Description
[Trojan.Karagany](https://attack.mitre.org/software/S0094) is a modular remote access tool used for recon and linked to [Dragonfly](https://attack.mitre.org/groups/G0035). The source code for [Trojan.Karagany](https://attack.mitre.org/software/S0094) originated from Dream Loader malware which was leaked in 2010 and sold on underground forums. (Citation: Symantec Dragonfly)(Citation: Secureworks Karagany July 2019)(Citation: Dragos DYMALLOY )
External References
Techniques Used by This Malware
- T1003 — OS Credential Dumping
- T1010 — Application Window Discovery
- T1016 — System Network Configuration Discovery
- T1027 — Obfuscated Files or Information
- T1027.002 — Software Packing
- T1033 — System Owner/User Discovery
- T1049 — System Network Connections Discovery
- T1055.003 — Thread Execution Hijacking
- T1056.001 — Keylogging
- T1057 — Process Discovery
- T1059.003 — Windows Command Shell
- T1070.004 — File Deletion
- T1071.001 — Web Protocols
- T1074.001 — Local Data Staging
- T1082 — System Information Discovery
- T1083 — File and Directory Discovery
- T1105 — Ingress Tool Transfer
- T1113 — Screen Capture
- T1497.001 — System Checks
- T1547.001 — Registry Run Keys / Startup Folder
- T1555.003 — Credentials from Web Browsers
- T1573.002 — Asymmetric Cryptography