Description
Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. Payloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) for [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. (Citation: Volexity PowerDuke November 2016) Adversaries may also use compressed or archived scripts, such as JavaScript. Portions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery. (Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled. (Citation: Carbon Black Obfuscation Sept 2016) Adversaries may also abuse [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010) to obscure commands executed from payloads or directly via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms. (Citation: FireEye Obfuscation June 2017) (Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017)
Threat-Mapped Scoring
ATT&CK Kill Chain Metadata
- Tactics: defense-evasion
- Platforms: Linux, macOS, Windows, Network Devices, ESXi
-
Detection Guidance:
Detection of file obfuscation is difficult unless artifacts are left behind by the obfuscation process that are uniquely detectable with a signature. If detection of the obfuscation itself is not possible, it may be possible to detect the malicious activity that caused the obfuscated file (for example, the method that was used to write, read, or modify the file on the file system). Flag and analyze commands containing indicators of obfuscation and known suspicious syntax such as uninterpreted escape characters like '''^''' and '''"'''. Windows' Sysmon and Event ID 4688 displays command-line arguments for processes. Deobfuscation tools can be used to detect these indicators in files/payloads. (Citation: GitHub Revoke-Obfuscation) (Citation: FireEye Revoke-Obfuscation July 2017) (Citation: GitHub Office-Crackros Aug 2016) Obfuscation used in payloads for Initial Access can be detected at the network. Use network intrusion detection systems and email gateway filtering to identify compressed and encrypted attachments and scripts. Some email attachment detonation systems can open compressed and encrypted attachments. Payloads delivered over an encrypted connection from a website require encrypted network traffic inspection. The first detection of a malicious tool may trigger an anti-virus or other security tool alert. Similar events may also occur at the boundary through network IDS, email scanning appliance, etc. The initial detection should be treated as an indication of a potentially more invasive intrusion. The alerting system should be thoroughly investigated beyond that initial alert for activity that was not detected. Adversaries may continue with an operation, assuming that individual events like an anti-virus detect will not be investigated or that an analyst will not be able to conclusively link that event to other activity occurring on the network.
Malware
- ADVSTORESHELL
- Action RAT
- Agent Tesla
- Amadey
- Anchor
- AppleJeus
- AppleSeed
- Avaddon
- AvosLocker
- BPFDoor
- BUSHWALK
- BoomBox
- BoxCaon
- Bumblebee
- Bundlore
- CHIMNEYSWEEP
- COATHANGER
- CORESHELL
- Carbanak
- Carbon
- Clambling
- Cobalt Strike
- CoinTicker
- ComRAT
- Comnie
- Conficker
- Conti
- Cuba
- DRATzarus
- DarkGate
- DarkTortilla
- Daserf
- Denis
- Diavol
- Dridex
- Drovorub
- DustySky
- ECCENTRICBANDWAGON
- EKANS
- Ebury
- Ecipekac
- Epic
- FatDuke
- FinFisher
- Final1stspy
- Flagpro
- Gootloader
- Green Lambert
- GrimAgent
- H1N1
- HTTPBrowser
- Hancitor
- Hydraq
- ISMInjector
- Industroyer
- InnaputRAT
- InvisiMole
- JPIN
- Kazuar
- KillDisk
- Kobalos
- Lokibot
- Lumma Stealer
- Matryoshka
- Maze
- MiniDuke
- NETWIRE
- NOKKI
- NanoCore
- NightClub
- OLDBAIT
- OopsIE
- Orz
- P.A.S. Webshell
- POSHSPY
- PUNCHBUGGY
- PUNCHTRACK
- Pillowmint
- Pisloader
- PlugX
- PoetRAT
- PoisonIvy
- PolyglotDuke
- PowerStallion
- QakBot
- ROKRAT
- RTM
- Ramsay
- Raspberry Robin
- RegDuke
- Ryuk
- SDBbot
- SHOTPUT
- SLOWPULSE
- SUNBURST
- SUNSPOT
- SVCReady
- Saint Bot
- Samurai
- Sardonic
- ShadowPad
- Shamoon
- Siloscape
- Small Sieve
- Snip3
- SodaMaster
- SombRAT
- SoreFang
- StreamEx
- StrelaStealer
- SynAck
- TEARDROP
- TajMahal
- TrickBot
- Trojan.Karagany
- Turian
- Valak
- XTunnel
- jRAT