Name | Description |
---|---|
Trojan.Shunnael | |
X-Tunnel | |
XAPS |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography | |
Enterprise | T1008 | Fallback Channels |
The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.[3] |
|
Enterprise | T1046 | Network Service Scanning |
XTunnel is capable of probing the network for open ports.[2] |
|
Enterprise | T1027 | Obfuscated Files or Information |
A version of XTunnel introduced in July 2015 obfuscated the binary using opaque predicates and other techniques in a likely attempt to obfuscate it and bypass security products.[3] |
|
.001 | Binary Padding |
A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products.[3] |
||
Enterprise | T1090 | Proxy | ||
Enterprise | T1552 | .001 | Unsecured Credentials: Credentials In Files |
XTunnel is capable of accessing locally stored passwords on victims.[2] |
ID | Name | References |
---|---|---|
G0007 | APT28 |