[1] |
.002 | Encrypted Channel: Asymmetric Cryptography | |||
Enterprise | T1070 | .004 | Indicator Removal on Host: File Deletion |
Hi-Zor deletes its RAT installer file as it executes its DLL payload file.[2] |
Enterprise | T1105 | Ingress Tool Transfer |
Hi-Zor has the ability to upload and download files from its C2 server.[2] |
|
Enterprise | T1027 | Obfuscated Files or Information |
Hi-Zor uses various XOR techniques to obfuscate its components.[2] |
|
Enterprise | T1218 | .010 | Signed Binary Proxy Execution: Regsvr32 |
Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism.[2] |