Skip to content

Latest commit

 

History

History
53 lines (40 loc) · 1.68 KB

synful-knock.md

File metadata and controls

53 lines (40 loc) · 1.68 KB
ID X0020
Aliases None
Platforms Cisco
Year 2015
Associated ATT&CK Software None

SYNful Knock

A modification of the router's firmware images used to maintain persistence. [1]

Enhanced ATT&CK Techniques

Name Use
Persistence::Component Firmware::Router Firmware (F0009.001) Modification of the router's firmware image that can be used to maintain persistence within a victim's network [1]
Defense Evasion::Hijack Execution Flow (F0015) Hooks IOS functions to call and initialize the malware [1]

MBC Behaviors

Name Use
Micro-Objective::Memory::Change Memory Protection (C0008) Modifies the translation lookaside buffer (TLB) Read/Write attributes [1]
Micro-objective::Communication::Socket Communication::Send TCP Data (C0001.014) To initiate communication with the C2 server, a uniquely crafted TCP SYN packet is sent to port 80 of the "implanted" router [1]
Defense Evasion::Alternative Installation Location::Fileless Malware (B0027.001) 100 memory-resident modules can be installed [1]

Indicators of Compromise

SHA256 Hashes

  • Unavailable

References

[1] https://www.mandiant.com/resources/synful-knock-acis