Skip to content

Latest commit

 

History

History
65 lines (50 loc) · 1.8 KB

cozycar.md

File metadata and controls

65 lines (50 loc) · 1.8 KB
ID X0034
Type Backdoor, Bot/Botnet, Dropper
Aliases None
Platforms Windows
Year 2010
Associated ATT&CK Software CozyCar

CozyCar

A modular malware platform, and its backdoor component can be instructed to download and execute a variety of modules with different functionality.

ATT&CK Techniques

See ATT&CK: CozyCar - Techniques Used.

Enhanced ATT&CK Techniques

Name Use
Command and Control::Ingress Tool Transfer (E1105) CozyCar requests a file using SSL to a C2 domain. [1]
Defense Evasion::Self Deletion (F0007) CozyCar has a dll file that serves as a cleanup mechanism for its dropped binary. [1]
Command and Control::C2 Communication (B0030) CozyCar communicates with a C2 server. [1]

MBC Behaviors

Name Use
Execution::Install Additional Program (B0023) Upon execution, CozyCar drops a decoy file and a secondary dropper. [1]

Indicators of Compromise

SHA256 Hashes

  • c0675b84f5960e95962d299d4c41511bbf6f8f5f5585bdacd1ae567e904cb92f
  • 08b410d359ec2d6cab73bd6c0be138d9bdc475e3f63fec65794a74e5d5958b3b

IP Addresses

  • 103.254.16.168
  • 103.226.132.7
  • 122.228.193.115

References

[1] https://unit42.paloaltonetworks.com/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke/