Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
BLUELIGHT can use HTTP/S for C2 using the Microsoft Graph API.[1] |
Enterprise | T1560 | Archive Collected Data | ||
.003 | Archive via Custom Method | |||
Enterprise | T1555 | .003 | Credentials from Password Stores: Credentials from Web Browsers |
BLUELIGHT can collect passwords stored in web browers, including Internet Explorer, Edge, Chrome, and Naver Whale.[1] |
Enterprise | T1041 | Exfiltration Over C2 Channel | ||
Enterprise | T1083 | File and Directory Discovery |
BLUELIGHT can enumerate files and collect associated metadata.[1] |
|
Enterprise | T1070 | .004 | Indicator Removal on Host: File Deletion | |
Enterprise | T1105 | Ingress Tool Transfer | ||
Enterprise | T1027 | Obfuscated Files or Information | ||
Enterprise | T1057 | Process Discovery |
BLUELIGHT can collect process filenames and SID authority level.[1] |
|
Enterprise | T1113 | Screen Capture |
BLUELIGHT has captured a screenshot of the display every 30 seconds for the first 5 minutes after initiating a C2 loop, and then once every five minutes thereafter.[1] |
|
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
BLUELIGHT can collect a list of anti-virus products installed on a machine.[1] |
Enterprise | T1539 | Steal Web Session Cookie |
BLUELIGHT can harvest cookies from Internet Explorer, Edge, Chrome, and Naver Whale browsers.[1] |
|
Enterprise | T1082 | System Information Discovery |
BLUELIGHT has collected the computer name and OS version from victim machines.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery |
BLUELIGHT can collect IP information from the victim’s machine.[1] |
|
Enterprise | T1033 | System Owner/User Discovery |
BLUELIGHT can collect the username on a compromised host.[1] |
|
Enterprise | T1124 | System Time Discovery |
BLUELIGHT can collect the local time on a compromised host.[1] |
|
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
BLUELIGHT can check to see if the infected machine has VM tools running.[1] |
Enterprise | T1102 | .002 | Web Service: Bidirectional Communication |
ID | Name | References |
---|---|---|
G0067 | APT37 |