Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .006 | Command and Scripting Interpreter: Python | |
Enterprise | T1001 | .001 | Data Obfuscation: Junk Data |
UPSTYLE retrieves a non-existent webpage from the command and control server then parses commands from the resulting error logs to decode commands to the web shell.[1] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
UPSTYLE encodes its main content prior to loading via Python as base64-encoded blobs.[1][2] |
|
Enterprise | T1546 | Event Triggered Execution |
UPSTYLE creates a |
|
Enterprise | T1665 | Hide Infrastructure |
UPSTYLE attempts to retrieve a non-existent webpage from the command and control server resulting in hidden commands sent via resulting error messages.[1] |
|
Enterprise | T1070 | .002 | Indicator Removal: Clear Linux or Mac System Logs |
UPSTYLE clears error logs after reading embedded commands for execution.[1] |
.004 | Indicator Removal: File Deletion |
UPSTYLE removes |
||
.006 | Indicator Removal: Timestomp |
UPSTYLE restores timestamps to original values following modification.[1] |
||
Enterprise | T1036 | Masquerading |
UPSTYLE has masqueraded filenames using examples such as |
|
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
UPSTYLE stores primary content as base64-encoded objects.[1][2] |
Enterprise | T1057 | Process Discovery |
UPSTYLE has the ability to read |
|
Enterprise | T1102 | .003 | Web Service: One-Way Communication |
UPSTYLE parses encoded commands from error logs after attempting to resolve a non-existing webpage from the command and control server.[1] |
ID | Name | Description |
---|---|---|
C0048 | Operation MidnightEclipse |
During Operation MidnightEclipse, threat actors made multiple attempts to install UPSTYLE[1][2] |