Common Information
Type Value
Value
Masquerading - T1036
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed. One variant is for an executable to be placed in a commonly trusted directory or given the name of a legitimate, trusted program. Alternatively, the filename given may be a close approximation of legitimate programs. This is done to bypass tools that trust executables by relying on file name or path, as well as to deceive defenders and system administrators into thinking a file is benign by associating the name with something that is thought to be legitimate. ===Windows=== In another variation of this technique, an adversary may use a renamed copy of a legitimate utility, such as rundll32.exe. (Citation: Endgame Masquerade Ball) An alternative case occurs when a legitimate utility is moved to a different directory and also renamed to avoid detections based on system utilities executing from non-standard paths. (Citation: F-Secure CozyDuke) An example of abuse of trusted locations in Windows would be the <code>C:\Windows\System32</code> directory. Examples of trusted binary names that can be given to malicious binares include "explorer.exe" and "svchost.exe". ===Linux=== Another variation of this technique includes malicious binaries changing the name of their running process to that of a trusted or benign process, after they have been launched as opposed to before. (Citation: Remaiten) An example of abuse of trusted locations in Linux would be the <code>/bin</code> directory. Examples of trusted binary names that can be given to malicious binares include "rsyncd" and "dbus-inotifier". (Citation: Fysbis Palo Alto Analysis) (Citation: Fysbis Dr Web Analysis) Detection: Collect file hashes; file names that do not match their expected hash are suspect. Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect. If file names are mismatched between the binary name on disk and the binary's resource section, this is a likely indicator that a binary was renamed after it was compiled. Collecting and comparing disk and resource filenames for binaries could provide useful leads, but may not always be indicative of malicious activity. (Citation: Endgame Masquerade Ball) Platforms: Linux, macOS, Windows Data Sources: File monitoring, Process monitoring, Binary file metadata Defense Bypassed: Whitelisting by file name or path Contributors: ENDGAME, Bartosz Jerzman
Details Published Attributes CTI Title
Details Website 2024-10-17 16 Dark Web Profile: Evil Corp - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-10-17 16 Dark Web Profile: Evil Corp
Details Website 2024-10-17 47 Threat Actors Push ClickFix Fake Browser Updates Using Stolen Credentials 
Details Website 2024-10-17 199 ClickFix tactic: The Phantom Meet
Details Website 2024-10-17 454 Silent Push uncovers a large trojan operation featuring Amazon, Microsoft, Geek Squad, McAfee, Norton, and Paypal domains. — Silent Push Threat Intelligence
Details Website 2024-10-17 100 Flying in the clouds: APT31 renews its attacks on Russian companies through cloud storage
Details Website 2024-10-17 75 APT31 new dropper. Target destinations: Mongolia, Russia, the U.S., and elsewhere
Details Website 2024-10-16 2 Coffee Lovers Warned of New Starbucks Phishing Scam
Details Website 2024-10-16 2 Police Highlight Cyber Security Awareness Month | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-15 2 Police issue advice on prevention of cybercrime - The Royal Gazette | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-14 14 22/30 MyDFIR SOC Analyst Challenge
Details Website 2024-10-14 0 You’re good enough, you’re smart enough, and doggone it, cybercriminals love you!
Details Website 2024-10-14 55 Hidden In Plain Sight: How ErrorFather Deploys Cerberus To Amplify Cyber Threats
Details Website 2024-10-14 0 Cyber Security Course in Dubai: Your Gateway to a Secure Future
Details Website 2024-10-14 19 Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign Targets Brazil With Astaroth Malware
Details Website 2024-10-12 1 “Mastering the Human Mind: The Advanced Art of Social Engineering in Cybersecurity”
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium
Details Website 2024-10-11 0 Cybersecurity Consulting for SMBs: Protecting Your Business in the Digital Age
Details Website 2024-10-11 71 Weekly Intelligence Report - 11 Oct 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-10 29 Technical Analysis of a Novel IMEEX Framework
Details Website 2024-10-10 28 Technical Analysis of a Novel IMEEX Framework
Details Website 2024-10-10 2 Cyber Briefing: 2024.10.10
Details Website 2024-10-10 33 Malware by the (Bit)Bucket: Uncovering AsyncRAT
Details Website 2024-10-10 9 AhnLab EDR을 활용한 BPFDoor 리눅스 악성코드 탐지 - ASEC