Common Information
Type | Value |
---|---|
Value |
Masquerading - T1036 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed. One variant is for an executable to be placed in a commonly trusted directory or given the name of a legitimate, trusted program. Alternatively, the filename given may be a close approximation of legitimate programs. This is done to bypass tools that trust executables by relying on file name or path, as well as to deceive defenders and system administrators into thinking a file is benign by associating the name with something that is thought to be legitimate. ===Windows=== In another variation of this technique, an adversary may use a renamed copy of a legitimate utility, such as rundll32.exe. (Citation: Endgame Masquerade Ball) An alternative case occurs when a legitimate utility is moved to a different directory and also renamed to avoid detections based on system utilities executing from non-standard paths. (Citation: F-Secure CozyDuke) An example of abuse of trusted locations in Windows would be the <code>C:\Windows\System32</code> directory. Examples of trusted binary names that can be given to malicious binares include "explorer.exe" and "svchost.exe". ===Linux=== Another variation of this technique includes malicious binaries changing the name of their running process to that of a trusted or benign process, after they have been launched as opposed to before. (Citation: Remaiten) An example of abuse of trusted locations in Linux would be the <code>/bin</code> directory. Examples of trusted binary names that can be given to malicious binares include "rsyncd" and "dbus-inotifier". (Citation: Fysbis Palo Alto Analysis) (Citation: Fysbis Dr Web Analysis) Detection: Collect file hashes; file names that do not match their expected hash are suspect. Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect. If file names are mismatched between the binary name on disk and the binary's resource section, this is a likely indicator that a binary was renamed after it was compiled. Collecting and comparing disk and resource filenames for binaries could provide useful leads, but may not always be indicative of malicious activity. (Citation: Endgame Masquerade Ball) Platforms: Linux, macOS, Windows Data Sources: File monitoring, Process monitoring, Binary file metadata Defense Bypassed: Whitelisting by file name or path Contributors: ENDGAME, Bartosz Jerzman |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-03 | 0 | Email Phishing Attacks Surge as Attackers Bypass Security Controls | ||
Details | Website | 2024-10-03 | 38 | perfctl: A Stealthy Malware Targeting Millions of Linux Servers | ||
Details | Website | 2024-10-03 | 4 | FIN7 Exploits Deepfake Craze to Spread Malware through Fake AI Nude Generators - CloudSEK News | ||
Details | Website | 2024-10-03 | 5 | Linux malware “perfctl” behind years-long crypto-mining campaign | ||
Details | Website | 2024-10-03 | 5 | Linux malware “perfctl” behind years-long cryptomining campaign | ||
Details | Website | 2024-10-03 | 38 | Decoy Manuals and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat | ||
Details | Website | 2024-10-03 | 16 | SEO Poisoning Campaigns Target Browser Installers and Crypto Sites, Spreading Poseidon, GhostRAT & More | ||
Details | Website | 2024-10-03 | 11 | Geacon and Geacon_Pro: A Constant Menace to Linux and Windows Systems | ||
Details | Website | 2024-10-02 | 3 | Stopping Attacks Early: The Power of Endpoint Telemetry in Cybersecurity | ||
Details | Website | 2024-10-02 | 0 | 5,000 Fake Microsoft Emails that Your Employees Could Fall For - Check Point Blog | ||
Details | Website | 2024-10-02 | 0 | The Human Factor: Cisco’s 2022 Breach and the Art of Deception | ||
Details | Website | 2024-10-02 | 57 | Separating the bee from the panda: CeranaKeeper making a beeline for Thailand | ||
Details | Website | 2024-10-01 | 28 | SOC Simulator | MyDFIR: 30-Day SOC Analyst Challenge | ||
Details | Website | 2024-10-01 | 11 | VirusTotal 101: A Beginner’s Guide to File Analysis and Threat Detection | ||
Details | Website | 2024-10-01 | 27 | Silent Intrusion: Unraveling The Sophisticated Attack Leveraging VS Code For Unauthorized Access - Cyble | ||
Details | Website | 2024-09-30 | 5 | Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters | Imperva | ||
Details | Website | 2024-09-30 | 6 | Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters | ||
Details | Website | 2024-09-30 | 0 | Social Engineering: The Fascination About This Method of Exploitation. | ||
Details | Website | 2024-09-30 | 32 | Hadooken and K4Spreader: The 8220 Gang's Latest Arsenal | ||
Details | Website | 2024-09-30 | 174 | Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware | ||
Details | Website | 2024-09-30 | 33 | MDR in Action: Preventing The More_eggs Backdoor From Hatching | ||
Details | Website | 2024-09-29 | 0 | Security’s Weakest Link | ||
Details | Website | 2024-09-27 | 0 | The Dumbest Thing in Security This Week: The Cute Things (Alleged) Cybercriminals Do | ||
Details | Website | 2024-09-27 | 1 | New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users | ||
Details | Website | 2024-09-27 | 0 | Top 6 Cloud Security Threats to Watch Out For |