Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Goopy has the ability to communicate with its C2 over HTTP.[1] |
.003 | Application Layer Protocol: Mail Protocols |
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.[1] |
||
.004 | Application Layer Protocol: DNS |
Goopy has the ability to communicate with its C2 over DNS.[1] |
||
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel.[1] |
.005 | Command and Scripting Interpreter: Visual Basic |
Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2.[1] |
||
Enterprise | T1005 | Data from Local System |
Goopy has the ability to exfiltrate documents from infected systems.[1] |
|
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
Goopy has used a polymorphic decryptor to decrypt itself at runtime.[1] |
|
Enterprise | T1041 | Exfiltration Over C2 Channel |
Goopy has the ability to exfiltrate data over the Microsoft Outlook C2 channel.[1] |
|
Enterprise | T1574 | .002 | Hijack Execution Flow: DLL Side-Loading |
Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky, Microsoft, and Google.[1] |
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Goopy has the ability to disable Microsoft Outlook's security policies to disable macro warnings.[1] |
Enterprise | T1070 | Indicator Removal on Host |
Goopy has the ability to delete emails used for C2 once the content has been copied.[1] |
|
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Goopy has impersonated the legitimate goopdate.dll, which was dropped on the target system with a legitimate GoogleUpdate.exe.[1] |
Enterprise | T1106 | Native API |
Goopy has the ability to enumerate the infected system's user name via |
|
Enterprise | T1027 | Obfuscated Files or Information |
Goopy's decrypter have been inflated with junk code in between legitimate API functions, and also included infinite loops to avoid analysis.[1] |
|
.001 | Binary Padding |
Goopy has had null characters padded in its malicious DLL payload.[1] |
||
Enterprise | T1057 | Process Discovery |
Goopy has checked for the Google Updater process to ensure Goopy was loaded properly.[1] |
|
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
Goopy has the ability to maintain persistence by creating scheduled tasks set to run every hour.[1] |
Enterprise | T1033 | System Owner/User Discovery |
Goopy has the ability to enumerate the infected system's user name.[1] |
ID | Name | References |
---|---|---|
G0050 | APT32 |