Common Information
Type Value
Value
Masquerading - T1036
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed. One variant is for an executable to be placed in a commonly trusted directory or given the name of a legitimate, trusted program. Alternatively, the filename given may be a close approximation of legitimate programs. This is done to bypass tools that trust executables by relying on file name or path, as well as to deceive defenders and system administrators into thinking a file is benign by associating the name with something that is thought to be legitimate. ===Windows=== In another variation of this technique, an adversary may use a renamed copy of a legitimate utility, such as rundll32.exe. (Citation: Endgame Masquerade Ball) An alternative case occurs when a legitimate utility is moved to a different directory and also renamed to avoid detections based on system utilities executing from non-standard paths. (Citation: F-Secure CozyDuke) An example of abuse of trusted locations in Windows would be the <code>C:\Windows\System32</code> directory. Examples of trusted binary names that can be given to malicious binares include "explorer.exe" and "svchost.exe". ===Linux=== Another variation of this technique includes malicious binaries changing the name of their running process to that of a trusted or benign process, after they have been launched as opposed to before. (Citation: Remaiten) An example of abuse of trusted locations in Linux would be the <code>/bin</code> directory. Examples of trusted binary names that can be given to malicious binares include "rsyncd" and "dbus-inotifier". (Citation: Fysbis Palo Alto Analysis) (Citation: Fysbis Dr Web Analysis) Detection: Collect file hashes; file names that do not match their expected hash are suspect. Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect. If file names are mismatched between the binary name on disk and the binary's resource section, this is a likely indicator that a binary was renamed after it was compiled. Collecting and comparing disk and resource filenames for binaries could provide useful leads, but may not always be indicative of malicious activity. (Citation: Endgame Masquerade Ball) Platforms: Linux, macOS, Windows Data Sources: File monitoring, Process monitoring, Binary file metadata Defense Bypassed: Whitelisting by file name or path Contributors: ENDGAME, Bartosz Jerzman
Details Published Attributes CTI Title
Details Website 2024-11-08 5 Cybersecurity News Review — Week 45
Details Website 2024-11-08 4 Weekly Cybersecurity News
Details Website 2024-11-08 8 SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims - CyberSRC
Details Website 2024-11-08 0 New Malware "ToxicPanda" Targets Android Devices to Steal Banking Information - Cybersecurity Insiders
Details Website 2024-11-08 4 The Good, the Bad and the Ugly in Cybersecurity - Week 45
Details Website 2024-11-08 35 Life on a crooked RedLine: Analyzing the infamous infostealer’s backend
Details Website 2024-11-07 63 Weekly Intelligence Report - 08 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-07 4 SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims
Details Website 2024-11-07 17 Unwrapping the emerging Interlock ransomware attack
Details Website 2024-11-07 86 BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence
Details Website 2024-11-07 17 Unwrapping the emerging Interlock ransomware attack
Details Website 2024-11-07 2 INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime - CyberSRC
Details Website 2024-11-07 66 European diplomats targeted by APT29 (Cozy Bear) with WINELOADER
Details Website 2024-11-07 3 Featured Articles | CrowdStrike
Details Website 2024-11-07 12 Category
Details Website 2024-11-07 4 CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes
Details Website 2024-11-07 33 Malicious Inauthentic Falcon Crash Reporter Installer Delivers Malware Named Ciro
Details Website 2024-11-07 25 OneNote to Rule them All: eCrime Adversaries Adopt OneNote for Distribution
Details Website 2024-11-07 18 SUNSPOT Malware: A Technical Analysis | CrowdStrike
Details Website 2024-11-06 160 CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
Details Website 2024-11-06 160 CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits - Check Point Research
Details Website 2024-11-06 1 HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data
Details Website 2024-11-06 26 Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
Details Website 2024-11-06 44 GodFather Malware Targets 500 Banking & Crypto Apps Worldwide
Details Website 2024-11-05 20 ClickFix tactic: Revenge of detection