Aria-body

Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.[1]

ID: S0456
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 26 May 2020
Last Modified: 19 August 2021

Techniques Used

Domain ID Name Use
Enterprise T1134 .001 Access Token Manipulation: Token Impersonation/Theft

Aria-body has the ability to duplicate a token from ntprint.exe.[1]

.002 Access Token Manipulation: Create Process with Token

Aria-body has the ability to execute a process using runas.[1]

Enterprise T1071 .001 Application Layer Protocol: Web Protocols

Aria-body has used HTTP in C2 communications.[1]

Enterprise T1010 Application Window Discovery

Aria-body has the ability to identify the titles of running windows on a compromised host.[1]

Enterprise T1560 Archive Collected Data

Aria-body has used ZIP to compress data gathered on a compromised host.[1]

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Aria-body has established persistence via the Startup folder or Run Registry key.[1]

Enterprise T1025 Data from Removable Media

Aria-body has the ability to collect data from USB devices.[1]

Enterprise T1140 Deobfuscate/Decode Files or Information

Aria-body has the ability to decrypt the loader configuration and payload DLL.[1]

Enterprise T1568 .002 Dynamic Resolution: Domain Generation Algorithms

Aria-body has the ability to use a DGA for C2 communications.[1]

Enterprise T1083 File and Directory Discovery

Aria-body has the ability to gather metadata from a file and to search for file and directory names.[1]

Enterprise T1070 .004 Indicator Removal on Host: File Deletion

Aria-body has the ability to delete files and directories on compromised hosts.[1]

Enterprise T1105 Ingress Tool Transfer

Aria-body has the ability to download additional payloads from C2.[1]

Enterprise T1106 Native API

Aria-body has the ability to launch files using ShellExecute.[1]

Enterprise T1095 Non-Application Layer Protocol

Aria-body has used TCP in C2 communications.[1]

Enterprise T1027 Obfuscated Files or Information

Aria-body has used an encrypted configuration file for its loader.[1]

Enterprise T1057 Process Discovery

Aria-body has the ability to enumerate loaded modules for a process.[1].

Enterprise T1055 .001 Process Injection: Dynamic-link Library Injection

Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe.[1]

Enterprise T1090 Proxy

Aria-body has the ability to use a reverse SOCKS proxy module.[1]

Enterprise T1113 Screen Capture

Aria-body has the ability to capture screenshots on compromised hosts.[1]

Enterprise T1082 System Information Discovery

Aria-body has the ability to identify the hostname, computer name, Windows version, processor speed, machine GUID, and disk information on a compromised host.[1]

Enterprise T1016 System Network Configuration Discovery

Aria-body has the ability to identify the location, public IP address, and domain name on a compromised host.[1]

Enterprise T1049 System Network Connections Discovery

Aria-body has the ability to gather TCP and UDP table status listings.[1]

Enterprise T1033 System Owner/User Discovery

Aria-body has the ability to identify the username on a compromised host.[1]

Groups That Use This Software

ID Name References
G0019 Naikon

[1][2]

References