Common Information
Type Value
Value
Masquerading - T1036
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed. One variant is for an executable to be placed in a commonly trusted directory or given the name of a legitimate, trusted program. Alternatively, the filename given may be a close approximation of legitimate programs. This is done to bypass tools that trust executables by relying on file name or path, as well as to deceive defenders and system administrators into thinking a file is benign by associating the name with something that is thought to be legitimate. ===Windows=== In another variation of this technique, an adversary may use a renamed copy of a legitimate utility, such as rundll32.exe. (Citation: Endgame Masquerade Ball) An alternative case occurs when a legitimate utility is moved to a different directory and also renamed to avoid detections based on system utilities executing from non-standard paths. (Citation: F-Secure CozyDuke) An example of abuse of trusted locations in Windows would be the <code>C:\Windows\System32</code> directory. Examples of trusted binary names that can be given to malicious binares include "explorer.exe" and "svchost.exe". ===Linux=== Another variation of this technique includes malicious binaries changing the name of their running process to that of a trusted or benign process, after they have been launched as opposed to before. (Citation: Remaiten) An example of abuse of trusted locations in Linux would be the <code>/bin</code> directory. Examples of trusted binary names that can be given to malicious binares include "rsyncd" and "dbus-inotifier". (Citation: Fysbis Palo Alto Analysis) (Citation: Fysbis Dr Web Analysis) Detection: Collect file hashes; file names that do not match their expected hash are suspect. Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect. If file names are mismatched between the binary name on disk and the binary's resource section, this is a likely indicator that a binary was renamed after it was compiled. Collecting and comparing disk and resource filenames for binaries could provide useful leads, but may not always be indicative of malicious activity. (Citation: Endgame Masquerade Ball) Platforms: Linux, macOS, Windows Data Sources: File monitoring, Process monitoring, Binary file metadata Defense Bypassed: Whitelisting by file name or path Contributors: ENDGAME, Bartosz Jerzman
Details Published Attributes CTI Title
Details Website 2024-09-19 1 Novel backdoor leveraged in North Korean hackers' global aerospace, energy attacks
Details Website 2024-09-19 16 Cracked Software or Cyber Trap? The Rising Danger of AsyncRAT Malware | McAfee Blog
Details Website 2024-09-19 142 Black Basta Ransomware: What You Need to Know | Qualys Security Blog
Details Website 2024-09-19 26 UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks | Google Cloud Blog
Details Website 2024-09-18 1 Investigation 101: Diving Into the Thought Processes of Cyber Analysis
Details Website 2024-09-18 4 North Korean Hackers Target Energy and Aerospace Industries with New MISTPEN Malware
Details Website 2024-09-18 4 North Korean Hackers Target Energy and Aerospace Industries with New MISTPEN Malware
Details Website 2024-09-18 39 An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader | Google Cloud Blog
Details Website 2024-09-18 17 Securing US Elections from Nation-State Adversaries - Microsoft On the Issues
Details Website 2024-09-17 65 An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader
Details Website 2024-09-17 1 How to use Logpoint pySigma Backend for threat detection
Details Website 2024-09-17 1 How to use Logpoint pySigma Backend for threat detection
Details Website 2024-09-17 3 Russian election interference efforts focus on the Harris-Walz campaign
Details Website 2024-09-17 1 US Indicts Chinese National for Phishing for NASA Tech
Details Website 2024-09-17 2 Marko Polo cybercrime gang targets cryptocurrency users, influencers with scams
Details Website 2024-09-17 0 10 Types of Cyberattacks Targeting Organizations Now
Details Website 2024-09-16 2 North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware
Details Website 2024-09-16 0 From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
Details Website 2024-09-16 0 From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook - RedPacket Security
Details Website 2024-09-16 2 North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware - RedPacket Security
Details Website 2024-09-16 4 23andMe settles class-action breach lawsuit for $30 million
Details Website 2024-09-14 5 A New Malware is Targeting Oracle WebLogic Servers: Hadooken’s Comprehensive Analysis
Details Website 2024-09-13 23 HackTheBox Sherlock Writeup: Heartbreaker
Details Website 2024-09-13 2 New Android Malware Ajina.Banker Steals 2FA Codes, Spreads via Telegram
Details Website 2024-09-12 2 Cyber Threats Intensify in Mexico: Insights from Mandiant on Espionage and Extortion